Security Program Development and Effective Risk Management
Review risk management standards and risk assessment tools. Review how vulnerability assessments can be used to identify threats for enhanced risk management. Learn to plot risk for enterprise risk management alignment; determine your risk tolerance; and learn how to use risk mitigation in security planning.
Examine the protection principles used within our security programs. Review defense in depth, deterrence, detection, delay, and response concepts. Critical asset identification, adversary path applications, worst case scenario planning, response exercises, and the relationship between business continuity, disaster recovery, and safety are covered.
Security Program Metrics
Review who uses metrics, how to select the best metric for your program, and why they are important—especially in promoting your department. Discuss the contribution of security incident management to metrics and learn how useful audits can be using metrics as a baseline.
Security Command Centers
All segments of a command center will be addressed, from selecting, staffing, and equipping to business case support and critical functions.
Security Technology Application
Evaluate the capabilities of common physical and cyber security technologies; then learn to measure system effectiveness.
Standards and Guidelines
Examine the difference and learn why we need both. See how they can be used in the assessment process. Sample security standards will be reviewed. A call for involvement will be presented as well.
An Industry-Based Starting Point: Security Manager’s Handbook
Learn the value of an industry handbook, first steps in creating one, and how to use it to your best advantage. Receive a copy of the ASIS International Utilities Security Council’s handbook.
Program Design: Complex Security Problems, the Utilities View
Bring it all together for dams and powerhouses, nuclear plants, reservoirs, pipelines, and transmission lines. Acts of terrorism, building response programs, and working with outside agencies will also be included.
NEW FOR 2013
Collaborate with security practitioners from diverse industries and dialogue with experienced and award winning security professionals when attendees of this program join attendees of Managing Your Physical Security Program and Advanced Topics—sponsored by the Physical Security Council and collocated in Toronto—for a one-hour, joint session.