February 2014, No. 110

Hear what delegates, sponsors and exhibitors thought about ASIS Europe 2013

What the industry said
about ASIS Europe 2013:
2013 ASIS European Security Conference and Exhibits - Testimonials

An overview of the event:

Highlights from the 2013 ASIS European Security Conference & Exhibits

Quick Links



Register Now






Register Now 




In This Issue

  Security Risk Management as a Business Enabler




Early Rate for ASIS Europe 2014  Ends 18 February -- Register Now


Europol Headquarters Tour




2014 ASIS Membership Renewal 


Contribute to EuroDynamics and Earn CPEs 


Roy Bordes Award Application Now Open




ASIS Aegean Chapter Annual Congress


Security Research Initiative Launches Survey on Security Excellence




Deadline to Adopt Data Protection Regulation Postponed


ENISA Reports on Cyber Security for Smart Grids


 EU-Funded Project to Enhance Biometric Security Systems

Strengthening the EU's Response to Radicalisation and Violent Extremism  

ENISA Publishes Report on Industrial Control Systems 




ASIS/IE Business School Executive Education Programme: Learn to Be a Strategic Business Leader  


Application Period Open for University of Phoenix Full-Tuition Scholarships


 Global Agenda


Professional Development

Join Us on Facebook

ASIS 13th European Security Conference & Exhibition, The Hague, The Netherlands, 1-3 April, 2014

Like us on Facebook
ASIS 5th Middle East Security Conference & Exhibition, Dubai, UAE, 16-18 February, 2014

Like us on Facebook

Join Us on LinkedIn

Join the ASIS International Group

View our profile on LinkedIn 


Join the ASIS Europe Network

View our profile on LinkedIn 

Join the ASIS Asia-Pacific Network

View our profile on LinkedIn 


Join the ASIS Middle East Network

View our profile on LinkedIn 

President's Perspective

ASIS International's President Richard E. Widup, Jr., CPP, shares his unique insights on a range of membership and industry issues in his President's Perspective column. Read the latest here.

El Manual del Investigador Profesional ya está disponible en español


La guÍ­a explora temas necesarios para ser un exitoso investigador y prepararse para el examen Certificado de Investigador Profesional.

Did You Like This Issue?

The EMEA Bureau of ASIS International strives to increase the editorial benefit of this publication for members. We invite you to contact the editor to contribute feedback and make article submissions.

Updated Links and Resources

Take a look at our updated Links and Resources page. Please contact the EMEA Bureau if you have additional items to contribute.

ASIS International EMEA Bureau

For queries on ASIS European events, membership, benefits, resources, certification, or other topics, contact the EMEA Bureau at:

300 Avenue de Tervueren, 1150 Brussels, Belgium.

Tel: +32 2 645 26 74

Fax:+32 2 645 26 71 



European Links

Not Yet a Member?

The top reasons you benefit from becoming an ASIS International member:

- Unrivalled networking opportunities with more than 38,000 of your industry peers.

- Up-to-date information, including industry best practices, new technologies, and emerging trends. 

- A complimentary subscription to Security Management magazine, the leading security industry publication. 

- Opportunities to build a professional reputation and credentials.

- Tailored professional development programs to fit your specific career goals. 
- Advocacy of the security industry to the government and business communities.
- Board-certified, professional designations. 

- Members-only access to new career opportunities in security management. 

- Access to more than 300 peer-reviewed, security-related publications. 

- Discounts on program and ASIS Seminar and Exhibits registration, merchandise, and certification programs. 

 More Information..

New Chapters: Call for Volunteers

ASIS International seeks volunteers to help form new chapters in Iceland, the Baltic States, the Western Balkans, and other European countries that currently lack them.


For more information, contact the

EMEA Bureau or click here
 to download the procedures on forming a new chapter.

ASIS Published Titles Available for Amazon Kindle

Schedule Your Professional Development Now

A comprehensive calendar is available hereRegister early and save by taking advantage of early bird rates. Realise additional savings by booking your hotel room before the deadline. Plan ahead to get ahead  

Welcome to the 110th edition of ASIS International's EuroDynamics, the monthly newsletter for ASIS members in  Europe covering ASIS news, chapter news, and important European headlines.

