This program is full and we are no longer accepting registrations
Earn up to 14 CPE CREDITS
Do you have what it takes to succeed in this highly specialized field?
In today’s complex threat environment, the challenges to executive protection professionals—and to their principals—have never been greater. Corporate executives, celebrities, politicians, and other prominent individuals who require personal protection are counting on you to lead them safely through the inevitable risk-prone situations.
This comprehensive program covers the fundamental skills and procedures required to provide effective personal protection in this highly specialized field. Real case studies are used that reinforce the techniques and teach best practices.
Whether you're looking for a detailed introduction to the profession or a solid refresher course, you’ll benefit from this popular course.
- Learn executive protection’s underlying philosophies and the mindset that drives both the protection specialist and a professional protection program
- Understand what it takes to succeed in this highly-specialized field
- Develop benchmarks from an in-depth analysis of advance surveys
- Learn the critical significance of the choreography of protection
- Review real-world residential and workplace issues
- Examine domestic and international transportation security issues
- Learn counter-surveillance techniques and their application to modern protection methods
Who Should Attend
- Corporate security directors
- Professional's interested in EP's principles and practices
- Protective service practitioners interested in the concentric theory of protection
- Seasoned professionals transitioning into executive protection
- HR, security force managers, and others with personnel protection responsibility
- Newcomers to the field of protective services
This program offers an optional exam to demonstrate that attendees have met the essential course objectives. An additional exam fee applies.
Executive Protection Orientation: Rising to the Challenge
The complexity of modern society presents unique challenges to the work of executive protection specialists. We’ll examine these as well as look at the past to learn from our history to address these challenges.
Introduction to Executive Protection (De-mystifying EP)
This session dispels the negative view of the bodyguard and presents the concept of the executive protection specialist.
We’ll focus on automobile security—selecting the right vehicle, examining limitations and advantages, securing vehicles against attack, and conducting a proper search. Bullet-resistant vehicles and their components will also be covered.
Choreography of Protection
Learn the proper positioning required to support the concentric theory of protection.
The critical stage of the protective effort is the advance. Receive an in-depth analysis of the advance survey, pre-departure preparations, and more.
Advance/Choreography Practical Exercise - NEW
The class will be divided into teams to participate in exercises at nearby hotel sites. Using the advance checklist, your team will conduct the advance where you’ll apply learned principles.
Advance/Choreography Practical Exercise Review
Teams will report on and discuss the advance practical exercise conducted at the end of day one. A critique of the previous day’s work will prepare you for a full day of instruction.
Lone Gunman (Exceptional Case Study)
Understand the thinking and behavior of individuals who have attacked or approached prominent public figures in the United States and then discuss protective intelligence strategies.
Learn techniques that support the protective effort by watching the watchers.
Detecting Armed Adversaries (Characteristics)
Identify the characteristics of the armed gunman by learning how to tell if a person is carrying a concealed weapon—and whether that armed person is a friend (law enforcement) or foe.
Seven Deadly Sins of Executive Protection
Executive protection must be a key component in any corporate security program. To be successful, the program must be sustained and supported by the C-suite. Failed programs can be linked to EP’s “seven deadly sins” which will be identified and discussed. Learn what will derail an initiative and how to build a program based on best practices that will be supported by the top leadership in your organization.
The foundation of all protection programs is the formulation and analysis of the data and intelligence needed to establish a framework for the development of the protective effort.
Managing and Directing an EP Program
With its 24-hour operations, unpredictable conditions, multiplicity of details, and life and death stakes, executive protection shares many characteristics with the military and law enforcement professions. Examine the most critical leadership behaviors and how a good leader performs.
The only EP program offered by ASIS this year!
This program is full and we are no longer accepting registrations
Earn up to 21 CPE CREDITS
Learn proven methods for completing cost-effective facility security designs.
Integrating multiple security systems in a layered effect—including CPTED and architectural security, critical infrastructure protection, building designs, interior/exterior layout, intrusion detection systems, structural barriers, access controls, communications, and CCTV assessment—contributes to the protection of assets as well as the control and reduction of losses.
This intensive, three-day program led by leading security design architects, engineers, and operations experts offers a detailed, systematic approach to the design of a fully-integrated physical security program. Acquire solid recommendations for improving protection against terrorism, workplace violence, street crime, and other threats. Participation in a three-day case study—and an off-site security site visit— allow you to immediately apply new information and understanding.
