Top-notch security education comes to Atlanta in June. Don't miss your chance for hands-on training to stay up on the latest trends in the profession.
Explore courses in:
Top-notch security education comes to Atlanta in June. Don't miss your chance for hands-on training to stay up on the latest trends in the profession.
Explore courses in:
Earn up to 14 CPE Credits
Enterprise Security Risk Management (ESRM) is a strategic security program management approach that ties an organization’s security practice to its mission and goals using globally established and accepted risk management principles. In this two-day course, you will explore the philosophy of ESRM, learn how to implement or transition to an ESRM-based security organization, and participate in practical exercises designed to help you develop and present security solutions with an ESRM approach.
Implementing ESRM - The Basics
In this session we will walk through the steps of the ESRM life cycle and discuss the processes involved in setting up a security program that aligns with the ESRM approach. We also cover the essentials for ESRM success.
What Is Your Role in ESRM?
Explore the ESRM view of the security leader’s role in the organization to ensure their internal business leaders understand security risks and tolerances and have sufficient information to make business decisions around implementing security risk mitigation programs.
Exercise: In the Beginning
You and your team will be introduced to a fictional organization for which you will develop an ESRM solution. You will have an opportunity to ask questions of the company executives to learn about the organization, your new business partners, and their concerns.
Transitioning to an ESRM Approach
In this session, we will look at the steps to transition from a traditional, tactically focused security management program to a strategic, risk-focused security program approach.
Security Governance - an ESRM Approach
Examine various options for how organizations might choose to govern their security programs in an ESRM implementation, ranging from executive sponsorship to extended security councils.
Exercise: Building the Base
Discuss potential security governance models with your team and draft a security policy and governance charter for your new program.
Manage Your Security Department Through ESRM
Explore how to manage a security department or program through ESRM. Items for discussion include skills needed by your team, potential structures and team roles, and aspects of the security budgeting process.
Risk, Data, and Metrics
Learn how to present reports and metrics that can lead to a better understanding of the state of security risks in the organization. Different types of reports for different audiences also will be explored.
Exercise: Developing a Risk Management Response
In this group exercise, your team will be presented with a security threat facing the organization. You’ll discuss as a team and come up with potential risk mitigation recommendations.
Lunch and Working Break
Talking Security Risk with Executives
In this session, we will explore ways to have factual, not fear-based, discussions about security risk with business executives. Tips and tricks for presenting to a senior executive audience also will be covered.
Exercise: Presenting the Case
This is your opportunity to present your risk management-based security solution to your company executives and receive feedback on how the presentation aligns with the ESRM philosophy and ideals.
Earn up to 14 CPE CREDITS
--The only EP program offered by ASIS this year!
In today’s complex threat environment, the challenges to executive protection professionals—and to their principals—have never been greater. Corporate executives, celebrities, politicians, and other prominent individuals who require personal protection are counting on you to lead them safely through the inevitable risk-prone situations.
This comprehensive program covers the fundamental skills and procedures required to provide effective personal protection in this highly specialized field. Real case studies are used that reinforce the techniques and teach best practices.
Whether you're looking for a detailed introduction to the profession or a solid refresher course, you’ll benefit from this popular course.
“The speakers are true subject matter experts and both really hit home, not only what it takes to be a great EP professional, but the mentality required to sustain a career in the field. I'd absolutely recommend the course to anyone interested in getting involved in EP.”
--Nicole Rodriguez, Sr. Manager of Security Culture, WeWork
This program offers an optional exam to demonstrate that attendees have met the essential course objectives. An additional exam fee applies.
Executive Protection Orientation: Rising to the Challenge
The complexity of modern society presents unique challenges to the work of executive protection specialists. We’ll examine these as well as look at the past to learn from our history to address these challenges.
Introduction to Executive Protection (De-mystifying EP)
This session dispels the negative view of the bodyguard and presents the concept of the executive protection specialist.
We’ll focus on automobile security—selecting the right vehicle, examining limitations and advantages, securing vehicles against attack, and conducting a proper search. Bullet-resistant vehicles and their components will also be covered.
Choreography of Protection
Learn the proper positioning required to support the concentric theory of protection.
The critical stage of the protective effort is the advance. Receive an in-depth analysis of the advance survey, pre-departure preparations, and more.
Advance/Choreography Practical Exercise - NEW
The class will be divided into teams to participate in exercises at nearby hotel sites. Using the advance checklist, your team will conduct the advance where you’ll apply learned principles.
Advance/Choreography Practical Exercise Review
Teams will report on and discuss the advance practical exercise conducted at the end of day one. A critique of the previous day’s work will prepare you for a full day of instruction.
Lone Gunman (Exceptional Case Study)
Understand the thinking and behavior of individuals who have attacked or approached prominent public figures in the United States and then discuss protective intelligence strategies.
Learn techniques that support the protective effort by watching the watchers.
Detecting Armed Adversaries (Characteristics)
Identify the characteristics of the armed gunman by learning how to tell if a person is carrying a concealed weapon—and whether that armed person is a friend (law enforcement) or foe.
Seven Deadly Sins of Executive Protection
Executive protection must be a key component in any corporate security program. To be successful, the program must be sustained and supported by the C-suite. Failed programs can be linked to EP’s “seven deadly sins” which will be identified and discussed. Learn what will derail an initiative and how to build a program based on best practices that will be supported by the top leadership in your organization.