The ASIS EMEA Bureau invites members to submit updates or articles to share with fellow members in Europe. Please note that board-certified professionals are entitled to up to 9 CPE credits per article.

The deadline for the next issue is 26 February.

Highlights of this issue: Christopher Aldous, CPP, PSP, explains why risk management is a business enabler. The adoption of the European Union (EU) Data Protection Regulation is not expected before the end of the year. EU's cyber security agency ENISA assesses threats for smart grids and makes recommendations. The Directorate-General for Home Affairs of the European Commission has adopted a communication identifying ten areas in which member states and the EU should to reinforce their efforts to prevent radicalisation and violent extremism.


Please add regionalnewsletters@asisonline.org to your personal address book or safe sender list to ensure correct delivery of your monthly newsletter. 

Message from the ASIS EMEA Bureau 

Dear ASIS member,

A technical issue has affected most of the links of the February edition of EuroDynamics.

We have the pleasure to inform you that this problem has been resolved.

We would like to apologise for any inconvenience caused by this issue and we hope that you will enjoy this edition.

Please do not hesitate to contact us if you have any question or comment.

Best regards,
The ASIS EMEA Bureau.

q1Security Risk Management as a Business Enabler


By Christopher Aldous, CPP, PSP

Risk management can be an effective tool to focus limited resources, demonstrate the worth of protective security, and enable businesses to grow.

Gone are the days when security professionals could put their finger in the air to test the wind, take a guess, and ask for a budget to support security operations. Nowadays, security, like all parts of a business, must demonstrate a methodology and rationale to receive its budget, and needs to build the business case to achieve this.

There are a number of standards such as ANSI/ASIS PAP 1-2012, ISO 31000: 2009, and ISO 73:2009 that can assist security professionals in defining security as a core part of the business through the establishment of the risk management function.

"You can't manage it if you don't measure it" is an old security adage. One key element of any risk management process is to understand the threats that might affect any organisation and its processes.

In a security sense, these threats are either natural -- earthquake or flooding, for example -- or manmade, such as criminal acts and breaches of company policy. Manmade threats normally take three forms: outsider, insider, or a mixture of both. A threat is anything that could adversely affect your business or the assets. Once the threats are defined, they must be applied to the business operation to identity where vulnerabilities exist. To do this, identify the likely parts of the organisation that could be affected. This produces a list of potential targets -- for example, fixed assets such as buildings and the services within, or they could be processes or procedures, such as a business banking process or an IT system. The key at this stage is to identify all the possible targets that could be affected should the vulnerability be exploited by a threat. Additionally, assets that might be shared with other organisations or that may become victims of threats of supply chains should not be forgotten.

Once threats linked to the targets have been identified, an impact rating should be assigned in case the vulnerability is exploited and a loss incurred by the business. It is important that as security professionals demonstrate the commercial value of the prospective loss, as this assists in gaining board-level understanding of the security-related risks associated with business operations.

This commercial indicator will highlight the areas where commercial resources need to be focused and where a decision is required to reduce the risk of a loss event occurring. The following are recognised mitigation concepts: 

  • Transferring the risk. Normally, this takes the form of insurance. Make sure the right amount of coverage is purchased.
  • Reducing the risk by installing protective security measures.
  • Avoiding the risk by stopping the activity.
  • Accepting the risk with the knowledge that the cost of mitigations are prohibitive.


When accepting the risk, care must be taken. If the threat could result in the loss of life, then the organisation must demonstrate it has done all that is reasonably practicable to reduce the risk.

Focussing on security risks through the use of internationally recognised methodologies helps prioritise where the organisations budget is best utilised to safeguard the defined assets. Without a focused approach, today's security professional will struggle to obtain the funding support risk reduction measures. 


