Bios and Abstracts

Bios and Abstracts

Session 1

Klas Friberg

Junior judge of a District Court 1987-1990
Clerk, Law firm 1990-1991
Executive Assistant to the President of Interpol 1994-1996
In charge of positions as Deputy Police Chief and Police Chief in regional authority 1996-2009
Commissioner, National Bureau of Investigation 2010-
Other duties
Member of the Frontex Management Board 2010 -
Member of the Board of the Folke Bernadotte Academy 2010 -
Member of the Cooperation Council against Terrorism 2010 –

Chris Greany

Mr. Greany has spent 26 years in policing. He began his career in the Metropolitan Police and has served across a number of operational areas with a focus on counter terrorism, security and investigations. He has served in the UK and overseas including a secondment to NATO in Brussels. He oversaw the security strategy for the British athletes’ during the Athens Olympic Games in 2004 and has led the international security for two British Foreign Secretaries. From 2008 he spent three years as head of counter terrorism in the City of London Police.

In 2011 he returned to the Metropolitan Police and was responsible for Operation Withern, the investigation into the crimes committed during the 2011 disorder in London. In January 2012 he was appointed as National Coordinator for Domestic Extremism, responsible for the UK National Domestic Extremism Unit, part of the Metropolitan Police Counter Terrorism Command. During the 2012 London Olympics he also had the role of National Protection Coordinator, part of a command cadre responsible for the security of dignitaries visiting the London 2012 Games.

Abstract
Klas Friberg and Chris Greany will discuss and compare the riots during the 2001 EU Summit in Gothenburg and the 2011 Riots in London. The discussion will be moderated by former Gothenburg policeman Thomas Cederquist CPP, currently Security Director at SAAB Group.

Session 2

Thomas de Neergaard CPP
Security Director Spokesperson for LIF (Swedish Pharma Association) Deputy Chair European Pharmaceutical Industrial Security Forum Former Super Intendent Swedish Police.

Chair of EPISF the Security Forum of EFPIA – The European Federation of Pharmaceutical Industries and Associations (EFPIA) represents the pharmaceutical industry operating in Europe. Through its direct membership of 33 national associations and 37 leading pharmaceutical companies, EFPIA is the voice on the EU scene of 1,900 companies committed to researching, developing and bringing to patients new medicines that will improve health and the quality of life around the world.

Abstract
A case study of the ongoing extremist attack on a company. Reasons and modus

Followed up with best practice in how Police and the industry could cooperate in an investigation and get a verdict The base will be the presentation for Europol, Eurojust and NATOs Secret Services 2012.

Session 3

Axel Petri
As SVP Group Security Policy at Deutsche Telekom AG Axel is acting as Group Security Coordinator, responsible for assuring the holistic approach in security reaching from classical Business Security to Cyber- and IT-Security and defining the Group's security policy as well as assuring compliance with all requirements regarding public safety in Germany including but not limited to Lawful Interception and Data Provision. Axel is Senior Vice President Group Security Policy at Deutsche Telekom AG since 2010 and reporting directly to the Board of Deutsche Telekom Group. He started his career in a law firm dealing with Internet and Media Law. In 1999 he joined Deutsche Telekom where he held various jobs in Legal, HR and Security.

Abstract
The presentation describes new challenges and best practices regarding Cyber Security (e.g. Security by Design, Honeypot Systems) as well as general preconditions to be successful in fighting Cyber Attacks. It gives insight in the market situation and describes convergent and holistic approaches to fulfil the role model of security being a business enabler. Finally it will give an outlook on what has to happen in the near future and what are the main objectives for the cooperation between companies, politicians, society and the security community itself.

Session 4

Søren Matz
+15 years of progressive international supervisory experience in UN and NATO missions. Extensive experience in managing on-site multilateral security sector reform programs, multinational specialist teams and humanitarian operations in active conflict/combat areas. Experience at national army headquarters level on military support projects in Eastern Europe. Extensive supervisory experience in security risk management and assessments of security policies and strategies in military police, private corporations, IO’s and NGO’s.

MSc Security and Risk Management from Leicester University, Department of Criminology in 2011. Specialized in corporate security risk management and compliance/quality management in private security service providers, particularly maritime security.

Tim Hart
Tim Hart is a Senior Maritime Security Analyst within Control Risks’ Maritime Risk Analysis department. The department provides dedicated maritime security research and analysis to the company’s clients and support to a range of internal departments, personnel and offshore projects. With the department, Tim has provided a number of briefings, reports and presentations on global maritime security issues and assisted with the launch of Control Risks’ latest online service, Maritime Security Online. Tim has worked on maritime security issues directly for over four-and-a-half years, providing strategic analysis to the marine insurance industry as well as operational support to shipping companies and offshore projects in the North Arabian Gulf, West Africa, South East Asia and South America.

Abstract
On 1st July 2012 the new Danish Weapons and Explosives Act entered into force. The Act aims to regulate private armed maritime security officers deployed in protection of Danish merchant ships against piracy. In terms of Danish national security policy the Act signals a significant departure from the traditional paradigm of maintaining state monopoly on the legitimate use of lethal force, thereby transferring responsibility onto private security actors. This problem statement is not unique to Danish legislators, but generally appears to be found across contemporary debates at national and international level. The presentation questions whether current legislation appropriately underpins accountability in the private security industry as a legitimate stakeholder in national security policies and conflict resolution strategies.

