Speaker Biographies

Speaker Biographies

Session 1

Sam Van Alstyne

Sam Van Alstyne is the lead strategist for IBM virtualization. He has a B.A. in Computer Science and an MBA in Information Technology from the University of Texas at Austin. He has been working with cross-platform virtualization technologies for five years. Sam started his IBM career as a software engineer developing device drivers for AIX. He's been a people manager, a program manger and worked extensively training ISVs on how best to exploit IBM's virtualization technologies.

Abstract

TBC

Session 2

Tyn Van Amelsfoort

Tyn holds a Bachelor degree in Logistics Management and is a passionate security professional since 2004 when he commenced his career with Acer at the EMEA head office in Switzerland. With Acer he was responsible for claims management, loss prevention and security management. In that role he performed risk assessment at manufacturers and logistics partners in Asia and Europe. The corporate security requirements have been established by Tyn.
In November 2007 he moved to Shanghai to establish loss control programs with McLarens Young International, a loss adjusting and claims handling firm. In that role he came across many different industries when performing risk assessments at facilities and routes for clients from all over the world.
Currently Tyn is the Greater China Security Training and Solution Manager and also responsible for security, investigations, export controls and business continuity for all facilities in Hong Kong which include offices, depots, warehouses and a regional aviation hub. Tyn is also the Aviation Security Manager for Greater China covering facilities in Mainland China and Taiwan. For a corporate fashion account he is responsible for all warehouse facilities and transportation security in the Asia Pacific region.
He is also the Treasurer of the Transported Asset Protection Association (TAPA) in Asia on a voluntary base; besides the treasury role he leads the Incident Information Service working group, participates in the Standards Committee and is a trainer for the FSR and TSR standards. His involvement in TAPA started in 2004 when he first joined the organization in Europe.

Session 3

 

Michael Foynes

As Senior Director Global Operations in Microsoft Global Security, Michael Foynes is responsible for development of regional teams, programs and initiatives spanning more than 100 countries and nearly 700 facilities. Operations remit includes; regional operations management, Global Security Operation Centers (GSOC), field operations services for global campuses, incident response, global events planning, travel safety and retail AP. In addition to Global Operations his team supports development, incubation and demonstration of the use of Microsoft, and Microsoft Partner technologies in delivering comprehensive and cost-effective physical security solutions on a global scale. This Microsoft Global Security Showcase supports product and solution sales requiring numerous customer facing demos and presentations predominantly in the government security sectors.
Prior to joining Microsoft in March 2003 he worked in a variety of roles providing strategic corporate consultancy, advice and support across a wide spectrum of industry. He has accumulated a wealth of international experience working in Europe, Middle East, Africa, Asia and Americas primarily in the areas of Risk Management, and Incident Response.
He holds a Master's degree in Risk, Crisis and Disaster Management. He is an elected Fellow of the Security Institute. He was also a member of the United Nations Interregional Crime & Justice Research Institute (UNICRI) Public-Private Partnership (PPP) Working Group "Protect Vulnerable Targets from Terrorist Attack". This initiative lasted nearly 5 years and resulted in the publication of a UNICRI PPP Handbook. This Handbook has been widely distributed to UN members including Interpol.
Industry memberships include:
  • The Security Institute
  • The American Society for Industrial Security (ASIS)
  • The Society for Risk Analysis (SRA)
  • The International Association for Counter-terrorism and Security Professionals (IACSP).
 

Abstract

Effective management of physical security using a security cloud to mitigate enterprise risk at a global Corporation presents opportunities and challenges, requiring a sound strategy aligned with business operations. As traditional security applications are transformed to on-demand services in the cloud, new capabilities are emerging to meet enhanced business and security needs. Because cloud technology can minimize or eliminate significant transaction costs, new, and more capable security functions are emerging. Hear about the impact on the physical security functions that a security cloud is having at Microsoft Global Security, as it scales and optimizes organizational agility and fiscal efficiency, to navigate the enterprise physical security landscape throughout 700 sites in over 100 countries and an ecosystem of 180,000 people.
 

