Earn Up to 23 CPE CREDITS
Transform Security Theories into Action
Your grasp of the fundamental concepts of asset protection is solid. Are you confident that you can now flawlessly execute this knowledge when confronted withever-increasing challenges?
In this course, nationally esteemed instructors guide you through real-life case studies and provide proven solutions, best practices, and field-tested strategies. Gain conceptual insights from various points-of-view on current trends and developing methodologies for successfully mitigating risks. The program addresses seven key aeras of concern every security expert must be well versed on to be successful.
- Learn strategies that create value within the business section
- Understand the various disciplines and how they integrate into security activities
- Discuss challenges facing security professionals and best practices
- Develop practical fact-finding skills for effectively communicating within an organization
Who Should to Attend
- Security executives and managers
- Individuals with direct or indirect responsibility for security—particularly human resources, facilities, and legal personnel
- Supervisors of security personnel and proprietary operations
- Professionals moving into security management positions regardless of experience
- Individuals transitioning from the public to the private sector
- Managers who oversee the discharge of security services and personnel
Employment Law for the Security Professional
Keep the law on your side and get answers to questions that matter. Focus on expanding your knowledge of employment law minefields—including EEO, ADA, ADEA, and FMLA—as well as issues of negligent hiring, retention, and training. Get updates on employment law decisions affecting all employees, with emphasis on cases involving security professionals.
Financial Forensic Investigations
Revolutionize your skills to locate, document, and recover assets effectively using public records and commercial databases and apply your findings via the legal system to effectuate recovery. Learn to apply the "badges of fraud" to recover fraudulently conveyed assets and become a profit center for your employer or clients.
Violence Risk Assessment
Move beyond the general structure of workplace violence programs and address the practical aspects of the behavioral underpinnings of violence. Learn about behavioral warning signs as well as practical assessment and intervention strategies that are grounded in both psychological literature and diverse experience. This session encompasses the ASIS/SHRM Workplace Violence Prevention and Intervention Standard.
Interrogation Techniques for the Workplace
Videotapes of actual interviews and interrogations are used to: discuss the interrogation process, beginning with how to initiate the confrontation; develop the theme; stop denials; overcome objections; and use the alternative question to stimulate an admission.
Investigations in the Workplace
Proper and ethical investigations are complex undertakings that are time consuming and fraught with enormous potential for legal liability. When done properly, they combine an intricate mixture of skill, experience, and luck. Few activities invoke so much risk and at the same time yield so much opportunity. Examine the intricacies of conducting proper and effective workplace investigations and review how to traverse the legal minefields and traps inherent in the process. Learn how to use the Process of Investigation® in order to yield the best results and obtain the highest ROI of time and resources.
Organizational Development for Security Professionals
Discuss concepts for applying behavioral science principles and practices in organizations as a means to increase individual and organizational effectiveness in security management. Then apply these valuable concepts through a case study exercise and interactive discussion.
Critical Success Strategies for New Leaders
Understand the importance of having an articulated strategic process when assuming a new leadership role. Discover sound methods to maximize your effectiveness as a leader by recognizing how your actions can influence organizational relationships and how you can diagnose the business environment.
Review what makes information valuable and why an organization should protect it. Discuss market leverage, support to mission, safety of personnel, ROI, protection of assets, regulations, and laws. Learn how to protect information in physical and electronic forms.
Michael Crane is an Illinois licensed attorney and private detective. He specializes in conducting security and behavioral threat assessments, and workplace investigations where allegations have been made by an employee against the company alleging harassment, discrimination, criminal activity, threats of violence, etc. He also conducts training in workplace violence prevention and active shooter response. Mike has held prior executive positions at Hillard Heintze and IPC International Corporation.
Dr. Cawood has worked in the areas of threat and violence risk assessment and management, behavioral analysis, violence prevention, security analysis, and incident resolution for more than 30 years. He has successfully assessed and managed over 5,000 violence-related cases for federal and state government agencies, universities and colleges, public and private corporations, and other business entities throughout North America.