Session 5

Roger Warwick CPP
RVP Region 27A. Roger has 30 years experience in security. He is the MD of Pyramid International, a Security & Investigations company based in Italy, a Senior Partner of Temi Group, an International S&I consultancy, a certified ISO 27001 and 28000 Lead Auditor and Security Management Systems Skill Examiner. He has pioneered the involvement of ASIS in International Security Standards and received the ASIS Presidential Award of Merit for the provision of information to leadership and the encouragement of member involvement in the development of International Security Standards. He is a consultant to ISO, CEN, UNI and the European Commission on security matters. He is the Chair of the EU Liaison Sub Committee.

Abstract
Learn about professional opportunities in the EU for security professionals and the security profession as a whole. Learn about the activities of the ASIS EU Liaison Sub Committee, ELSC, how ASIS is becoming a leading voice in the EU security spectrum and what this means for you.

Session 6

Jonas Hartelius CPP
Jonas Hartelius, CPP, MBA, is an independent analyst, writer and lecturer on security and drug matters. For 20 years he was a lecturer on drugs at the Swedish Police college. He has served as a scientific expert witness to courts, including the Swedish Supreme Court. He has been Chairman of the Board of the Swedish Carnegie Institute and also Senior Fellow of the East West Institute. He has written more than 20 books on drug problems, professional ethics and defense of human rights. He is a regular contributor on security issues to professional magazines.

Abstract
Private security companies have taken over important security functions of the state, such as watch-keeping. Having a foot in both the state and the market can, however, cause ethical tensions. The reason is that the state and the market follow different ethical syndromes (Jacobs: Systems of Survival, 1992). An ethical syndrome is a set of norms that are internally consistent but may be in conflict with another syndrome. A state servant may use force in office but may not make commercial bargains over decisions (that would be corruption). A businessman may make profits but not use violence (that would be mafia business). Private security companies may end up in a conflict between these syndromes. The sector is still pondering the issues.

The presentation will outline the ethical conflicts and point to questions which will have to be answered as part of the ongoing professionalization of the private security sector.

Session 7

Glenn Schoen
Glenn C. Schoen (1963) is Director of G4S Risk Advisory in Amsterdam. An American born and raised in the Netherlands, he has had a varied career to date that began with law enforcement and progressed to security analysis, consulting and management. Prior to joining G4S in 2010 Mr. Schoen worked for, International Security Management, TranSecur and Ernst & Young. He is a long-time specialist in terrorism and security management. Secondary activities include having served as a volunteer at the White House, a lecturer at Georgetown University’s SSCE program, and membership in various national and international security advisory panels, including OSAC and the United Nations’ ICRI.

Abstract
In crises, security managers’ roles can vary from Crisis Management Team member to arranging emergency support to fielding questions from journalists. Drawing on 25 years of witnessing and working over 100 client crises and giving more than 1000 media interviews, the presenter will share his hard-won list of Best Practices for senior security managers on how to practically improve their personal performance in crisis situations. From preparation, informing the C-suite and personal communication to managing stress and interacting with the media, this will be a highly dynamic and engaging speech drawing on real-life experience in settings as varied as Washington, NY, London, Amsterdam, Barcelona, Berlin, Cairo, Moscow, Almaty, Port Moresby, Kuala Lumpur and Hong Kong.

Session 8

Oliver C Fein

Abstract
The presentation is based on a close examination of failures in personal security and safe travel. The scope reaches from the awareness factor to potential threats and ends with Kidnap for ransom. The traditional travel security is focused on behaviour and interacting abroad like “keeping low profile” etc. In contrast to that focus, this presentation is aiming on the level of awareness while travelling – or even before. Since 90 % of the total incidents are avoidable with the right state awareness, it is worthwhile to have a look from that angle. The core is a summary of real life incidents.

Session 9

André Rickardsson
André Rickardsson is among many things a computer forensic expert, used in Swedish courts by both prosecutors and lawyers. Mr. Rickardsson has more than 20 years experience of advanced computer and network security from government agencies and companies. Much of what he has done in the service are things that ordinary people buy books to read about. Today he owns Bitsec AB witch is the leading computer forensic company in the Nordic region.

Abstract
Today criminals are using “criminal edge” technology and governments are using “bleeding” edge technology for cyber warfare.

Law enforcement should be using cutting edge technology, preferable even bleeding edge technology. At best they are using yesterday’s technology.

The judicial system should at least have a basic understanding of computer forensics. Instead sometimes with regards to computer forensic evidence in Swedish courts the legal security was better during the inquisition.

Obviously certain authorities have both the technical expertise and ingenuity for using offensive techniques, while those in the trenches have to defend networks and investigate computer-related crimes with the left overs.

Maybe it should be the other way around.

Session 10

Barrie Millett
A dynamic successful leader with a strong blend of strategic, technical and operational experience with an excellent track record of delivering results in fast paced demanding environments.

Encompassing a broad and successful career including; military service, strategy development, tactical security and operational risk management across multiple sectors including; energy, finance, telecoms and manufacturing.

Employed by E.ON, as Head of Business Resilience with responsibility for; crisis management, corporate security, information security, business continuity, crime risk management, and revenue protection.

Proven Leader who has the ability to deliver effective and efficient programs and able to demonstrate a readiness to make difficult decisions to drive initiatives forward.

Barrie is also; Chair of Energy Emergencies Executive Committee Security Task Group, National Business Crime Forum Director, strategic advisor on the UK College of Policing Hydra Gold Command program, steering committee member of the International Electricity Infrastructure Assurance forum.

Honorary President of ASIS International UK Chapter.

Abstract
Over the past 5 years there has been a substantial increase in the successful use of direct action against companies and governments across the world. These actions have been used to highlight perceived issues about the environment and, in some instances, prevent organisations from going about their daily activities or stopping specific projects. This has very often resulted in significant impact on daily operations and project work.

