Earn up to 21 CPE CREDITS
Learn proven methods for completing cost-effective facility security designs.
Integrating multiple security systems in a layered effect—including CPTED and architectural security, critical infrastructure protection, building designs, interior/exterior layout, intrusion detection systems, structural barriers, access controls, communications, and CCTV assessment—contributes to the protection of assets as well as the control and reduction of losses.
This intensive, three-day program led by leading security design architects, engineers, and operations experts offers a detailed, systematic approach to the design of a fully-integrated physical security program. Acquire solid recommendations for improving protection against terrorism, workplace violence, street crime, and other threats. Participation in a three-day case study—and an off-site security site visit— allow you to immediately apply new information and understanding.
Please Note: This program includes an off-site visit. The host organization may require the use of non-disclosure agreements. Agreements offered to nationals and non-nationals of the host country may differ.
- Transition from theory to practice to determine your security needs
- Analyze methods to reduce and control security project costs
- Examine multiple approaches to assess risks, threats, and vulnerabilities
- Gain a deeper understanding of the structured approach used by engineers and architects to design fully integrated security systems
- Master your ability to define security design requirements and select countermeasures and technologies that reduce risks and protect client assets
- Learn how to prepare and defend a security business case before management
- Identify effective project management techniques used to bid, enhance construction management, and implement security systems
"This course bridges the gap between the inspectors in the field and the physical security specialists at the headquarters level."
--Keith Creighton, Federal Protective Service
"Go! It is worth it for invaluable training."
--Christoper Powell, SCL Health
Who Should Attend
- Architects, designers, integrators
- Security directors
- Practitioners responsible for their organization’s physical security controls
- Personnel directly involved in the design, specification, implementation, operation, or maintenance of security systems
Assess and analyze security systems and operations using knowledge gained in the classroom during an exclusive, customized behind-the-scenes tour. Location to be announced
Learn how to integrate design and security systems. Create your own architectural and engineering design solutions based on a multi-story facility design practicum.
LEED and GREEN: Sustainability's Impact on Security
Learn how LEED 2009 and sustainability strategies will impact your existing or proposed building.
Designing to Resist Terrorist Attacks
Develop a basic understanding of how to cost-effectively approach the protection of your people and critical infrastructure. Learn how to evaluate the level of risk from terrorist attacks and the consequences.
Overview of Security Countermeasures and Their Selection
Examine how security countermeasures are derived from functional security design requirements. Learn how to build a layered security solution. Better understand security technology systems and their role in facility design and operation.
The Security Design Process
Learn to interface successfully with the design process by applying sound engineering analysis, project management skills, CPTED, and proven architectural security techniques. Develop a responsive design project on time and within budget.
Design Team Interfaces
Explore the roles and responsibilities of key members. Discuss techniques that ensure effective communication and coordination between team members and the various design disciplines and how to introduce requirements at the appropriate times.
Functional Requirements and Conceptual Design
Learn how the designer establishes security requirements and the desired level of protection. Discover how these evolve into a complete functional security design and are traced through the life of the project.
Security Program Integration
Gain exposure to the approach and techniques of systems integration that are applied during the design stage, and that culminate in a complete security program and master plan.
Security System Documentation
Review the major aspects of design documentation and learn how to manage the preparation of design deliverables.
Estimating the Cost of the Project
Learn to produce an estimate based on information gained from various sources that are in line with the functional design requirements and the basis of design.
Engineering Design Considerations
Understand how a security system design is developed and converted into a facility design solution.
Explore how to control costs by avoiding rework, achieving optimum equipment utilization, manpower reduction, and proper use of consultants.
Preparing and Presenting a Security Business Case
Discuss security’s contribution to a company's bottom line and examine how to successfully present and defend your security business case to management. Learn how to get approval and how to get a sufficient capital budget for implementation.
Managing Project Changes
Learn how to deal with the impact of the inevitable changes in requirements, scope, budgets, and/or changes in direction.