Christopher Aldous, CPP, PSP, is director of Design Security.


c2ASIS Europe 2014


a1Early Rate for ASIS Europe 2014 Ends 18 February -- Register Now

Join ASIS at The Hague for the 13th European Conference & Exhibition
Join ASIS at The Hague for the 13th European Conference & Exhibition


Take advantage of this unique opportunity to join more than 500 senior security professionals who will gather in The Hague, The Netherlands, on 1-3 April, 2014.
Keynote Speakers:


Ivo Opstelten, Minister of Security and Justice, The Netherlands 


Wednesday, 2 April, 2014 - 9:00 - 10:00 




Organised Crime: The Scale of the Challenge facing Europe 

Rob Wainwright, Director, Europol


Thursday, 3 April, 2014 - 9:00 - 10:00 




Maritime Security


Ray Mabus, Secretary of the Navy, USA


Thursday, 3 April, 2014 - 16:40 - 17:30 




Six Reasons why you should be at ASIS Europe:

  1. Hear industry leaders from important companies and organisations speak about the latest developments, trends and innovations in security.
  2. Apply lessons learnt from other industries to your own sector.
  3. Connect with high-level security professionals from all over Europe and beyond.
  4. Become motivated by new ideas and information.
  5. Form new partnerships and connect with familiar faces in the industry.
  6. Get social and join discussions on Facebook, LinkedIn, and Twitter.

 Who should attend?

  • Security management professionals
  • Corporate executives in IT, supply chain management, strategic planning, and human resources
  • Representatives from companies that provide security solutions and technology
  • Law enforcement and fire protection professionals
  • Facility management professionals
  • Intelligence services and military personnel
  • Government officials (Justice and Home Affairs, Foreign Affairs, and Defence)
  • Academics
  • Consultants, vendors, and architects


Until and on18 February, 2014


After 18 February, 2014 and onsite

ASIS Members






Partner Organisation



Singe Day




 Like us on Facebook  View our profile on LinkedIn 

 z101Europol Headquarters Tour



ASIS International will partner with Europol at the ASIS 13th European Security Conference & Exhibition to offer a professional visit to Europol headquarters on 1 April, 2014.


Europol is at the heart of the European Union Member State's law enforcement major operations to combat international crime and terrorism. The agency supports investigations through the provision of unique intelligence and operational support capabilities. The core business of Europol is analysis of criminal intelligence.


Europol's new headquarters was officially opened on 1 July, 2011. The state-of-the-art building includes forensic labs and excellent meeting facilities purpose-built for the law enforcement intelligence agency. The building has a surface area of 32,000 square-metres and is situated in the international zone of The Hague, with neighbours that include the United Nations Criminal Tribunal for the former Yugoslavia, the Organisation for the Prohibition of Chemical Weapons, and the World Forum Convention Center.


Europol is engaging in several public/private partnerships via its outreach programme to connect with specialists, institutions, and companies outside law enforcement. Partners include other banks, credit card companies, pharmaceutical and chemical businesses, Internet providers, think thanks, NGOs, and leading practitioners. 



  • 15:45 -- Check-in at Europol HQ (passport required)
  • Tour of the building with focus on security
  • 16.30 -- A general introduction to Europol by Soren Pedersen, chief of media and PR
  • 17.00-- Presentation: Europol and public/private partnerships
  • 17.30 - 18.00-- Networking, with drinks offered by Europol 


  • If you have not registered for ASIS Europe please click here.
  • Once registered for ASIS Europe 2014, please send an email to europe@asisonline.org to register for the Tour. 


c3ASIS International News


d12014 ASIS Membership Renewal




It's time to renew your ASIS International membership for 2014. Don't let your member benefits become interrupted.


To renew, click on this link or visit the "My ASIS" section of the ASIS Web site; after signing in, select the "My Transactions" tab to see the dues renewal invoice. Your membership can be identified by the "Member Type" populated in the far right column. Please select the invoice and choose "Add to Cart."


For assistance, contact ASIS Member Services via e-mail at asis@asisonline.org or by phone at +1.703.519.6200 from 9 a.m. to 5 p.m. Eastern Time, Monday through Friday.