Session 4

 

Pascal Matthey

Pascal brings over twenty years experience in the insurance industry. As a claims specialist and underwriter, he acquired extensive marine (cargo and specie) insurance experience, having held a variety of positions on both the broker and insurer side of the business. He also worked as an insurance and risk manager for an international industrial group prior to joining XL in 2007. In his current position, Pascal is a sought after risk assessment specialist, providing marine and specie customers throughout the world with risk assessment tools and solutions designed to enhance their supply chain security and assess the risks on large storage exposures.
A business studies graduate, Pascal initially trained as an officer in the Swiss Army with respect to logistic security before entering the world of insurance.
He was awarded his Swiss superior insurance diploma in 1991 and has a postgraduate diploma in enterprise-wide risk management (ARM-E), being a fellow of the Insurance Institute of America. He participates to the activities of the Transported Asset Protection Association (TAPA) promoting loss prevention along the supply chain to beat cargo related crime. In addition, he is a member of the American Society for Industrial Security (ASIS) and is a certified Physical Security Professional (PSP).
He is fluent in French, English, Spanish and German.

Abstract

In the recent past, the icelandic volcano eruption, the tragic events in Fukushima and the Thai flood hardly hit global supply chains. These events were like a wakeup call for all global companies to review their relevant exposures within their supply chain. Where enterprise-wide risk management is in place, the vulnerabilities arising out of the supply chain are often underestimated and not properly assessed. The industry claims for insurance solutions which are not available of the shelves but does oversee that supply chain and trade disruptions are mainly business risks which must be assessed and adressed. The presentation does want to highlight the needs for sdupply chain risk management and presents solutions on how to implement this into the global strategy discussing the threats and measures to prevent claims.

Session 5

 

Branden Williams

Branden has over fifteen years of experience in technology and information security with a formidable background in the majority of the technologies that drive today's businesses. After spending the first several years of his career working with education institutions and internet service providers to secure their infrastructures, Branden co-founded an IT consulting business that was later sold to a venture capitalist. He continued in this entrepreneurial spirit and worked with several of their portfolio companies to enable the growth of their business while securing the enterprise. From digging into technical requirements of various solutions to recommending compensating controls for compliance saving companies over $250 million, Branden has practical experience working with global, top named clients.

Sam Stahl

Mr. Stahl's experiences include Business Continuity, Disaster Recovery, COOP, and Emergency Response planning for a number of large and small organizations including the Las Vegas Metropolitan Police Department, American Express, Citizens Bank, Colorado Springs Utilities, IBM, US WEST, Qwest, the City of Scottsdale, First American National Bank, Denver International Airport, The Dial Corporation, and others.
His background includes developing Disaster Recovery, Business Continuity Planning, and Crisis Management methodologies, strategies, and national exercise programs. He has developed and managed projects within all of the areas of the standard recovery industry methodologies. He has a Masters Degree in Project Management and is a member of PMI, DRII, and the Association of Contingency Planners.

Abstract

Advanced Threats Require an Evolution of Your Security Strategy The cyber world is heating up, from Cybercriminals and Hacktivists to Nation States and arms brokers in a world organized cyber crime. The hype and speculation are high, but the answer lies in a marrying of core security principles and new techniques that focus on intelligence-led security. Effective security must be risk-based, agile, and provide context to explain how individual events relate to the bigger security picture. The stealth exhibited by today's cybercriminals is creating a challenge for many security teams to detect sophisticated attack patterns. Conventional approaches to information security are no longer sufficient. In order to combat today's sophisticated adversaries, an intelligence-driven approach is required to deliver IT trust and enable organizations to more effectively detect and mitigate advanced threats. By attending this session, you will learn about: The latest developments in the threat landscape The shift in target from technology to people How organizations are using intelligence-driven security to detect and mitigate advanced threats.

Session 6

Theo Surig

Theo Surig was born on the 12 december 1954. After high-school hestarted in 1973 to work for the Dutch Central Bank. Theo Surig worked in the Foreign department, studied psychology, worked in the HR Department and the Cash Department. Since 2008 he is appointed as Head of Security. He transformed the security of DNB into a state of the art security organisation. Theo Surig is member of CSO, HOS and Security Taskforce of the European Central Bank.

Abstract

Criminals and terrorists use the three gates approach to gain access to our companies assets and information. They attack our physical security measures (physical gate), they attack our IT security measures (logical gate) or they start working for our organization as an employee or vendor (human gate) and as such get automatic access to our assets. The only way to protect our companies against criminals and terrorists is a shared threat perception as a basis for security measures taken at all three gates. This presentation will explain the three gates approach and focus on our adversaries method of operation.

Session 7

Leonard Ong

 
TBC

&

 

Werner Preining

As a former merchant-marine captain, Werner Preining works in security since 1980. Joining ASIS in 1984, he became one of the first European CPP's in 1989. Werner specialized in high-end physical-security, Emergency / Disaster Management & IT security. His specialty within the IT-field are eavesdropping measurements. As former PPS he acquired a deep knowledge of demolition, including avalanches and underwater projects. In 2001 he joined the Crisis Management & Business Continuity Council and the IT-Security Council. Since 2006 he is the chairman of the Austrian Chapter 107. In 2009 he qualified as a CMAS, 2010 as a Lead Auditor ISO-28000.