Gene Ferraro has been involved in the study of organizational culture, governance, and compliance for more than 30 years. He is the author of fifteen books and frequently speaks and trains on the topics of effective human resource management, culture management, and unethical behavior in the workplace, as well as complex internal investigations. Gene is also the former Chief Ethics Officer of Convercent, Inc. and the founder of Convercent’s predecessor, Business Controls, Inc.
Bonnie Michelman has extensive leadership and security management experience in diverse industries. In her current role and as Security Consultant for Partners Healthcare, Inc., an organization comprising 13 hospitals, hundreds of offsite facilities, and a workforce over 100,000, she oversees a licensed Police Department as well as other departments. She has been an Instructor at Northeastern University, College of Criminal Justice in the Graduate and Undergraduate programs for over 20 years.
Marcia K. Thompson brings over 20 years of experience working in corporate and public sector positions that have helped to transform and create collaborative environments for employees at all levels. Marcia has a background as a trainer, facilitator, attorney, mediator, ombudsperson, fact-finder, leadership and conflict coach, professor, and conflict management practitioner and consultant.
Paul brings 25+ years of leadership in Security, Information Technology (IT), voice and data communications. In his current role, he provides second line oversight for the physical, personnel, and information security programs of the bank. A recognized innovative cyber security professional, he is responsible for 43 inventions resulting in 21 issued US Patents spanning the disciplines of cyber security, physical security, public safety, voice communications, and data communications.
A practicing attorney, professor, and expert in business law and ethics, Dr. Spain served as the General Counsel and the Chief Ethics and Compliance Officer at Manhattanville College, and for more than seven years was the University Counsel at Eastern Kentucky University. She taught business law and business ethics as a tenured Professor in the College of Business and Technology. Dr. Spain designed and spearheaded the first University-wide compliance effort as the Chief Ethics and Compliance Officer.
"The presenters were outstanding. The experience level and communication skill of each resulted in a great learning experience."
Ben Jacklin, Senior Manager Physical Security Operations, Harland Clarke Holding Corporation
Hotel, Fees and Schedule
Providence Marriott Downtown
1 Orms Street
Providence, RI 02904
Be sure to mention ASIS when requesting the special room rate of $179 single/double (plus tax). It will be honored until the room block is full or April 13, 2018.
Register before March 24th and save $100!
Member - $1295
Nonmember - $1595
Registration fees include daily continental breakfast, a networking reception, and refreshment breaks. Hotel costs are not included.
Sunday, May 6
Monday, May 7
Monday, May 7
8:00 am–5:00 pm
Tuesday, May 8
8:00 am–5:00 pm
Wednesday, May 9
8:00 am-5:00 pm
Thursday, May 10
8:00 am–2:00 pm
If confirmation of registration and payment has not been received three days prior to the event, please email email@example.com.
Certificates of Attendance
ASIS reserves the right to withhold certificates, if attendance requirements are not met.
While we welcome all registrations, including those on-site, the availability of handout materials cannot be guaranteed.
Business casual is recommended.
Continuing Professional Education (CPE)
Each 50-minutes of instruction is worth one CPE. This program awards up to 14 CPEs.
Alternate Registration Methods
If you prefer, you can register by phone +1.703.519.6200, fax+1.703.519.6299, or mail.
Cancellation and Transfer Policy
For a full refund or transfer credit, written requests must be received at least 10 business days before the start date of the program. Those received less than 10 days prior will be charged a $100 cancellation/transfer fee.
Transfers will be limited to a maximum of two per original registration. No refunds or transfers are made for requests received on or after the start date. Contact us at +1.703.519.6200 or fax your request to ASIS Member Services at +1.703.519.6298.
Tours of Third-Party Sites
When a program includes a visit to or a tour of a third-party site, the host organization may require the use of non-disclosure agreements. Subject to the requirements of the host organization, the agreements offered to nationals and non-nationals of the host country may differ.
Receive a 10% discount when three to five attendees register from the same organization, 15% for six or more. Email firstname.lastname@example.org for details.