Stay connected in 2014. Renew your membership today.


a2Contribute to EuroDynamics and Earn CPEs 


ASIS International invites members to submit articles to be published in future editions of EuroDynamics.


Whether the topic is a case study about a facility, an analysis of new legislation in your nation, an article about mitigating threats a look at fresh opportunities for the security profession, or other items that spread practitioner knowledge and best practices with other ASIS members, we would be happy to receive it.

Board certified professionals are entitled to claim up to 9 CPE credits per published article.

General writing guidelines: 

  • Articles must be in English only.
  • Articles should not exceed 500 words.
  • If you would like to submit longer articles, please send a 500-word summary that will be published in the newsletter and on the ASIS European Web site with a link to the full article.
  • Sales or marketing submissions will not be accepted. 
Please contact the editor with questions or for more information.


z1Roy Bordes Award Application Now Open
The Roy Bordes Award for Physical Security provides the winning chapter with a customized, two-day, locally delivered, physical security education program. Established in 2008, the award pays the cost of instructors, their travel and accommodations, and collateral materials. Award funds are limited, necessitating that additional meeting expenses will be the host chapter's responsibility. All chapters are invited to compete for the award, however, preference will be given to developing chapters working to expand membership and educational offerings. Chapters may submit one application annually. The award application period ends March 11.


Please click here for more information. 
New ASIS PCB President: Blurring Lines Between Public, Private Sectors
ASIS Professional Certification Board (PCB) President Owen J. Monaghan says that one of his goals for his current term, which will run through the end of the year, is to increase the number of security professionals who are ASIS-certified. Monaghan, who is also the assistant police chief of the New York City Police Department and is the first active-duty police officer to serve as president of the PCB, says one reason why he wants to promote ASIS certification is because he has benefited from having a Certified Protection Professional (CPP) designation himself. Monaghan says that having this designation gives the private sector partners he works with in securing infrastructure, events, and venues the assurance that he is knowledgeable about security issues. Certification can benefit other security professionals as well, Monaghan says, because PCB's certs are kept up-to-date with changing skill sets and because they are relevant for any industry. In addition, security professionals who are certified have demonstrated that they have a "passion for knowledge" that is valuable in the workforce today, Monaghan says. 


Source: Security Director News


Please click here for more.


z100Chapter News


z102ASIS Aegean Chapter Annual Congress

Angelos Agrafiotis, ASIS Aegean Chapter chair and  Likourgos Argyriou, security supervisor, operational management department of CYTA HELLAS SA S.A 


The ASIS Aegean Chapter Annual Congress was held on Thursday 23, January, at the President Hotel in Athens.


The speakers at the congress were:  

  • Likourgos Argyriou, security supervisor, operational management department of CYTA HELLAS SA S.A, who made a presentation on information security.
  • Giorgos Karaivaz, ANT1 journalist, owner of bloko.gr, who discussed media and the police.
  • Athanasios G. Kokkalakis, police lieutenant colonel and former police spokesperson, executive member of the Center for Security Studies, whose address was titled "Organisations, Companies, and Safety Standards: The Interaction of Regular Communication During Emergency Management and Crisis."
  • Dr. Andreas G. Koutoupis, certified internal auditor, director and head of internal audit services, Mazars in Greece, who spoke on the role of internal audits in developing an effective safety nets for the corporation.


The presentations were well-attended by the members of the ASIS Aegean Chapter, security executives from various embassies and government security, private companies, and security and safety magazines.

At the end of the event, after networking time for the attendee, the speakers accepted honorary plaques for assisting the ASIS Aegean chapter in staging another successful congress. The coordinator of this year's event was Angelos Agrafiotis, ASIS Aegean Chapter chair.

z103Security Research Initiative Launches Survey on Security Excellence

Professor Martin Gill 


The latest survey under the umbrella of the Security Research Initiative has been launched. This year's theme is drivers of security excellence -specifically, what makes some corporate security departments and some security suppliers excellent at what they do, and what are the barriers for others?