Abstract

In many organizations, employees are provided with secured mobile and computing. In reality, Employees would bring their own personal devices that are unsecured and not subject to relevant controls. The practice is common and may have consequences on information asset, data privacy and competitive advantage.

Session 8

 

Steve Hawgood

Steve Hawgood arrived in Asia in 1984, joining the Hong Kong Police Force. His Police service included time in both the Criminal Intelligence and the Commercial Crime Bureaus where he was involved in a number of multinational investigations into Organised Crime, kidnap and counterfeiting. Leaving the Police in 1995 he then spent 5 years with a physical security company utilizing the skills of retired British Army Gurkhas and Chinese Military Service Corps officers, mainly within Hong Kong. Returning to investigations, he joined Microsoft in 2000 before taking up his current post with Eli Lilly in 2003, where is responsible for anti-counterfeit investigations in North Asia. He has held positions on the Hong Kong ASIS Committee, is a former Vice Chairman of the Quality Brands Protection Committee (QBPC) and has presented at various conferences, including APEC Senior Ministers meetings, on counterfeit issues.
 

Abstract

TBC
 

Session 9

 

Peter Sutton

As the Fleet Security Officer for Royal Caribbean Cruises, Peter travels extensively around the globe performing port security assessments and advising Port Facility Security Officer's on security operations for cruise ships.
Peter is an ISPS Code Lead Auditor with in-depth knowledge of maritime security. Peter is also a certified Company Security Officer, Ship Security Officer and Port Facility Security Officer with extensive experience in Australasia, Europe and the United States.

Abstract

This presentation is to help Port Facility and Terminal Security officers best prepare for cruise ship visits. It will also help stake holders in their bid to attract cruise ships to their port by providing a safe and secure port for cruise companies to send their ships. My purpose of the presentation is to help security proffessionals within the region be in a better position to handle cruise ship calls and the complexities that come with it. And ultimately help raise the bar to a higher level within the region.

Session 10

 

Tony Ridley

Tony Ridley is a leading international security professional with significant experience in enabling companies of all sizes to become more profitable, efficient and safer.
With years of experience in social media and online marketing, Tony helps companies understand the strength, threats and weaknesses of social media.
Using his experience with online marketing, Tony improves a company's ability to speak, listen and collaborate online. Providing a unique perspective, Tony is able to educate and develop a company's security, risk, marketing and communications departments on the benefits of using social media and other online marketing tools and processes.

Abstract

Your brand is in the hands of others. Your reputation is in the hands of others. People are talking about you everyday, whether you're aware of it or not. Social media provides access to just about anyone and an audience of millions, regardless of the accuracy. Join this detailed session on what every security and risk manager NEEDS to know on how to identify threats, measure results, monitor topics and create effective countermeasures to protect and support your business. Presented by security professionals, for security professionals.

Session 11

 

