Attendees are primarily mid- to senior-level management professionals from domestic and foreign industry and government including security/loss prevention management, executive management, other management (safety, human resources, and plant facility operations), active military/government personnel, architects and engineers, consultants, and law enforcement professionals.
Types of Presentations
Three to twenty-five sessions will be held concurrently. Sessions will be 60, 75, or 90 minutes in length. Topics requiring more time will be considered as a Part 1 and Part 2. Participants prefer interactive formats with a question and answer segment to lecture formats. The selection committee will, in part, evaluate the proposal on opportunities for exchanges among audience members and between audience members and the presenter. To view previously selected sessions please click (link to 2011 Seminar planner)
Sessions may be presented in a variety of ways to encourage interaction, such as:
- DEBATE - The audience is divided into groups to debate both sides of a topic.
- ROUND TABLE - A facilitator encourages the sharing of information within and among groups.
- MOCK TRIAL AND SITUATION - Create a situation such as a trial or investigation and have the audience plan or assess the process and outcomes.
- PANEL - A small group of presenters shares information with the audience, which might be asked to offer their views.
Role-Play - Individuals act out situations to illustrate points.
- LECTURE - Speaker stands before the audience at a lectern and delivers a presentation
Session Topic Areas
Sessions may fall into but not limited to the following topical areas (in no particular order):
- Application Security – Seminar Only, ISC2 topic
- Architectural Design/CPTED
- Cloud Security – Seminar Only, ISC2 topic
- Crime Prevention
- Crisis Management
- Critical Infrastructure
- Governance, Regulation, and Compliance – Seminar Only, ISC2 topic
- Homeland Security
- Information/IT Security
- Legal Issues
- Loss Prevention
- Mobile Security and Social Networking – Seminar Only, ISC2 topic
- Professional Development
- Physical Security
- Systems Integrator
Submit presentation proposal electronically. Note deadlines for each individual conference. You will receive an automatic confirmation e-mail once your proposal has been successfully submitted.
Length of Evaluation Process
The review process begins after the Call for Presentations has closed. The entire review and selection process takes approximately 6 weeks. You will be notified via email of your proposal's status.
All proposals go through a two-step review and selection process. Proposals will first be reviewed on-line by a diverse selection of members from all areas of the security industry. The review committee is comprised of seventy or more professional ASIS members. This initial review of proposals is evaluated on a six point scale on the following criteria:
The Final Selection Committee of less than twenty ASIS members will make the final selection based on the following criteria:
- Initial Review Score - the proposals' final score (out of 6) from the initial review and comments written by reviewers.
- Past Speaking History - speaker's history and evaluation scores at past ASIS events
- Appeal - the subject is important, timely, and is of interest to security professionals.
- Clarity of Proposal - session description and title are clearly defined. Proposal does not sell or promote a specific product, company, or individual.
- Diversity of Speakers - a variety of speakers including practitioners who bring different perspectives to a subject.
- Exhibitors - companies that are participating in the exhibit portion of the event (if applicable).
- Council Sponsored – proposals submitted by ASIS Council members or on behalf of a council.
One or more individuals may present a session. Consider partnering with corporate partners or other security practitioners who can provide different perspectives on your topic.
Honorarium and Reimbursement Policy
Registration or the day of your presentation is waived. Generally, ASIS International does not pay per diem, honoraria, or expenses.
How to Submit a Proposal
Proposals will be submitted online to ASIS. The entire four-step process must be completed for your submission to be considered complete and reviewed by committee. Please be accurate and avoid typos. If your proposal is selected this information will be used for publications. The online form requests the following information:
- Session Title - The title of your session.
- Webinar - Indicate whether you want your presentation to be considered for an ASIS webinar.
- Education Level - Indicate the educational level of the presentation (fundamental, intermediate, advanced)
- Session Length - 60 minute, 75 or 90 minute session.
- Summary - One sentence that describe the presentation content. This will be used in the final program to attract attendees. Limited to 30 words.
- Abstract - In 100 words or less, describe the theme and purpose of this presentation. One descriptive paragraph on the presentation that details the benefits of the session. If your proposal is selected, the information you provide will be the basis for conference publicity. Avoid jargon; clarity is paramount in describing what your audience will learn or be able to do at or after your session. The paragraph should contain no more than five sentences preferably beginning with an action verb. Text will be edited for use in conference materials. Please use the sample shown below as a model when drafting your paragraph.
- Learning Objectives – TEXT COMING
- Equipment - Indicate any audio visual equipment you will need for your presentation.
- Subject Matter - Indicate the subject area that the proposal will address.
- Presenter Information - Contact information and bio of all session presenters.
Sample Session Description
Identity Theft - Your Organization's Nightmare
Summary: Compromise of personal information is having a heavy impact on all organizations because of the increased potential of multiple lawsuits resulting from a minor compromise.
Abstract: Compromises by an organization of an individual's personal information can result in multiple $250,000 lawsuits which are typically paid out at $60,000 each. What if your organization compromises your employee, membership, or client data, or all three, and what would be the potential loss in revenue from lawsuits, and stock price as well as reputation? Learn how data is compromised in different organizations (i.e., schools, retail, government and manufacturing) and how to prevent it from happening. Explore solutions such as procedural, personnel, physical and technical. Analyze multiple case studies to be able to quickly implement solutions when you return to the office.
Five Cost Effective Steps to Handle Troubled Workers
Summary: Learn five critical steps to manage workplace incidents within any organization. Handle situations by phone or email and learn the art of obtaining a resignation in lieu of termination.
Abstract: Inadequate or unprepared workforce personnel responding to aggressive and violent workplace incidents is of concern. Hear from security directors who have used five rapid, effective, and proactive steps to handle potentially violent subjects and reduce the likelihood of problem behavior causing injury to yourself or others. See how the results demonstrate the transferability of this model to other security professionals. Learn effective responses to aggressive incidents in the workplace, important techniques for handling situations even by phone, and the art of obtaining a resignation in lieu of termination.
LEARNING OBJECTIVES - COMING