Professor Martin Gill, who is heading the survey, asks that all those who work in any aspect of the security industry around the world to complete the online survey, which will take about ten minutes. Gill will provide those who take part with a copy of the results free of charge.

For more information, contact





Deadline to Adopt Data Protection Regulation Postponed

Euractiv reported on 24 January that the Data Protection Regulation will not be adopted before the European Parliament elections, which are set to take place in May.

The decision followed a meeting held on 22 January between EU Justice Commissioner Viviane Reding, the European Parliament lead negotiators on the package, the Greek EU presidency, and the incoming Italian EU presidency. The participants to the meeting agreed to set the deadline at year's end.

German Green MEP Jan Philipp Albrecht, who is steering the regulation through parliament, said the timetable aims at a mandate for negotiations in June and the beginning of interinstitutional negotiations in July. "If it will be possible to stick to this timetable, this would be good news and important," Albrecht said.

MEPs from the civil liberties committee adopted the Commission's proposal in October 2013 and were supposed to start negotiations with member states right away. However, member states failed to find an agreement on the occasion of a summit held in December 2013.

UK, Denmark, Hungary, and Slovenia want to turn the regulation into a directive. Unlike a regulation, a directive gives member states room to manoeuvre and interpret the EU law to their advantage.

Germany would like to postpone the adoption of this piece of legislation but for different reasons. The Germans support the regulation but do not want it applied to the public sector.

On the occasion of a previous meeting held in October 2013, member states agreed that the data protection package should be in place by the latest in 2015. 

Source: Euractiv

Please click here for more.

q3ENISA Reports on Cyber Security for Smart Grids 

The EU's cyber security agency, the European Network and Information Security Agency (ENISA) issued a report in December titled Smart Grid Threat Landscape and Good Practice Guide, which states that the "Smart grid is a de facto Critical Infrastructure, as energy is important for the well-functioning of the society and economy. Being the blending of the energy and telecommunication critical infrastructures, smart grids should operate securely and by respecting end users' privacy. Moreover, the protection of the smart grid is the key to energy availability."

Assessing threats to smart grids is crucial for their protection and is a key element in ensuring energy availability, the report notes. Secure governmental e-services are critical for society, e.g. health, procurement, and justice. Security is crucial for gaining the trust of the EU citizens who use these services. However, there are many security challenges to overcome to ensure their successful deployment.

This report analyses the threat landscape affecting smart grid components. It takes stock of available cyber security and protection approaches as well as good practices in the field. The study also lists internal threats affecting IT smart grid assets, including a variety of threats emanating from errors and insider attacks.  


Key conclusions:

  • Consider external and internal threats. In the area of cyber security, external cyber threats constitute the main source of external exposure. This cyber threat environment originates from threat agents who use cyber threats and launch cyberattacks.
  • Discover and classify smart grid elements that are exposed to threats. These can include electrical assets like cables, switches, routers, sensors, as well as software such as operating systems, services, hardware, infrastructure, and the systems operators themselves.
  • Use available knowledge. Use existing good practices after defining the level of desired protection.
  • List the specific smart grids cyber threats.
    • Information: Potential threats include information leaking, electro-magnetic/radio frequency interception, sniffer attacks, failures of devices and systems, and physical attacks.
    • Threat agents: Potential agents can be corporations, cybercriminals, employees, hacktivists, nation states, natural disasters, terrorists, and cyber fighters. 
  • Assess vulnerabilities and risks in smart grids. These assessments should be done by asset owners who best understand the complexity and interdependencies of the related smart grid infrastructure. 
Source: The European Network and Information Security Agency 

Please click here for more.

d7EU-Funded Project to Enhance Biometric Security Systems

The TABULA RASA, a consortium that comprises 12 organisations from seven countries, has researched the vulnerabilities of face, voice, and fingerprint identification software to develop countermeasures and, ultimately, a new breed of safer biometric systems. Their work is supported by an EU research and innovation investment.

Biometric systems have proven to be some of the most efficient security solutions available today. However, some biometric sensor vulnerabilities still exist, including some which have been publicised in the international media.