Douglas Florence

Douglas L. Florence Sr., CPP is a security, surveillance and gaming operations expert with over thirty-six years of security management experience, and is the Business Development Director for Global Gaming with Avigilon. He has over a decade of success working with leading manufacturers and integrations of CCTV in the digital video arena. He also was the VP of Security & Surveillance for the M Resort and the Executive Director of Security for the Hard Rock Hotel & Casino in Las Vegas, providing significant contributions to these properties surveillance & security operations. Douglas was also the Vice President of Gaming & Hospitality with API Pinkerton Gaming "APG" and the Business Development Manager for Gaming & Hospitality with ADT Tyco. During his career Douglas was the Director of Surveillance for The Mirage Hotel & Casino and has worked with KPMG Peat Marwick as a Manager for Corporate Security and Gaming in their Boston office. As an associate with Kroll Associates and Kroll-O'Gara, an international management-consulting firm in their Manhattan and Boston offices he was responsible for investigations in the corporate security environment. He is designated a (CPP) Certified Protection Professional by ASIS International.
Douglas has extensive security management experience within the gaming, retail; electronic security and private investigative fields. His professional experience spans over thirty years and includes over fourteen years of retail loss prevention with The Broadway, Macy's, Bullock's, Neiman-Marcus and Grand Central Stores; six years of electronic security consulting and over nineteen years as a California licensed investigator. During his tenure of service as the Director of Surveillance to the Rio Suite Hotel & Casino in Las Vegas, he was instrumental in the development of the surveillance and investigations' organizations still in operation there today and the development of their surveillance and security systems foot print. He also managed the retro-fit to upgrade the surveillance and security CCTV systems for The Mirage in 2001 that lead to their current digital video solution.
He has been an active volunteer leader within his community and the security industry, founding for ASIS International's Standing Committee on Gaming & Wagering Protection which is now in its sixteenth year of providing an educational resource to the industry, most notably the G2E. He served as Chairman for the first two years, successfully led the Committee to earn full standing status and was awarded Standing Committee Chairman of the Year 1998 by ASIS Int'l. The Gaming Protection Council as it is now called is comprised of Gaming Security Executives from all over the globe inclusive of Canada, Australia, England, the republic of South Africa, and of course, Atlantic City and Las Vegas, with representatives which include the Native American Gaming Industry, the Riverboat Gaming Industry, and the Cruise Line Industry. Douglas was also a past Vice President of the ASIS Int'l, National Foundation Board of Trustees. He is the Vice President of Affiliate Membership for the Int'l Masters of Gaming Law (IMGL, www.gaminglawmasters.com ) participating as a panelist for IMGL sponsored events in the US and internationally.
Douglas is frequently sought out for interviews and has had numerous articles published in gaming and security trade magazines. As an accomplished public speaker, he has presented seminars and instructional courses on the security and gaming fields. The Security Industry Association (SIA) has utilized Douglas' skills as a Judge for the New Products Showcase held at the International Security Conference (ISC) East in New York and West in Las Vegas, actively since 1994. He has been recognized within the security industry as a leader and has consistently contributed to the success of the companies who have employed him. "Keeping honest people honest" is his mission statement. He is a native of Las Vegas, Nevada.
 

Stephen Van Zwieten

Steve is an operational expert with over 30 years of experience in security and surveillance strategy and management. His experience includes:
Senior Regional Vice President of ASIS International for Australasia 2002-2009 and Chairman of the NSW Chapter.
Since 1995 a member of ASIS International Security, Gaming and Wagering Council
The founding Chairman of the Australasian Security and Gaming Council which comprises representatives from licensed premises and major casinos throughout Australasia (1996-2004).
Corporate security and surveillance Director for the Panthers Entertainment Group (1989-2004) where he established a highly professional level of totally integrated security management systems.
General Manager of Panthers Leagues Club (2004-2007).
Worked with senior police and gang squads to eliminate threats of violence from gangs frequenting the Mekong Panthers Club (2000).
General Manager ATMAAC International (2008-2009).
Current member of Australasian Security Professional Council (2008 – current).
Vice President and Board member of SPAAL (Security Providers of Australia Associated Limited) (2010 – Current).
Certifications:
Certified Protection Professional (CPP)
Board certified in security management by ASIS International, the world's pre-eminent society for security professionals.
Recognized as an industry expert and frequently sought after for interviews in relation to the security industry.
Accomplished public speaker who has presented at seminars and conferences both domestically and internationally.
A strong working relationship with senior Police built over many years is a huge advantage when it comes to:
- identifying crime trends and the reduction of crime at a client's premises.
- reduction of crime at the premises of the client
- having sufficient credibility to access authorities at senior levels.

Abstract

With the spread of casino gaming operations worldwide and specifically new emerging jurisdictions in APAC the knowledge of investigative practices in the casino gaming enviroment is required. Attendees will benefit from the experience of the panelists who will provide practices and use of modern day resources for dataveillance and HD video as evidence. These practices will include casino game protection, risk management, CCTV HD surveillance and investigations. As the demand for the IP integration of business solutions has brought new challenges forward the panelists will discuss methods in use today to achieve sucessful case resolution.

Session 12

 

Andy Williams

Andy Williams is a Senior Partner with Temi Group – a Global Security Risk Management Consultancy.
Prior to Temi Group, Andy was Head of Security for TDIC – a UAE government entity engaged in master development of $40 billion of: tourism, cultural, leisure, education, environment and investment projects in Abu Dhabi - with key responsibility for strategic direction of design, planning and operational implementation of security on all projects.
This appointment was preceded by 15 years in the hospitality industry, principally with Marriott International as a Regional Director of Loss Prevention covering UKI, Continental Europe, Middle East and Africa.
On the vocational front, Andy served as a Regional Vice President for ASIS International; is a member of The Security Institute, The Royal Society for Promotion of Health, a CPP Certified Protection Professional, Advisory committee member of CSARN and a former member of the European Institute of Corporate Security Management.
He has specialized security knowledge in relation to risk management, design development, crisis management and business continuity. Within the Public Private sector he has worked in liaison with: NaCTSO UK - The EU Council and United Nations Intelligence Crime and Justice Research Unit on projects relating to counter terrorism and security in public places.
Prior to working in the private sector he was a member of London's Metropolitan Police, working on crime squads in the North East London.