With the increase of sharing of tactics and use of social media various groups are becoming more interactive and collaborative in their actions - sharing tactics, learning from organisations and police response protocols, sharing of resources and conducting simultaneous joint operations.

The true impact of past actions and the overarching emerging threat landscape will be used to demonstrate the professionalism of some of these groups and demonstrate some tried and tested mitigation strategies that have effectively managed the threat.

Session 11

Torsten Wolf
Torsten Wolf is the Group Head of Crime and Fraud Prevention for Zurich Financial Services. In his role he leads the Group’s efforts to prevent, detect and respond to non-claims related crime and fraud that is directed against Zurich. Torsten looks back on more than twenty years in the insurance industry where he worked across personal lines and large corporate business. Torsten is a Certified Internal Auditor and holds a Degree in Business Studies and Economics as well as a Master Degree in Business Administration. He is a regular presenter on topics of crime and fraud at international conferences.

Abstract
Enterprises are increasingly confronted with the challenging task to protect their assets and their reputation. Especially companies that operate across the globe find it extremely difficult to protect their operations from criminals and fraudsters effectively and in a consistent manner. With reference to Zurich’s comprehensive anti-crime framework the audience will get an understanding of crime and fraud risks an insurance organization typically faces and how these risks are being addressed by a multinational insurance organization. They can then reflect on how components of Zurich’s anti-crime framework may help enhance the fraud control environment within their own organizations.

Session 12

David Rubens
I hold an MSc in Security and Risk Management from Leicester University, where I am a Visiting Lecturer and Dissertation Supervisor on their Security, Terrorism and Policing programme, and am currently studying on the Professional Doctorate programme at Portsmouth University Department of Criminology & Justice. I was a Visiting Fellow at the Security and Resilience Department, Cranfield University, UK Defence Academy (2009-’10), where I was a Visiting Lecturer on the Strategic Leadership programme focusing on terrorism and public policy, and the management of large-scale, complex multi-agency programmes. My Doctorate Thesis is focused on the issues of strategic management of large-scale, complex and ‘Wicked’ problems, and I have given presentations at major conferences in London, New York, Moscow, Tokyo and Kiev on these subjects.

Abstract
The challenges faced by modern security managers are growing increasingly complex, whether in their own immediate impact or in terms of their secondary consequences. Traditional security management frameworks are proving inadequate to deal with the problems thrown up by recent events such as Hurricane Katrina, the Fukushima tsunami disaster, global IT crashes and the power outages in India. This presentation will look at some of the emerging ideas around ‘Wicked Problems’, non-traditional decision making and capability development that will be of immediate relevance to anyone involved in any aspect of security management, whether commercial or governmental.

Session 13

Johan Petersson
Johan Petersson (born 1980) is the Director of Security for Nokas Cash Handling in Sweden and Norway since February 2012. Mr. Petersson has also served as the Director of Security, Security manager, Operations Security Manager and Security Inspector at G4S Cash Solutions. Mr. Petersson started as a carrier officer in the Swedish defense forces. He left the army after 8 years, with service in Sweden and at Balkans on the Multinational Military Police Element, KFOR (NATO).

Abstract
The 23rd September 2009 early in the morning a helicopter approached one of the biggest cash center in Sweden. The helicopter was loaded with 4 people with different expertise in crime, heavy weapons, explosives and heavy tools for breaching. At approx. 05:18hrs the helicopter touched down at the roof on the cash center. Under a very long time the three criminals was working with to gain access to the cash center meanwhile the police was keeping the outer cordon to the area. After more than 30 minutes the helicopter took off with approx... 4 million euro.

Session 14

Fredrik Lars Rehnstrom, CPP
Fredrik Rehnström has 20 years of experience from working with security management on different positions in both public and private sector. His first 10 years he was an CIS officer and CISO within the Swedish Air Force. His last 12 years he have spent as a business manager and senior security advisor for a significant number of global Security, Preparedness and Continuity Management System implementations (including third party certifications) within Public Healthcare, Banking, Telecommunication, Lottery and Internet Gaming, R&D oriented IT product manufacturing and public social service providers.

Current assignments are e.g. Resilience programs, IPR protection and BCM.

He is today Executive Vice President at Actea Consulting. Fredrik is board certified:
• Protection Professional (CPP)
• Information System Security Professional (CISSP)
• Information Security Manager (CISM), and
• Certified in the Governance of Enterprise IT (CGEIT)

Fredrik has a recent diploma from Wharton Business School – Security Leadership for Security Executives, in cooperation with ASIS International.

Fredrik was a presenter at the CSO Roundtable and ASIS European Security Conference in Montreux 2009 as well as presenter at the ASIS European Security Conference in London 2012

Abstract
This session will highlight the fundamentals for you to establish a solid intellectual property protection program: - Defining and visualizing an IP strategy and todistinct trade secrets from patent, licenses, papers or publications - Establish a sustainable owner and custodian structure - Converge IP and traditional security classification schemes - Implement solid handling routines and robust security measures including continuous improvements These fundamentals will help you be more vigilant and attentive in driving IP protection. It will also prepare you and our enterprise or organization to face the paradigm shift of asset protection from being experience based and reactive to anticipating and adaptive.

Session 15

Erik Ackerfeldt
As Head of Military Interrogation Training, Erik Ackerfeldt has developed the entire program used at the Swedish Defense Language Institute (Försvarets tolkskola) to train military interrogators in personal based intelligence gathering and behavioral communication. With professional experience from hostile environments and warzones across the globe, Mr. Ackerfeldt has trained military and police personnel as well as public companies for 10 years in how to communicate more efficiently even under the most challenging circumstances. He enthusiastically combines his theoretical knowledge with practical training to efficiently make all course participants a superior communicator. He has gathered an impressive collection of practical exercises that he uses to highlight theoretical phenomena, which gives the participants a solid theoretical as well as practical base to stand on.

