Course is Sold Out.
Earn up to 21 CPE CREDITS
Sponsored by American Military University
Learn proven methods for completing cost-effective facility security designs.
Integrating multiple security systems in a layered effect—including CPTED and architectural security, critical infrastructure protection, building designs, interior/exterior layout, intrusion detection systems, structural barriers, access controls, communications, and CCTV assessment—contributes to the protection of assets as well as the control and reduction of losses.
This intensive, three-day program led by leading security design architects, engineers, and operations experts offers a detailed, systematic approach to the design of a fully-integrated physical security program. Acquire solid recommendations for improving protection against terrorism, workplace violence, street crime, and other threats. Participation in a three-day case study—and an off-site security site visit— allow you to immediately apply new information and understanding.
Please Note: This program includes an off-site visit. The host organization may require the use of non-disclosure agreements. Agreements offered to nationals and non-nationals of the host country may differ.
- Transition from theory to practice to determine your security needs
- Analyze methods to reduce and control security project costs
- Examine multiple approaches to assess risks, threats, and vulnerabilities
- Gain a deeper understanding of the structured approach used by engineers and architects to design fully integrated security systems
- Master your ability to define security design requirements and select countermeasures and technologies that reduce risks and protect client assets
- Learn how to prepare and defend a security business case before management
- Identify effective project management techniques used to bid, enhance construction management, and implement security systems
"This course bridges the gap between the inspectors in the field and the physical security specialists at the headquarters level."
--Keith Creighton, Federal Protective Service
"Go! It is worth it for invaluable training."
--Christoper Powell, SCL Health
Who Should Attend
- Architects, designers, integrators
- Security directors
- Practitioners responsible for their organization’s physical security controls
- Personnel directly involved in the design, specification, implementation, operation, or maintenance of security systems
Assess and analyze security systems and operations using knowledge gained in the classroom during an exclusive, customized behind-the-scenes tour. Location to be announced
Learn how to integrate design and security systems. Create your own architectural and engineering design solutions based on a multi-story facility design practicum.
LEED and GREEN: Sustainability's Impact on Security
Learn how LEED 2009 and sustainability strategies will impact your existing or proposed building.
Designing to Resist Terrorist Attacks
Develop a basic understanding of how to cost-effectively approach the protection of your people and critical infrastructure. Learn how to evaluate the level of risk from terrorist attacks and the consequences.
Overview of Security Countermeasures and Their Selection
Examine how security countermeasures are derived from functional security design requirements. Learn how to build a layered security solution. Better understand security technology systems and their role in facility design and operation.
The Security Design Process
Learn to interface successfully with the design process by applying sound engineering analysis, project management skills, CPTED, and proven architectural security techniques. Develop a responsive design project on time and within budget.
Design Team Interfaces
Explore the roles and responsibilities of key members. Discuss techniques that ensure effective communication and coordination between team members and the various design disciplines and how to introduce requirements at the appropriate times.
Functional Requirements and Conceptual Design
Learn how the designer establishes security requirements and the desired level of protection. Discover how these evolve into a complete functional security design and are traced through the life of the project.
Security Program Integration
Gain exposure to the approach and techniques of systems integration that are applied during the design stage, and that culminate in a complete security program and master plan.
Security System Documentation
Review the major aspects of design documentation and learn how to manage the preparation of design deliverables.
Estimating the Cost of the Project
Learn to produce an estimate based on information gained from various sources that are in line with the functional design requirements and the basis of design.
Engineering Design Considerations
Understand how a security system design is developed and converted into a facility design solution.
Explore how to control costs by avoiding rework, achieving optimum equipment utilization, manpower reduction, and proper use of consultants.
Preparing and Presenting a Security Business Case
Discuss security’s contribution to a company's bottom line and examine how to successfully present and defend your security business case to management. Learn how to get approval and how to get a sufficient capital budget for implementation.
Managing Project Changes
Learn how to deal with the impact of the inevitable changes in requirements, scope, budgets, and/or changes in direction.
Completing the Process
Address procurement—the bid and selection process, evaluation criteria, successful bid negotiation, and project award techniques—before moving on to construction administration.
It is assumed that participants have a basic familiarity with CPTED, security equipment, and physical security.
Hotel, Fees and Schedule
Renaissance Seattle Hotel
515 Madison Street
Seattle, WA 98104
For hotel reservations, book your reservations online or contact the hotel directly at +1.800.546.9184 and reference “ASIS Education Week” to receive our special group rate of $189 per night (plus taxes and fees).
Reservations must be received on or before the cut-off date of Wednesday, 16 October to secure the discounted group rate.
Fees include daily continental breakfast, lunch on days one and two, a networking reception, and refreshment breaks. Hotel costs are not included.
Monday, 4 November
Monday, 4 November
8:00 am–5:00 pm
Tuesday, 5 November
8:00 am–5:00 pm
Wednesday, 6 November
8:00 am–5:00 pm
Jeff Lane, Integrated Solutions Specialist at ASSA ABLOY Door Security Solutions, is Chair of the Security Architecture and Engineering Council at ASIS.