Abstract

Most companies have undertaken a business Enterprise Risk Assessment, however how much of the security risk element of an Enterprise Risk Assessment does the CEO really want to know.

Keynote Speaker

 

Chris Smith

Chris Smith has spent the past 25 years in the corporate security environment, in the UK, Africa, Europe and the Middle East. He has worked for international hotel groups and financial institutions. His current role in HSBC, as the Head of Security & Fraud Risk for Asia Pacific involves financial crime risk management, physical protective security, business continuity management, security intelligence and information risk management.
Chris is a Steering Group Member of the Asia Crisis and Security Group, Past Co-Chairman of the Asia Sister Banks Group, Past Chairman of OSAC (Hong Kong & Macau) and member of ASIS International. He is a Board Certified Protection Professional and has a master degree in crime risk management.

Session 13

 

Volker Wagner

Volker Wagner has been Chief Security Officer at Deutsche Telekom since 2008, with business security responsibility across 50 countries, covering >182 million customers, >250,000 employees and revenue >Euro 64 Billion. With over 40 security teams across the world, his main tasks are Corporate Security and BCM. In 2010, Volker Wagner completed the advanced course at the German Federal College for Security Studies. Previously, within Deutsche Telekom, Volker was a Head of Internal Audit and Chairman of various Audit committees. He also held managerial positions in Finance and Sales. Volker holds a Business Management degree from the University of Erlangen-Nuremberg.

Abstract

The security risks and threats faced by a typical organization have become so significant and complex that many security departments are struggling to keep pace. Whilst defending against terrorism, cyber attacks, fraud, data leakage and physical attacks we need also to be able to respond to and investigate incidents as they occur, and manage the recovery. This all highlights the growing need for convergence. We need to shift towards a holistic solution to security rather than clinging to a purely functional and departmental approach in order to improve our organizations' ability to manage the whole spectrum of potential threats and attacks as they emerge. Security must become a design principle, it must be a part of daily business, and it must become a shared responsibility. We must all pull the rope in the same direction for an efficient defence.

Session 14

John Philippi

John Philippi has spent his entire 23 year career in the Security & Fraud Risk profession. Having entered the independent security consulting industry directly out of college in 1989, John was responsible for managing security project around the globe, and across all industries; working his way from an entry level project engineer, into project management, consulting, and ultimately being responsible for the entire security consulting practice at a global architectural firm.
John's experience is complemented by his dedication and achievements in industry certifications and education. As a member of the American Society of Industrial Security (ASIS), he retains certifications as a Certified Protection Professional (CPP) and a Physical Security Professional (PSP). He has also obtained his master's degree in business and organizational security management from Webster University.
After 18 years serving the security consulting industry, John joined the private sector in 2007 as a Physical Security Technology Head for the world's largest financial institution where he was responsible for electronic systems technology in the North American region. After 2 years, John moved on to take responsibility for the overall Physical Security Risk function, to include operational aspects such as guard force management, workplace violence, traveller security, and employee vetting. In 2010 John relocated from the United States to India where he was responsible for the overall Security & Fraud Risk program for his company's global resourcing operation, managing Physical and Information Security Risk, Fraud & Investigations, Employee Vetting, and Contingency Risk. In June 2012, John took over the global Physical Security Risk program of his organization.

Abstract

The theme of the presentation would be the trend in electronic security technology. Whereas in the past, electronic systems were built in a silo'd fashion relying 100% on external vendors and a lot of analog technology, the future in electronic security systems is IP. Although everyone knows this, it is still unclear as to how best to move existing systems into an IP architecture. Further to that, planning for new IP systems is no easy task. The presenation will being with the advantages of leveraging IP for electronic security systems; the "why". The main focus will be on the key areas of electronic security systems: 1. Access Control, Alarm Monitoring, and Badging. 2. Security Video. 3. Security Audio. Each of these systems will be reviewed from 2 standpoints: 1. How to migrate the existing systems into the IP environments. 2. How to design new systems from an IT environment standpoint. The presentation will conclude with the key challenges of implementing the discussed design principals. This presentation will not be based on "theory" or futuristic technology and design. All of the architectures, design principals, and solutions will represent how at least one global company is approaching their deployment of electronic security systems. The purpose of the presentation will be to share this experience.