Abstract
Have you ever been taught to look out for the nervous twitches of a liar, the body shifts, the crossed arms the gaze aversions and so on, even if they are remarkably unreliable? Deceptive individuals tend to hide their fear of detection under the cloak of controlled verbal communication; they divert your attention from their lies. Through systematic verbal analysis techniques we have the tools to detect deception, spot omissions and measure the level of commitment shown towards your investigation. Verbal analysis is without a doubt the most powerful tool in detecting deception!

Session 16

Professor Martin Gill
Director of Perpetuity Research and Consultancy International, UK

Professor Martin Gill is a criminologist and Director of Perpetuity Research which started life as a spin out company from the University of Leicester. The company specialises in evaluating the areas of security management, risk management, crime and crime prevention. Martin has been actively involved in a range of studies relating to different aspects of business crime including, the causes of false burglar alarms, why fraudsters steal, the effectiveness of CCTV, the victims of identity fraud, how companies protect their brand image, the generators of illicit markets and stolen goods, to name but a few. He has published widely (over 100 articles and 13 books including ‘Managing Security’ and ‘CCTV’ published in 2003, and the 'Handbook' of Security' published in 2006). Professor Gill is a Fellow of The Security Institute, a member of the Company of Security Professionals, he is Chair of the ASIS Research Council and an overseas representative on the ASIS International Academic Programs Committee. In 2002 the ASIS Security Foundation made a ‘citation for distinguished service’ in ‘recognition of his significant contribution to the security profession’. In 2010 he was recognised by the BSIA with a special award for ‘outstanding service to the security sector’.

Nicolas Le Saux
The author holds a reserve commission as a Lt Colonel, specializing in high level security, also served as a professional soldier in the French Army. Member of the Economic Commission of MEDEF (institute of directors for France), also leads the Outsourcing Committee work of MEDEF in relations to the Defence and Security industry. Member of the guarding and critical infrastructure committees of CoESS (Confederation of European Security Services), Board member of USP (French Private Security Professionnal association). Teaches private security topics at the Law School of University Paris Descartes (Paris V) and Institut National des Hautes Etudes de Sécurité et de Justice (INHESJ) Doctorate from the Centre des Hautes d’Etude d’Assurances, Masters degree in International Relations, Executive MBA (ABMP) from Kellogg Business School. Graduate from the Institut des Hautes Etudes de Sécurité et de Justice (Prime Minister’s office).

Stein Thorstensen
Stein Thorstensen has worked 6 years in Steen & Strøm AS at corporate level. Main work areas are within risk management, quality assurance, environmental and social responsibility, focusing on risk understanding, process and quality improvement. Stein Thorstensen is also responsible for coordination of Steen & Strøm's Sustainability program and the ISO-14001 project. He is also member of Steen & Strøm Property Management Committee and sits as the companies’ representative in Klépierres "Risk & Control Committee." By past experience, Stein Thorstensen has among 5 years as Manger in KPMG and 4 years as Chief Advisor and Key Account Manager in TietoEnator. He possesses experience in risk management, business advisory and consultancy assignments above large national and international businesses. Education: Bachelor of Science from Datahøyskolen in Oslo.

Abstract
Private Security in Europe is obviously shaped by local regulation. Recent research highlights however that resulting guarding costs can vary widely based primarily on the strength of public/private sector relationship. Using shopping malls as an illustration (a global business with few players they are also at the crossroad of public and private spaces), we will draw some lessons and trends for the future. A specific focus will also be made on the Swedish market, one of the most striking example of public/private sector partnership in this area.

The presentation will be on European security industry trends illustrated/or with a zoom on private security in shopping malls and more specifically in Sweden (PhD research highlights that for a similar shopping mall guarding costs can be as much as 5 times lower than in other European countries).

The CEO of Steen&Strom will comment on their own experience in Sweden but also put it into perspective of his group Klepierre (300 shopping malls in Europe) and partly owned by the American Simon Property.

The idea is as discussed is to have a panel on stage composed of 3 people Martin Gill, the CEO of Steen& Strom and Nicolas Le Saux. The presentation will be on European security industry trends illustrated/or with a zoom on private security in shopping malls and more specifically in Sweden (PhD research highlights that for a similar shopping mall guarding costs can be as much as 5 times lower than in other European countries).

The CEO of Steen&Strom will comment on their own experience in Sweden but also put it into perspective of his group Klepierre (300 shopping malls in Europe) and partly owned by the American Simon Property.

Session 17

Henk van Unnik
Henk van Unnik is since 2004 active as Senior Advisor in Securitas Maritime Competence Centre. Henk is a former chief of the Rotterdam Seaport Police, where he developed new regulatory frameworks, investigation methods and concepts to successfully fight Transnational Organized Crime and Terrorism. Henk was one of the architects of the Rotterdam “Reliable Port Concept” and writer of the guide “Security Mainport Rotterdam”. As Director of the Rotterdam Port Security Development Group, Henk was responsible for the preparation and implementation of the ISPS-Code in the Port of Rotterdam and advisor of the Dutch Minister of Transport and Inland Waterways for the other Dutch Ports. Currently he represents the IAASP (Consultative NGO status) on the IMO, MSC maritime security and piracy working group.