For example, the consortium has studied in depth the growing phenomenon of "spoofing" -- using everyday materials such as make-up, photographs, and voice recordings to subvert or directly attack biometric systems.

In the course of its research, the consortium hosted a "Spoofing Challenge," which invited researchers from around the world to develop attack plans to deceive various biometric systems. Participants showed that there are many different and creative ways to attack the systems.

The EU invested €4.4 million in the TABULA RASA project, which was used alongside a €1.6 million investment by the consortium to carry out the extensive research and testing involved.

The TABULA RASA research project has made an extensive list of possible spoofing attacks, evaluated the vulnerability of biometric systems to such attacks, and developed countermeasures that, for instance, detect signs of "liveness," such as blinking or perspiration, to improve the security of biometric systems.   

Source: European Commission Directorate-General for Enterprise and Industry  
Please click here for more.
q4Strengthening the EU's Response to Radicalisation and Violent Extremism

Terrorist and violent extremist activities have evolved and are a growing, significant threat within the EU. These activities are carried out not only by organised groups but increasingly by smaller groups or lone actors, now being driven by a wide range of sources. The use of online tools for recruitment purposes and to spread propaganda is increasing, in turn making violent actions harder to predict and detect. Furthermore, an increasing number of Europeans travel abroad to train and to fight in combat zones, becoming more radicalised in the process, and could pose a threat to our security upon their return.

On 15 January, the European Commission adopted a Communication identifying 10 areas in which member states and the EU are called to reinforce their actions to prevent all types of extremism that leads to violence, regardless of who inspires it. Proposed measures include the creation of a European knowledge hub on violent extremism, the development of training for frontline practitioners, and financial support for projects making use of modern communication tools and social media to counter terrorist propaganda. Member states are also asked to establish programmes making it easier for members of extremist groups to abandon violence and the underlying ideology. The ten recommendations are the result of two years of work in the radicalisation Awareness Network (RAN), founded by the Commission in 2011, gathering 700 experts and frontline practitioners from all over Europe.

Protecting citizens against these threats requires an approach that involves a broad range of partners at local, national, EU, and international level. To support member states' efforts to tackle radicalisation, the Commission is focusing on ten areas of action:  

  • Develop comprehensive national strategies. Member States are encouraged to put in place adequate frameworks, involving nongovernmental organisations, frontline workers, security services, and experts in the field, to facilitate the development of measures to prevent violent extremism and terrorism more effectively.
  • Create a European knowledge hub next year to establish and disseminate the best practices and shape the research agenda.
  • Build upon the work of RAN to strengthen its role and ensure that it can provide practical guidance to Member States where requested.
  • Develop and facilitate training for frontline practitioners working with individuals or groups at risk.
  • Provide disengagement and deradicalisation support programmes to members of extremist groups ("exit strategies") in every EU country.
  • Cooperate more closely with civil society and private sector to address challenges faced online.
  • Empower victims. Victims' voices are a powerful tool for prevention and deradicalisation, but only if victims feel comfortable with sharing their story and have the necessary support available.
  • Encourage critical thinking amongst young people about extremist messages.
  • Increase research into trends in radicalisation. EU funding will continue to be available to explore how and why people radicalise or deradicalise, and on the roles played by, for instance, ideology, internet-based recruitment techniques, and role models.
  • Work more closely with partner countries outside the EU. 
Source: European Commission Directorate-General for Home Affairs   
Please click here for more.
q5ENISA Publishes Report on Industrial Control Systems
On 23 January, the EU's cyber security Agency ENISA published a report on the next steps toward coordinated testing of the Industrial Control Systems (ICS) for European industries. The report stated that the testing of ICS is a concern for all EU member states and could be dealt with at EU levels.

IT is today being widely used by industrial control systems (e.g. SCADA) for energy, water, and transport. This is used to improve efficiency, achieve cost savings, and to enable the automation of processes. Unfortunately, this often comes with poor planning, lack of information, security configurations, as well as with the incorporation of both well-known and new, undiscovered, or yet unpatched "zero-day" vulnerabilities into ICS/SCADA systems.