Session 15

 

Malcolm Smith

Malcolm is an accomplished security professional with over 25 years experience in the security field. He is currently the Head of Security Africa for Diageo plc, where he is responsible for developing and implementing security strategy across the Company's operations in Africa. Prior to joining Diageo, he was the Regional Security Manager for Shell in Sub-Saharan Africa, and Head of Security for Old Mutual South Africa. Malcolm began his professional career in the South African Defence Force; he served as Unit Head with the Directorate of Special Operations (Scorpions), and also worked as Security Consultant with General Electric in Iraq and Kuwait.
Malcolm holds a Bachelor of Laws degree from The University of South Africa; Post Graduate in Business Administration; 3-Year Diploma in Security Risk Management; and Diploma in Project Management. He is also a Certified Protection Professional (CPP).
Malcolm has a keen interest in the global business environment, corporate governance, change leadership, performance measurement systems and operations strategy. He is currently doing his Masters Degree through UNISA. Malcolm is a Fellow (Fsyl) of the UK Security Institute, and serve as the Regional Vice President for ASIS Region 43.

Abstract

There isn't necessarily one right way to lead change successfully. It depends on a multitude of things such as the nature, scale and size and urgency of the change, the context in which change occurs, the organizational culture and the organization's track record of change. Whatever the security executive's approach to change it is useful, if not essential, to have a conceptual framework in which to consciously manage change. The security executive need to understand what needs to be planned and what can emerge. This case study presentation will enable participants to integrate and convert their own and others' leadership insights and practical experience into the way they lead within a world of constant change, both as an individual, unique security leader and collectively, utilizing the diversity of leadership colleagues.

Session 16

 

Richard King

This presentation is based on my 20+ years system integration experience. Having worked my way through from an electronic security installer through to enterprise system design and supply with Honeywell, then after furthering my education i transitioned into a global role for protective security with the Australian airline Qantas. While working at Qantas i became interested in ASIS articles and presentations and went on to Join ASIS NSW, to complete my CPP and although i have now moved in to the finance sector as a global security advisor for Macquarie Bank. I am proud to be a CPP and still chair the NSW chapters CPP certification program every year.

Abstract

This is a presentation based on my personal experiences delivering remote ID solutions. Years of delivering these type of single card solutions across the corporate networks has provided me many valuable lesson in what is necessary, What you can't be successful without and of course some pitfalls that can be easily overcome with some advanced planning. This presentation is a guide to achieving successful deployment of any server based building technology on the corporate or enterprise network environments. While there are obvious technical hurdles that need to be addressed this presentation is based on the process and workflow management processes and issues arising from them rather than a hardware related discussion.

Session 17

Torsten Wolf

"Torsten Wolf is the Group Head of Crime and Fraud Prevention for Zurich Financial Services. In his role he leads the Group's efforts to prevent, detect and respond to non-claims related crime and fraud that is directed against Zurich. Torsten looks back on more than twenty years in the insurance industry where he worked across personal lines and large corporate business. Torsten is a Certified Internal Auditor and holds a Degree in Business Studies and Economics as well as a Master Degree in Business Administration."

Abstract

The session will focus on the execution of an anti-crime framework in a multinational insurance organization. The purpose of this presentation is to provide the audience with an insight into the criminal and fraudulent activities an insurance carrier is exposed to; the focus will be on the less visible and publicized crime perpetrated by own staff and third parties and explicitly excludes the area of claims fraud. To address these risks a comprehensive arsenal of tools is required to be developed and deployed. The intention is to share the approach Zurich has chosen to protect itself from crime and fraud.

Session 18

Steve Vickers

During some 18 years in the private sector, Steve has conducted numerous sensitive business intelligence projects, major financial investigations, international asset searches and crisis containment assignments. He has also led a number of crisis management teams faced by financial or other critical threats to multi-national corporations.
He has considerable experience in advising corporations facing special risk situations and in dealing with challenges presented by money laundering; he is an acknowledged authority on the gaming sector in Macau and on Triad Societies and Asian Organised Crime issues.
Steve previously spent 18 years in the Royal Hong Kong Police Force and commanded the Force's Criminal Intelligence Bureau. His duties included operational command of the Intelligence Bureau and its covert resources; tactical and strategic operations against Triad and Organised Crime groups, risk assessments and operational control of "declared" kidnapping incidents and product contamination issues. He achieved the rank of Senior Superintendent before opting to leave the service to join the private sector.
Steve has handled more than 28 kidnapping incidents which have ranged from short term, domestic cases, through major international incidents involving multiple jurisdictions.
Steve speaks fluent Cantonese and has had extensive experience in various specialist units – including in the Commercial Crime Bureau and in the Police Tactical Unit. He has operated extensively in Southeast Asia, frequently working with government agencies.
His expert opinion on security matters is regularly sought by international media and he has lectured widely.
Steve is a member of the International Institute of Security.