Abstract
Ports and port facilities are a critical part of the Supply Chain, as 70% of the worldwide freight transport are done via sea. SUPPORT is a research project under the Seventh Framework Program of the European Union, with the goal of developing methods and tools to upgrade the security of European ports and port facilities. This presentation will be reporting on the preliminary results of SUPPORT project and how these can be utilized. Special emphasis will be on the development of a security management platform (PSMS) and how fusion technologies can be used to improve security operational support (PSOS).

Session 18

Professor Joshua Bamfield
Director at the Centre for Retail Research, UK

Professor Joshua Bamfield is Director at the Centre for Retail Research, providing authoritative and expert research and analysis of the retail and service sectors in Britain, Europe and across the globe. The centre is is totally independent and is not connected to any outside organization or interest group. Professor Bamfield is highly respected within the retail profession, a regular conference speaker on the circuit and industry speaker within TV and print media channels. He is also responsible for the annual Global Retail Theft Barometer survey, the most comprehensive research into retail shrinkage globally.

Atul Rajput
Manager Business Development Northern Europe, AXIS Communications, UK

Atul Rajput is responsible for the business development organisation within Northern Europe, tasked with raising awareness of the role network video can play in key industry segments such as retail, transportation and critical national infrastructure.

Atul is one of the most experienced network video professionals in the market, having operated in the network video industry for over 15 years and has been involved in some of the UK’s most high profile network video deployments, which include a number of Tier 1 retailers. Atul has recently authored a white paper detailing the security and business benefits network video can offer the retail sector.

Atul has been a regular speaker at numerous industry events within his role at AXIS, playing an active role over the years in articulating the benefits of network video for security systems.

Abstract
The presentation will analyse the results of the Northern European CCTV in Retail survey conducted by the Centre for Retail Research and sponsored by Axis Communications. Retailer’s perceptions of key technology trends to invest in tackling both external and internal shrink related loss. Understand why the majority of retailers cited plans to migrate to IP Video Surveillance. Learn which business intelligence analytics retailers see the most value in. Learn about retailers opinions on CCTV regulation and the impact on their ability to run an effective surveillance system. The emerging technology set to transform retail surveillance in sub 16 camera installations.

Session 19

Berndt Rif, CPP
Berndt Rif worked as high risk flight agent and profile agent at Amsterdam Airport Schiphol. He was also head of the security department at the Academic Medical Center in Amsterdam. After leaving the university hospital he worked as security coordinator and information security officer for the ING Group. Before he joined the Dutch Central Bank as Senior Security Policy Advisor and Threat Intelligence Analyst, in june 2007, he worked for the Ministry of Interior and Kingdom Relations as Senior Protective Security Advisor. Berndt Rif is also working for the (Dutch) National Police in the rank of (volunteer) Inspector of Police. He holds a Bachelor Degree in Policy and Culture, a Master of Science Degree in Policing and Public Order Studies and a Master of Business Administration degree in Security Management. In 2008, 2010 and 2012 Berndt Rif participated in several operational security and counter terrorism courses in Israel.

Abstract
This presentation introduces predictive (security) profiling as a method to determine the potential threat level of a (future) employee, vendor or consultant by evaluating its deviation from an expected norm and assessing the relevancy of this deviation to a know method of attack by an identified adversary. Based on it’s own practical experience the Dutch Central Bank (De Nederlandsche Bank) identified specific security threats relating to human actions. Special attention will be given to the implementation of red teaming, as part of the pre-employment and in-employment screening process, to discover potential methods of attack by the adversary through infiltration and recruitment. This means that also the eight steps of the criminal and terrorist attack cycle will be discussed.

Session 20

Volker Wagner
Since 2008 Volker Wagner has been in charge of the realignment of Group Business Security at Deutsche Telekom AG. As Senior Vice President he deals internationally with the group’s security and Business Continuity Management and is therefore responsible for business security in over 50 countries. He as well held leadership functions in the areas of finance, sales and audit. Volker Wagner is the chairman of the German Association for Security in Industry and Commerce (ASW) and a board member of German Association for Security in the Economy North Rhine-Westphalia (VSW-NW) and the Committee on Security Issues (AfS) of the Federation of German Industry (BDI). Internationally he is engaged in the ASIS International organisation where he is a member of the German Chapter, the international CSO Roundtable and the European Convergence Subcommittee. In 2010 Volker Wagner attended the 6 month Seminar for Security Policy at the Federal College for Security Studies in Berlin, Germany's highest-ranking interministerial institution for advanced education and training in the field of security policy. Volker Wagner holds a business management degree from the University of Erlangen-Nuremberg.

James Willison
James Willison is vice chair of the ASIS European Security Convergence/ESRM subcommittee and has been a member of ASIS since April 2003. He worked in the Physical Security Industry for 15 years and now specialises in the Converged security area. Since 2002 he has worked closely with global security leaders from the traditional and digital arena and has a Master’s degree from Loughborough University for his research on, “The case for the Integration of Corporate Physical and IT security.” He is also Convergence Project Lead for the Information Security Awareness Forum, a member of the Security Institute, ISSA UK and ISC(2) London.

Alessandro Lega
After 36 years spent in IBM, of which 12 as Country Security Manager in Italy, in 2002 he has initiated his own activity as independent consultant for Corporate Security Management. He joined ASIS International in 1997 and earned his CPP certification in 2002. He is actually Assistant Regional Vice President for Region 27A and has been recently appointed as Security Convergence representative for ASIS International Group 15 (Europe)

Abstract
This presentation considers the converged aspects of the standard and outlines how to establish: “A cross-discipline and cross-functional risk assessment and management framework that identifies, analyzes, evaluates, and treats all security risks within a singular managed process”. Organisations can no longer consider security risks in isolation as recent events such as wiki leaks and Stuxnet have shown. Cyber security increasingly impacts Physical security and the need for an integrated security strategy is agreed. This presentation shows how the standard can help teaming with other business functions and processes in order to ensure an effective Enterprise Security Risk Management strategy.