Rene Rieder, Jr., CPP, PSP, Associate Principal with Arup, has more than 20 years of experience in the field of security design and consulting engineering. This includes comprehensive physical and electronic security system design of access control, video surveillance, and perimeter intrusion detection systems. Rene holds a Bachelor of Science degree in Electrical Engineering from Polytechnic University. His use of 3D and immersive design approach has been used for clients in the aviation transportation, cultural, and critical infrastructure sectors. Rene is the chair of the education subcommittee for the Security Architecture and Engineering Council at ASIS.
Mark Schreiber is a Security Engineer and Technical Consultant who has been in the industry for over 20 years. Mark is an ASIS International Certified Protection Professional (CPP), earned a CPTED designation (CPD), and has designed all forms of physical security systems across the globe, from door contacts to counter drone systems. Typical system designs are large campus, critical infrastructure systems that integrate complex access control, video surveillance, and perimeter intrusion systems for Fortune 500 clients. Through his experience and support of multiple ASIS Councils, Mark has presented at multiple ASIS Annual Seminars and ASIS trainings. In addition, Mark is an ASIS Council Vice President and Assistant Regional Vice President, past Chairperson, past ASIS Chapter Chairperson, and volunteer leader of several ASIS Councils, including the Security Architecture and Engineering Council, the Critical Infrastructure Working Group, and the Information Technology Security Council.
J. Kelly Stewart is Managing Director & CEO of Newcastle Consulting, LLC – a full service Enterprise Security Risk and Information Management Consultancy that provides proactive, predictive, and responsive advice and access to information critical in building companies' resiliency to operational risk. He has more than 30 years of public / private sector experience as a security advisor, subject matter expert, and former chief security officer with Fortune 500 and 1000 corporations focused on enterprise risk, strategic security, information, and protection management. Kelly currently serves as an ASIS Council Vice President and as an ASIS Standards and Guidelines Commission Board Member.
Randall Atlas, CPP, is a noted architect and criminologist. He received his Doctorate of Criminology from Florida State University, a Master's in Architecture from the University of Illinois, and a Bachelor of Criminal Justice from University of South Florida. Atlas is past chair of the ASIS Security Architecture and Engineering Council and is amember of the ASTM E54 Homeland Security Committee, the Florida Design Out Crime, the International CPTED Association, the International Society of Crime Prevention Practitioners, and the International Association of Counterterrorism and Security Professionals. Atlas is a nationally recognized trainer and author on crime prevention through environmental design (CPTED). He authored the book, 21st Century Security and CPTED in 2008, and a 2nd Edition was released in 2013.
If confirmation of registration and payment has not been received three days prior to the event, please email firstname.lastname@example.org.
Certificates of Attendance
ASIS reserves the right to withhold certificates, if attendance requirements are not met.
While we welcome all registrations, including those on-site, the availability of handout materials cannot be guaranteed.
Business casual is recommended.
Continuing Professional Education (CPE)
Each 50-minutes of instruction is worth one CPE.
Alternate Registration Methods
If you prefer, you can register by phone +1.703.519.6200, fax+1.703.519.6299, or mail.
Cancellation and Transfer Policy
For a full refund or transfer credit, written requests must be received at least 10 days before the start date of the program. Those received less than 10 days prior will be charged a $100 cancellation/transfer fee.
Transfers will be limited to a maximum of two per original registration. No refunds or transfers are made for requests received on or after the start date. Contact us at +1.703.519.6200 or fax your request to ASIS Member Services at +1.703.519.6298.
Tours of Third-Party Sites
When a program includes a visit to or a tour of a third-party site, the host organization may require the use of non-disclosure agreements. Subject to the requirements of the host organization, the agreements offered to nationals and non-nationals of the host country may differ.
Receive a 10% discount when three to five attendees register from the same organization, 15% for six or more. Email email@example.com for details.
ASIS International Event Code of Conduct
ASIS International (“ASIS”) is committed to providing a safe and welcoming experience for all event participants as defined below.
Any participant regardless of:
- Race or ethnicity
- Religion or political affiliation
- Gender, or gender identity or expression
- Sexual orientation, or
- Any other distinguishing characteristic
should feel welcome and safe at any ASIS event.
This Code of Conduct applies to all event attendees, presenters, exhibitors, sponsors, vendors, contractors, other service providers, and ASIS staff (“participant”) at any event, meeting, conference, forum, social event, or meeting-related event, including those sponsored by organizations other than ASIS but held in conjunction with ASIS events in which they participate (an “event”). As such, ASIS expects that participants at events will:
- Remain positive and welcoming to others
- Recognize that an event is a place for diversity of thought, organization, and individuals
- Be inclusive of others
- Be alert and report any discriminatory, harassing, aggressive, or exclusionary behavior or speech immediately to the contacts set forth below
- Respect the specific rules and policies of the event, and
- Otherwise uphold the reputation of ASIS
Unacceptable behavior includes, but is not limited to:
- Intimidating, threatening, harassing, abusive, discriminatory, derogatory, or demeaning conduct
- Inappropriate physical contact (e.g., unwelcome sexual advances, groping, sexual assault);
- Physical stalking or written, verbal, or other abuse, or
- Inappropriate use of nudity and/or sexual images or language in event presentations, or otherwise failing to obey any rules or policies of the venue or ASIS.
Whether such behavior constitutes unacceptable behavior as defined above shall be determined by ASIS and its representatives, in their sole discretion. ASIS takes matters of such unacceptable behavior in any form seriously.