Abstract

TBC

Session 19

 

Jenny Reid

Jenny Reid, currently the owner of iFacts, is a pioneer of methodologies used to ensure executives and employees are secure in their environment and companies have honest, ethical, loyal and productive employees.
Jenny started in the security industry in 1995 and worked her way through the ranks, ultimately becoming the Managing Director of Griffiths Reid. Through her leadership, the company flourished from merely an investigations organisation into a security solutions corporation. They were the first supplier of independent security solutions ensuring that loyalty was always to the client and not the supplier of the security service. In 2009 Jenny bought iFacts and developed a purely screening company into an organization providing comprehensive services to ensure employees are safe and secure as well as honest.
Jenny is constantly looking for new and innovative ways to ensure companies maintain true value in their organisation and enhance it. 2010 was no different, with Jenny having brought the first online integrity test, from Israel, to South African shores. This test will provide a very cost effective method of helping companies employ honest staff members.
Jenny is currently the President of the Security Association of South Africa where she was the first female to hold the rank of President in 40 years.
 

Abstract

You will learn well-proved data analytics workflows, including - understanding - cleansing - optimizing - analyzing your data and - reporting the results (Fraud) investigations may have different targets, such as gathering information, finding, disproving or emphasizing evidences, identifying types of modus operandi, patterns, geographical relationships or trends. Data may have different sources, i.e. communicational, transactional, financial, forensic, sales data like eBay auctions. You will discover why it is crucial to understand the background and relationships between data and explore solution approaches, i.e. applying smart tools. You will find out how to establish workflows for recurring tasks to make your investigations more efficient and effective.
 

Session 20

 

Totti Karpela

Senior sergeant (ret.) Karpela has a 20-year history as a law enforcement officer. During his career, sgt. Karpela has worked with tactical units, hostage negotiations and for the past 10 years as the subject matter expert in threat management and workplace violence prevention. Mr. Karpela lectures globally on topics related to workplace violence prevention and are the owner of the largest threat management training company in Finland. Mr. Karpela has also worked as a specialist for the European Council in threat management. He has been trained organizations such as Gavin De Becker Inc, F.B.I. and U.S. Secret Service.

Abstract

Gatecrashers in the public events, pie attacks, ink and paint thrown at the principal or a demonstrator or a fan locks himself to the principal with handcuffs. All incidents might seem harmless to the general audience, but for any security professional the represent total failure in the protective duty. The target is often embarrassed and ridiculed, the incident might stop the event, causing loss of face in the media and even in the eyes of the investors and owners, but they also demonstrate to terrorists and single operators the weaknesses of the protective detail. We will also look at how these suspects have told about their methods in the past. The presentation will cover several past incidents; give advice on how to prepare for these situations and how to professionally respond to the situations once they take place. Also, the participant will get information on how to prepare the client for these incidents.

Session 21

 

Bruce Braes

Bruce offers over 30 years of diverse international experience in risk, crisis, emergency, security, business continuity, disaster recovery and general business management. He held positions in Southern African law enforcement and intelligence services, prior to entering the commercial sector and operating across Africa, Europe and Asia Pacific providing services to blue chip organisations. Bruce holds the Certified Protection Professional and Certified Security Consultant certifications; he is a Fellow of the Security Institute, a Member of the Risk Management Institute of Australasia, an Associate Member of The Business Continuity Institute and lectures at Edith Cowan University's School of Computer & Security Science. He is currently undertaking a PhD in Organisational Resilience. He has presents nationally and internationally on organisational risk and resilience.

Abstract

Recently OECD countries have attempted to stamp out the corrupt practices of government officials in developing nations through the introduction of legislative tools designed to prosecute companies found to have engaged in what are deemed to be "corrupt practices". More recently these laws have been strengthened and given more "teeth" as first world governments pursue a path of ethical development. That said, it is noted that few prosecutions of company officials under these laws have been successful and certainly no foreign recipients of "bribes" have faced the wrath of these laws. That said do these legislative mechanisms actually prevent corrupt practise occurring? More importantly taking into consideration that many emerging nations have not embraced these principles, how can companies ensure they do not fall foul of the stringent requirements of these laws. Remaining competitive is becoming increasing onerous, whilst minor contraventions can result in prosecution under the increasingly rigorous enforcement regimes now in place. Cleaning up customary business practices, initiating systematic process and robust frameworks is the only way forward.
 