Session 21

Erik de Vries, CPP
Erik de Vries, CPP is owner/director of Tagri, partner in European Security Academy and chairman of the ASIS Benelux chapter. He advises, trains and coaches clients (varying form multinationals to SME’s) to balance their risks with their security ambitions. An important part of his work is coaching crisis management teams. Following a fifteen year career as officer in the Royal Dutch Army and a three year intermezzo selling timesharing and living in Jakarta, Indonesia, Erik has more than fifteen years of experience in the security profession. His experience include several operational roles in G4S, including prisons, risk management and consultancy as well as conducting CPP certification courses. He coaches security managers and management teams as an independent consultant on many risk & security related issues.

Abstract
Social Media plays an increasing role in crisis management. Whether to monitor media, or to anticipate threats. But social media sometimes acts as the creator of crises. Recent examples are “Project-X” invitations where crowds are quickly mobilized for - existing or non-existing - parties. Such invitations bring astonishingly large crowds together. How to respond to that? Many security professionals barely understand social media. How does it work? Why do young people so anxiously shape their life around it? How do network gatherings work? How to bring social media knowledge in the crisis team? This presentation focuses on practical lessons learned.

Session 22

Hugh McLeod
Hugh McLeod established Assynt Associates in 2003, producing briefing and analysis on terrorism and country risk to large companies and government entities working in the Middle East, Asia and beyond. In 2008 their team became part of Stirling Assynt, of which Hugh is a founding member. The company also provides Business Intelligence and enhanced Due Diligence services. Hugh spent 18 years as a diplomat, with postings to Islamabad, Accra, Nicosia - where he served as Political Counsellor - and Kosovo. During his service in London his responsibilities included Counter-Terrorism, the Arabian Peninsula and Former Soviet Union. Before that he spent fourteen years as an infantry officer. He was awarded the MBE for service in the Military Mission to the Soviet Forces in East Germany.

Abstract
The following regional consequences of the Syrian crisis – both potential and actual - have emerged since the onset of the conflict: increased Saudi-Iranian tensions; instability in Lebanon; worsening sectarian relations across the Gulf; jihadist exploitation of the conflict, with benefits for al-Qaeda; and increased threat to Israel. The Arab Revolutions sent a shockwave around the region but it is the conflict in Syria that is likely to have the most significant and lasting effect. This talk will help businesses understand and predict the changes ahead, with the likely implications for their regional operations.

Session 23

Charles Randolph
Seventeen years of experience in the protective security industry and over 20 years as a military officer has uniquely qualified Chuck to take on a typical day’s work (as a Senior Director) of planning, strategic development, tactical deployment, and management of both Microsoft’s Global Executive Protection Team and the Global Intelligence Unit. Along with a corporate career, Chuck is a military officer having served in numerous overseas contingencies. Operating in austere and asymmetric environments, Chuck served with distinction and has received multiple decorations, once with valor. Chuck holds a BS Degree in Political Science with minor degrees in Public Relations and Military Science from Ball State University in Indiana.

Abstract
The basic skills applied in executive protection strategy may evolve but haven’t fundamentally changed much over time. What has changed is the environment in which EP personnel operate, and the role leaders and agents can play in affecting the way principals and their organizations function. This seminar will examine and explore how adapting to the landscape of new challenges will enable leadership and further involvement into the enterprise.

Session 24

Dr. Peter Speight
Peter worked in the Chemical & Pharmaceutical industry, in health & safety roles with worldwide responsibilities. Peter worked at the BBC as Head of Security Operations for BBC London, developing security polices and procedures and managing physical security arrangements. He joined Reliance Security and managed their Remote Monitoring Centre and developed the strategic business plan of a new BS 5979, BS8418 Category 11 Surveillance Centre. Peter took responsibility for client consultancy and risk based solutions. Peter holds an MSc in Security Risk Management and an MSc in Security Management he has recently completed his Doctorate in Security Risk Management. Peter has had several articles published on security subjects within academic security Journals and professional magazines, and is a visiting lecture at a number of Universities.

Abstract
The operational effectiveness of organizations distinct security facets is often not capable of critical assessment by the very organisation that is paying for these assets and services. It has been necessary, therefore, to both determine and evidence a variety of security failures and, ultimately, contrast these sample conditions with examples of organisational security successfully achieving a range of targeted objectives, - to the complete understanding and budgetary capability of the target organisation. The issue of risk and security auditing is, therefore, a key feature of the presentation, as is the requirement to emphasize that the success of a security strategy.

Session 25

Professor Martin Gill
Professor Martin Gill is a criminologist and Director of Perpetuity Research which started life as a spin out company from the University of Leicester. The company specialises in evaluating the areas of security management, risk management, crime and crime prevention. Martin has been actively involved in a range of studies relating to different aspects of business crime including, the causes of false burglar alarms, why fraudsters steal, the effectiveness of CCTV, the victims of identity fraud, how companies protect their brand image, the generators of illicit markets and stolen goods, to name but a few. He has published widely (over 100 articles and 13 books including ‘Managing Security’ and ‘CCTV’ published in 2003, and the 'Handbook' of Security' published in 2006). Professor Gill is a Fellow of The Security Institute, a member of the Company of Security Professionals, he is Chair of the ASIS Research Council and an overseas representative on the ASIS International Academic Programs Committee. In 2002 the ASIS Security Foundation made a ‘citation for distinguished service’ in ‘recognition of his significant contribution to the security profession’. In 2010 he was recognised by the BSIA with a special award for ‘outstanding service to the security sector’.