Completing the Process
Address procurement—the bid and selection process, evaluation criteria, successful bid negotiation, and project award techniques—before moving on to construction administration.
It is assumed that participants have a basic familiarity with CPTED, security equipment, and physical security.
Hotel, Fees and Schedule
Renaissance Seattle Hotel
515 Madison Street
Seattle, WA 98104
For hotel reservations, book your reservations online or contact the hotel directly at +1.800.546.9184 and reference “ASIS Education Week” to receive our special group rate of $189 per night (plus taxes and fees).
Register before 23 September and save $100!
Fees include daily continental breakfast, lunch on days one and two, a networking reception, and refreshment breaks. Hotel costs are not included.
Monday, 4 November
Monday, 4 November
8:00 am–5:00 pm
Tuesday, 5 November
8:00 am–5:00 pm
Wednesday, 6 November
8:00 am–5:00 pm
Thursday, 7 November
8:00 am–5:00 pm
If confirmation of registration and payment has not been received three days prior to the event, please email firstname.lastname@example.org.
Certificates of Attendance
ASIS reserves the right to withhold certificates, if attendance requirements are not met.
While we welcome all registrations, including those on-site, the availability of handout materials cannot be guaranteed.
Business casual is recommended.
Continuing Professional Education (CPE)
Each 50-minutes of instruction is worth one CPE.
Alternate Registration Methods
If you prefer, you can register by phone +1.703.519.6200, fax+1.703.519.6299, or mail.
Cancellation and Transfer Policy
For a full refund or transfer credit, written requests must be received at least 10 days before the start date of the program. Those received less than 10 days prior will be charged a $100 cancellation/transfer fee.
Transfers will be limited to a maximum of two per original registration. No refunds or transfers are made for requests received on or after the start date. Contact us at +1.703.519.6200 or fax your request to ASIS Member Services at +1.703.519.6298.
Tours of Third-Party Sites
When a program includes a visit to or a tour of a third-party site, the host organization may require the use of non-disclosure agreements. Subject to the requirements of the host organization, the agreements offered to nationals and non-nationals of the host country may differ.
Receive a 10% discount when three to five attendees register from the same organization, 15% for six or more. Email email@example.com for details.
ASIS International Event Code of Conduct
ASIS International (“ASIS”) is committed to providing a safe and welcoming experience for all event participants as defined below.
Any participant regardless of:
- Race or ethnicity
- Religion or political affiliation
- Gender, or gender identity or expression
- Sexual orientation, or
- Any other distinguishing characteristic
should feel welcome and safe at any ASIS event.
This Code of Conduct applies to all event attendees, presenters, exhibitors, sponsors, vendors, contractors, other service providers, and ASIS staff (“participant”) at any event, meeting, conference, forum, social event, or meeting-related event, including those sponsored by organizations other than ASIS but held in conjunction with ASIS events in which they participate (an “event”). As such, ASIS expects that participants at events will:
- Remain positive and welcoming to others
- Recognize that an event is a place for diversity of thought, organization, and individuals
- Be inclusive of others
- Be alert and report any discriminatory, harassing, aggressive, or exclusionary behavior or speech immediately to the contacts set forth below
- Respect the specific rules and policies of the event, and
- Otherwise uphold the reputation of ASIS
Unacceptable behavior includes, but is not limited to:
- Intimidating, threatening, harassing, abusive, discriminatory, derogatory, or demeaning conduct
- Inappropriate physical contact (e.g., unwelcome sexual advances, groping, sexual assault);
- Physical stalking or written, verbal, or other abuse, or
- Inappropriate use of nudity and/or sexual images or language in event presentations, or otherwise failing to obey any rules or policies of the venue or ASIS.
Whether such behavior constitutes unacceptable behavior as defined above shall be determined by ASIS and its representatives, in their sole discretion. ASIS takes matters of such unacceptable behavior in any form seriously.