 

Session 22

 

Damian Comerford

Damian has been working within the Retail Loss Prevention industry for more that 20 years having first joining the industry at a floor level position to now holding the senior most level position in Loss Prevention with Australia's largest office supplies multi-channel retailer. He joined Officeworks in January of 2011 after previously holding senior positions within such global organisations as OfficeMax Inc and within the Australian based Coles Group of retailers.
In his current role Damian is directly responsible for both the strategic development and operational leadership of organisations Loss Prevention and Shrinkage Reduction program.

Abstract

Retail Security & Loss Prevention functions have traditionally built their programs focusing on Shrinkage and Crime reduction, rarely taking into consideration the key factors that make a retailer successful in a very competitive global environment. Based on the 'Retail Pentagon & Triangle" framework of successful retailers, the 'Retail Loss Prevention Pentagon & Triangle' provides a framework for the retail Security or Loss Prevention professional to develop a program that not only supports the effective reduction in the traditional measurements of Shrinkage & Crime Reduction, it provides the tool in which they will be able to communicate to their business and key stakholder on how they are going to support them as retailers. Furthermore, it provides the Security or Loss Prevention professional a manner in which to measure the success (or failure) of their program in terms of accountability to deliverables and internal stakeholder engagement.
 
 

Session 23

 

Christoph Rojahn

Dr. Christoph Rojahn is an investigations and intelligence specialist with Deloitte AG in Switzerland. He is a graduate of the universities of Oxford, Birmingham and Munich as well as the ASIS/Wharton Program for Security Executives. He was previously responsible for internal investigations and security threat monitoring of one of the world's largest financial services providers. Dr. Rojahn has worked for several specialized consultancy firms as well as the German foreign intelligence service. He is ASIS RVP - Region 28 and has lectured and published extensively on issues like investigations, intelligence and terrorism.

Abstract

Prevention and detection of as well as responding to suspected cases of crime is one of the core functions of most corporate security functions. While there is widespread agreement that issues like internal fraud have a considerable impact on business, potential breaches of the US Foreign Corrupt Practices Act and the more recent and so far less established UK Bribery Act 2010 pose a significantly higher risk to corporations, largely due to two major aspects. On the one hand, companies are legally obliged to prevent illegal or unethical behavior according to Western standards irrespective of local conditions where they operate. On the other, fines levied for breaches of the FCPA are significant and continue to rise. This presentation will provide an introduction to the FCPA requirements, focusing in particular upon the areas where the corporate security function can play a role in dealing with suspected breaches. It will also include a discussion of comparable UK legislation, highlighting the differences that are likely to be of importance to companies with existing FCPA compliance programs.
 
 

Session 24

 

Dr Marc Siegel

Dr. Marc Siegel is the Commissioner heading the ASIS International Global Standards Initiative. He represents ASIS International at the International Organization for Standardization (ISO) and at regional and national standards forums. He works with ASIS International and national standards bodies on five continents to develop international and national risk management, resilience, security, preparedness, and continuity standards as well as provides training on their implementation. He is a RABQSA International certified Security Management Systems - Business Improvement Lead Auditor, as well as a certified Trainer and Skills Assessor for the ISO 28000 – Security in the Supply Chain Lead Auditor Certification Program.

Abstract

Private Security Service Providers including Private Security Companies (collectively "PSCs") play an important role in protecting state and non-state clients engaged in relief, recovery, and reconstruction efforts; commercial business operations; diplomacy; and military activity. The ANSI/ASIS.PSC.1-2012 Management System for Quality of Private Security Company Operations - Requirements with Guidance standard provides the principles and requirements for a Quality Assurance Management System PSCs to provide quality assurance in all security related activities and functions while demonstrating accountability to law and respect for human rights. State and non-state clients are requiring conformance to the standard for contracting. How will this affect the way you do business? What do you need to do to come into conformance with the standard? How can using the standard serve as a differentiator for your company?

 For Further Information

Please Contact:
ASIS International EMEA Bureau
Tel: +32 2 645 26 74
Fax: +32 2 645 26 71
asiapacific@asisonline.org
www.asisonline.org
www.asisonline.eu