Abstract
In this talk Martin Gill will discuss why criminals succeed. He will report on the latest research findings. Having spoken to offenders in prison, Martin will discuss the ways in which offenders are adapting to the latest challenges posed by security, the skills sets they are using, and why they feel they have the upper hand. In fact criminals rely on security professionals and people working in organisations not doing their job well. Martin will discuss the implications for the security profession.

Session 26

Sirra Toivonen
Mrs. Sirra Toivonen is a senior scientist at VTT Technical research centre of Finland. She graduated from the University of Tampere in 1993. She has worked at the Vulnerability Management Team as project manager and senior scientist since 1995 . The working areas have dealt with the security of global transportations systems, and mobile technology development and evaluation. The emphasis of the current research is the management of security of critical transportations at product level including the service models with the employment of the new technology. The research covers also the field of systems' security and managing uncertainty in the front end of radical innovation development.

Dr Johan Scholliers
Dr Johan Scholliers, M.Sc, Ph.D (Katholieke Universiteit Leuven, Belgium, 1986 & 1992). He is working as Principal Scientist in the Vehicle ICT group of VTT, the Technical Research Centre of Finland. His experience is in telematics applications for supply chain security and traffic safety; evaluation of applications for logistics, mobility and vehicle safety applications. He has been acting as project coordinator of several European research projects (INVETE, EXPLORE, PReVAL). He is currently involved in different EU-funded projects regarding shipping container security (SUPPORT and CONTAIN) and in national projects regarding supply chain security.

Abstract
The use of real-time tracking technologies provides, besides the optimisation of logistic processes, benefits for the security management , such as the collection of concrete knowledge of security incidents and tools to minimise consequences. Although the basic technology is mature, the selection of the optimal technological solution, business case development, implementation, and the exploitation of real-time tracking data to security management are challenging tasks. VTT has been involved in several European and national projects regarding monitoring technology to improve supply chain security. Experience gained from these projects, with a critical analysis of the benefits and limitations will be described.

Session 27

Mark Johnson
Mark is the founder of The Risk Management Group whose client reference list is extensive and includes The City of London Police, Europol, The United Nations, the EU Commission, various Customs and Revenue departments and EU Financial Intelligence Units, as well as numerous corporate clients in banking, telecommunications, industry and transportation.

With a background in drug enforcement and later telecoms fraud control, Mark is a regular lecturer and trainer with The International Compliance Association, MIS Training Institute and several other organisations. He is the author of Demystifying Communications Risk published by Gower Publishing and is currently working on a second book covering cyber crime and security.

Abstract
Social networking is an Internet within the Internet. Now the communications tool of choice for hundreds of millions of users, social media services such as Facebook provide unprecedented access and communications capabilities at almost zero cost. However, these services also introduce a new dimension to some very old risks. Five percent of malicious incidents in cyber space now occur within or via social networking sites and this problem is compounded by the ease with which anyone can create and use a fake user profile on almost any of the social media services. Issues seen include:
• Data protection risks in relation to user’s account and profile information, which often includes dates of birth, addresses and telephone numbers. (LinkedIn recently suffered a hacking attack that is thought to have exposed 6.5 million user names and passwords).
• Fraud attacks, Malware, Spyware and Botnet infections that have the potential to attack systems and bring operations to a halt, as demonstrated by the Stuxnet, Flame and Shamoon Worms over the past two years.
• Identity verification risks, demonstrated by the ease with which fake social media accounts can be created and ‘friends’ found. This has particular relevance in terms of the long term value of social media data as evidence at trial.
• Harassment, grooming and targeting, whereby criminals and others are using social media to identify, locate and investigate potential victims .
• Reputational harm, particularly from events such as ‘Twitter Storms’ where users target a brand and generate thousands of negative messages that are read by millions of consumers in a very short period of time.

In the social media domain, ‘loose clicks sink ships’, and the impact of errors or disclosures on personal relationships, reputations and corporate trust can also be dire. This very timely presentation examines the risks and describes a recommended set of best practices for firms and individual users.

Session 28

Håkan Hagberg
Håkan Hagberg is a computer analytics working at the Social Security Agency in Sweden. The responsibility includes developing and maintaining software as well as secure proof of committed frauds. Also activities such as information and education to prevent internal frauds to take place is performed.

Past employment experience is software engineering in computer and telephone integrations technology, software architect in social security systems ,system access rights specialist, digitalization of huge amount of documents.

Education
Degree of Bachelor of Computing Science. Software engineer.

Abstract
In 2007 Försäkringskassan was notified of a strange pay-out. This pay-out was a part of a 4 € million internal fraud. A function of computer analysis was implemented. In 2010 an analysis of attendance allowance resulted in a huge number of suspicious transaction. Some of the identified transactions were leaving Sweden, where large amounts were used to feed criminal organizations. Today the unit consist of four analysts and three investigators, together the teams analyses 2000 employees logs, 120 million insurance pay-outs, 600 000 administrative pay-outs, 12 800 monthly salaries along with approximately 50-70 investigations of internal rule violation each year.

Session 29

Dr. Gertjan Burghouts
Gertjan J. Burghouts, Ph.D., is a lead research scientist in visual pattern recognition at the Intelligent Imaging research group at TNO (Netherlands). He studied artificial intelligence at the University of Twente (1997-2002) with a specialization in pattern analysis and human-machine interaction, He received his Ph.D. degree from the University of Amsterdam in 2007 on the topic of visual recognition of objects and their motion, in realistic scenes with varying conditions. He is principal investigator of a DARPA project named CORTEX ($2.3M), about recognition of events and behaviors, resulting in a prominent achievement during the September 2011 evaluation trials. He won an award from the Netherlands Association of Engineers for the ‘best innovative project’ in 2007. Other activities include the supervision of a PhD student at the TU Delft and the productizing of a human detection algorithm together with two Dutch SMEs. He has written papers on this topic in internationally renowned journals e.g. IEEE Transactions on Image Processing, Computer Vision and Image Understanding, International Journal of Computer Vision, International Conference on Crime Detection and Prevention, IEEE Transactions on Systems, Man and Cybernetics. His work has been cited over 200 times since 2005.