Please Note: This program includes an off-site visit. The host organization may require the use of non-disclosure agreements. Agreements offered to nationals and non-nationals of the host country may differ.
- Transition from theory to practice to determine your security needs
- Analyze methods to reduce and control security project costs
- Examine multiple approaches to assess risks, threats, and vulnerabilities
- Gain a deeper understanding of the structured approach used by engineers and architects to design fully integrated security systems
- Master your ability to define security design requirements and select countermeasures and technologies that reduce risks and protect client assets
- Learn how to prepare and defend a security business case before management
- Identify effective project management techniques used to bid, enhance construction management, and implement security systems
Who Should Attend
- Architects, designers, integrators
- Security directors
- Practitioners responsible for their organization’s physical security controls
- Personnel directly involved in the design, specification, implementation, operation, or maintenance of security systems
Off-site Tour: Wrigley Field
Join participants and faculty for a private tour of historic Wrigley Field, home of the MLB Chicago Cubs. Assess and analyze security systems and operations using knowledge gained in the classroom during an exclusive, customized behind-the-scenes tour. Learn about Wrigley Field’s facility and operations, the primary security challenges that need to be addressed, and other unique considerations for the facility, including how they secure their staff and the public.
Learn how to integrate design and security systems. Create your own architectural and engineering design solutions based on a multi-story facility design practicum.
LEED and GREEN: Sustainability's Impact on Security
Learn how LEED 2009 and sustainability strategies will impact your existing or proposed building.
Designing to Resist Terrorist Attacks
Develop a basic understanding of how to cost-effectively approach the protection of your people and critical infrastructure. Learn how to evaluate the level of risk from terrorist attacks and the consequences.
Overview of Security Countermeasures and Their Selection
Examine how security countermeasures are derived from functional security design requirements. Learn how to build a layered security solution. Better understand security technology systems and their role in facility design and operation.
The Security Design Process
Learn to interface successfully with the design process by applying sound engineering analysis, project management skills, CPTED, and proven architectural security techniques. Develop a responsive design project on time and within budget.
Design Team Interfaces
Explore the roles and responsibilities of key members. Discuss techniques that ensure effective communication and coordination between team members and the various design disciplines and how to introduce requirements at the appropriate times.
Functional Requirements and Conceptual Design
Learn how the designer establishes security requirements and the desired level of protection. Discover how these evolve into a complete functional security design and are traced through the life of the project.
Security Program Integration
Gain exposure to the approach and techniques of systems integration that are applied during the design stage, and that culminate in a complete security program and master plan.
Security System Documentation
Review the major aspects of design documentation and learn how to manage the preparation of design deliverables.
Estimating the Cost of the Project
Learn to produce an estimate based on information gained from various sources that are in line with the functional design requirements and the basis of design.
Engineering Design Considerations
Understand how a security system design is developed and converted into a facility design solution.
Explore how to control costs by avoiding rework, achieving optimum equipment utilization, manpower reduction, and proper use of consultants.
Preparing and Presenting a Security Business Case
Discuss security’s contribution to a company's bottom line and examine how to successfully present and defend your security business case to management. Learn how to get approval and how to get a sufficient capital budget for implementation.
Managing Project Changes
Learn how to deal with the impact of the inevitable changes in requirements, scope, budgets, and/or changes in direction.
Completing the Process
Address procurement—the bid and selection process, evaluation criteria, successful bid negotiation, and project award techniques—before moving on to construction administration.
It is assumed that participants have a basic familiarity with CPTED, security equipment, and physical security.
Hotel, Fees and Schedule
Hyatt Regency Chicago
151 East Wacker Drive
Chicago, IL 60601
Make your reservation online at https://aws.passkey.com/go/ASIS2018SUMMERPROGRAM or call +1.888.421.1442 and refer to the ASIS Summer Program for the special room rate of $199 single/double (plus tax). This rate will be honored until 15 June 2018 or until the room block is full.
Delta Air Lines is pleased to offer travel discounts for ASIS International. To take advantage of these travel discounts, book your flights online or call +1.800.328.1111 and refer to meeting event code NMRV2 (Monday-Friday, 7:30 am - 7:30 pm CT).
- NOT ALL FARES ARE ELIGIBLE FOR A DISCOUNT
- Discounts apply to round trip travel only
- Not valid with other discounts, certificates, coupons or promotional offers
- Fare rules will determine eligibility
Please note: There is no service fee for reservations booked and ticketed via our reservation 800 number.