ICSs may have a lifespan of more than 20 years. Therefore, they have traditionally been designed as independent systems, without sufficient security requirements. Consequently, they are not prepared to deal with current threats. Overcoming today's security gaps requires having a solid understanding of security -- for example, vulnerabilities, their origins, and frequency. Proper security assessments demand specialised tools and methodologies. The agency emphasises that there is a strong need for a specific strategy to define the objectives, the mission, and the vision for a testing coordination capability in the EU.


This research has led to 36 key findings and seven recommendations for both the public and private sectors, with a special focus on EU bodies:

  1. The creation of a testing coordination of capability under public European leadership and strongly supported by the relevant public and national authorities and the EU private sector.
  2. The establishment of a trusted and functional executive board to enforce leadership.
  3. The creation or involvement of specific working groups.
  4. The definition of a financial model that is suitable given the European situation.
  5. The conducting of a feasibility study regarding how testing should be organised.
  6. The establishment of collaboration agreements with other organisations dealing with ICS security.
  7. The creation of a knowledge management programme for ICS testing. 

Source: The European Network and Information Security Agency 


Please click here for more.


c6Education and Events


z110ASIS/IE Business School Executive Education Programme: Learn to Be a Strategic Business Leader


IE Business School, Madrid 


ASIS International will once again partner with Madrid-based IE Business School, one of Europe's leading business schools to deliver Effective Management for Security Professionals. This four-day executive education programme has been customised to introduce mid-to-senior level security practitioners to the dynamics of business fundamentals.

"The understanding of the 'bigger corporate picture,' and hence the business' security and risk management requirements, is key to implementing and managing an effective corporate security strategy, as well as ensure long-term support from senior management," states programme graduate Michael Otto, corporate security officer, Novartis International AG. "The programme and attendees' discussions provide guidance, as well as suggestions as to how best to achieve this objective."

Programme participants will develop a strategic understanding of the role of security management as an enabler of business success and acquire the knowledge and skills required to present a sound business case for their security initiatives.

The programme will take place 3-6 June on the IE Business School campus. Preview the programme and register to attend at 


  • €3.600 for ASIS members
  • €4.500 for nonmembers
Visit the IE Business School Programme Web site to sign up.
z2Application Period Open for University of Phoenix Full-Tuition Scholarships

Each scholarship will allow a prospective student to complete an undergraduate or master's degree programme through the College of Criminal Justice and Security at University of Phoenix. Recipients may choose to attend a University of Phoenix physical campus or the University of Phoenix online.

Applicants must meet all admission requirements for the university and maintain good standing throughout the term of their scholarship. The scholarship is open to security practitioners worldwide.

A committee comprised of members from the ASIS International Board of Directors, ASIS Foundation Board of Trustees, and the ASIS Professional Certification Board will review applicants and select the scholarship recipients.

Applications will be accepted through 15 April.

Please click here for more.

a22Global Agenda

16-18 February, 2014 -- ASIS 5th Middle East Security Conference & Exhibition, Dubai, UAE 

Registration is open!

13-14 March, 2014 -- ASIS 24th New York City Security Conference & Exhibition, New York, USA

Registration is open!


1-3 April, 2014 -- ASIS 13th European Security Conference & Exhibition, The Hague, The Netherlands
Registration is open!

5-6 May, 2014 -- 7th Annual CSO Roundtable Summit, Miami, FL, USA 

3-6 June, 2014 --  Effective Management for Security Professionals, Madrid, Spain

29 September - October, 2014 -- ASIS 60th Annual Seminar & Exhibits, Atlanta, GA, USA
a23Professional Development


Subscribe today and get all webinars FREE between now and 31 December, 2014!  


Upcoming webinars.


Webinar Archive  


This month highlighting: 

Full list of archived titles




Full list of programmes


Classroom Programmes and Webinars


2014 at a glance.

a24Chapter and Certification Events
Please click here to access the European agenda.

To unsubscribe please contact the editor