Abstract
We argue that this is only possible when combining fundamental psychological and technical insights with practical applications. We will explain our psychological analysis of perpetrators and analysis of criminal modus operandi. Based on this analysis we present research, showing how subtle signals by security personnel increases the chances to detect individuals with malicious intentions. We will discuss research carried out to identify competences that make excellent security officers/profilers. We will present our research on intelligent camera systems to support the human security resources. We conclude with typical problems in assessing the effectiveness of security interventions and how to overcome these.

Session 30

Andrew Williams, CPP
Andy Williams is Head of Global Operations, Quality Assessment and Education for Safehotels Alliance AB, a Swedish Company based in Gothenburg as well as a Senior Partner with Temi Group – Global Security Risk Management.

Abstract
From 2003 until 2010, there was an unprecedented escalation of terrorist bombing and armed attacks on hotels in specific regions of the world. However, in the last two years this choice of target appears to have subsided, why is this or is it the lull before a new storm of attacks over the coming years. The presentation will provide insight and analysis to this question through ‘global news headline’ case studies the presenter was personally involved, examination and forecasting of future trends and potential bombing hotspots, based on:
- Analysis of hotel bombings in Egypt , Jordan, Pakistan, Indonesia and India as an indicator of future attacks
- Presenting a CARVER perspective of how terrorists plan , select and execute an attack – with insight on the foiled ‘Barot hotel bomb plot’.
- Insight into hotel design blast mitigation principals though case study of the conversion of a bombed commercial building in Istanbul into a luxury hotel.

Session 31

Eythor Vidisson
B.S, degree in Criminal Justice & Law Enforcement Admin. from Fairmont State University in West-Virgina, USA. MSc in Security & Risk Management from Leicester University in the UK. 21 years experience in security such as Security Manager, Consultant, Head of Departments, Lecturer, public speaker and more.

Abstract
The presenter will talk about the increased violence, threats and difficult behaviour of bitter clients of fallen financial institutions and companies after the collapse of the Icelandic banks in 2008. How workplaces are dealing with the situation, how measures are being taken to this day to prevent further violence and how specialized consultation is being utilised to unify the response.

Session 32

Steve Surfaro
With more than 25 years of security industry experience, Steve Surfaro is Axis Communications' Industry Liaison, providing education, standards development and global end user account management. Steve is the Vice Chair of the ASIS Physical Security Council and provides leadership on ASIS Annual Seminar and ASIS workshop content. He has recently been published the Handbook of Video Quality, which has been adopted by the US Dept of Homeland Security's Science and Technology Group. He is a regular contributor to industry publications and reference materials.

Abstract
According to IMS Research, it is expected that North American video deployments in City Surveillance will double in market size by 2016 (based on 2011 research). Advanced surveillance, security and cyber infrastructure is well in progress in cities in China and Europe. The image of a city as well-maintained, safe and secure is a critical requirement its growth. Building an Integrated Cyber-Infrastructure permits the ability of securing critical information assets by implementing recommended measures against known exploits. We will examine several case studies, spanning security and surveillance to preparation, education and policy for Cyber and Infrastructure assurance. Strategies will be presented and trends in physical, cyber, commercial and even consumer technologies illustrated in this entertaining session. We’ll conclude with how IT network and communications technologies help facility managers build tactical, corporate infrastructures, and support their strategic goals.

Session 33

Dr. Marc Siegel
Dr. Marc Siegel is the Commissioner heading the ASIS International Global Standards Initiative. He represents ASIS International at the International Organization for Standardization (ISO) and at regional and national standards forums. He works with ASIS International and national standards bodies on five continents to develop international and national risk management, resilience, security, preparedness, and continuity standards as well as provides training on their implementation. He is a RABQSA International certified Security Management Systems - Business Improvement Lead Auditor, as well as a certified Trainer and Skills Assessor for the ISO 28000 – Security in the Supply Chain Lead Auditor Certification Program.

Dr. Allison Wylde
Assistant Professor Allison Wylde FRGS DIC (Imperial) has twenty-plus years’ practical experience gained from industry and academia. Starting as a biologist Allison was a bench-scientist researcher working in controlled environments. Later working with KTM and Yamaha, Allison was responsible for risk management, safety and security including track inspections, vehicle and fuel transportation sanctioned by the Federation of International Motorsports Association. Now at London Metropolitan University Allison leads an MSc in Project Management (International Project Management Association accredited), her research focuses on the micro-level elements of security, trust and intangibles, forthcoming in Martin Gill’s 2nd Handbook of Security. Allison is a volunteer technical committee member with the UK’s Cabinet Office and British Standards Institute on the Crisis Management Standard and with ASIS International on technical committees, with the Commission on Standards and Governance and as co-chair of the ASIS/ANSI (PAPFC-10-2011-092) Physical Asset Protection Management Standard.

Abstract
The world around us has changed and the role of security manager has changed with it. We can no longer consider ourselves just security managers, we are business managers entrusted with protecting and creating value for our organizations. How do we integrate security management tools into the overall approach for risk management in the organization? Using a systems approach with new standards can serve as our entry into the C-suite management team.