The foundation of all protection programs is the formulation and analysis of the data and intelligence needed to establish a framework for the development of the protective effort.
Managing and Directing an EP Program
With its 24-hour operations, unpredictable conditions, multiplicity of details, and life and death stakes, executive protection shares many characteristics with the military and law enforcement professions. Examine the most critical leadership behaviors and how a good leader performs.
Earn Up to 23 CPE CREDITS
Your grasp of the fundamental concepts of asset protection is solid. Are you confident that you can now flawlessly execute this knowledge when confronted withever-increasing challenges?
In this course, nationally esteemed instructors guide you through real-life case studies and provide proven solutions, best practices, and field-tested strategies. Gain conceptual insights from various points-of-view on current trends and developing methodologies for successfully mitigating risks. The program addresses five key areas of concern every security expert must be well versed on to be successful.
Employment Law & Liability Prevention for the Security Professional
Presenter: Bill Berger
Keep the law on your side and get answers to questions that matter. Focus on expanding your knowledge of employment law minefields—including EEO, ADA, ADEA, and FMLA—as well as issues of negligent hiring, retention, and training. Get updates on employment law decisions affecting all employees, with emphasis on cases involving security professionals.
Violence Risk Assessment
Presenter: Jim Cawood, CPP, PCI, PSP
Move beyond the general structure of workplace violence programs and address the practical aspects of the behavioral underpinnings of violence. Learn about behavioral warning signs as well as practical assessment and intervention strategies that are grounded in both psychological literature and diverse experience. This session encompasses the ASIS/SHRM Workplace Violence Prevention and Intervention Standard.
Investigations in the Workplace
Presenter: Gene Ferraro, CPP, PCI
Proper and ethical investigations are complex undertakings that are time consuming and fraught with enormous potential for legal liability. When done properly, they combine an intricate mixture of skill, experience, and luck. Few activities invoke so much risk and at the same time yield so much opportunity. Examine the intricacies of conducting proper and effective workplace investigations and review how to traverse the legal minefields and traps inherent in the process. Learn how to use the Process of Investigation® in order to yield the best results and obtain the highest ROI of time and resources.
Information & Cyber Security
Presenter: Demi Ribaste
Review what makes information valuable and why an organization should protect it. Discuss market leverage, support to mission, safety of personnel, ROI, protection of assets, regulations, and laws. Learn how to protect information in physical and electronic forms.
Analysis of Leadership
Presenter: Marcia Thompson
This session will explore leadership traits, and styles used by progressive leaders. Participants will have an opportunity to identify their own styles and analyze scenarios based upon those styles. The session will provide promising and best practices on leadership approaches that can be applied in today’s dynamic workplace.
Earn Up to 18 CPE CREDITS
Reduce Risk ... Increase Resilience
Be a critical business partner to senior management.
What makes a risk, threat, and vulnerability assessment successful and effective? Why are assessments essential for organizational resilience?
This program starts by explaining the differences between risk, threat, and vulnerability and then demonstrates how assessments are absolutely essential for organizational resilience. Learn about acceptable business risk thresholds and the metrics you can use to describe them.
This workshop helps attendees establish a solid foundation to build a RTVA program. The program speakers were content experts in their field. Their ability to share personal experiences as they were presenting the workshop contents was very helpful.
--Dr. Timothy Burke, Advocate Health Care
Worth the investment. A great opportunity to expand knowledge and network with industry peers.
This 3-day course offers a comprehensive examination of all aspects of planning and implementing a risk assessment program in any organization, small or large, public or private, and in any industry or setting. Through engaging lectures, eye-opening case studies, practical exercises and a relevant site visit, this program not only covers the essentials topics listed below, but also provides opportunities to apply the principles.
Communicating and Developing the Business Case
The key task behind planning and conducting a risk assessment program is developing an understanding of the organization to be assessed.
Enterprise Risk Management Process
Before starting the design and implementation of the risk assessment program, it is important to understand the objectives of the enterprise risk management program and to evaluate both the extent and efficacy of existing risk control measures and systems. Learn how to do this efficiently.
Enterprise Security Risk Management
Enterprise Security Risk Management (ESRM) is a security program management approach that links security activities to an enterprise's mission and business goals through risk management methods. Understand how to educate business leaders on the realistic impacts of identified risks, presenting potential strategies to mitigate those impacts, then enacting the option chosen by the business in line with accepted levels of business risk tolerance.
Critical thinking is so often a forgotten aspect of the risk analysis and assessment process, yet it is fundamental to risk analysis and assessment. Understanding how to formulate a question, knowing what you're looking for, and how that information is applied is indispensable to this process of risk assessment. By exploring other points of view and understanding other perspectives, you learn more about the subject, can reflect on the information you have,and how you feel.
Asset Characterization and Identification
Learn to identify and characterize the organization's assets in the context of critical thinking - the basis for all good analysis. This is the foundation for criticality and consequence analysis as well as for a majority of probability analysis, vulnerability analysis, and risk analysis itself. Comprehending the assets at risk is the first step in risk assessment. This leads to determining their criticality to the mission of the organization and determine the possible consequences if those assets are compromised.
Analyzing the Risk
What is the scope of the risk assessment program? Is it meeting the organization's risk assessment objectives? Does it consider the context of the organization, its needs, and requirements? The scope should define the processes, functions, activities, physical boundaries (facilities and locations), and stakeholders within the boundaries of the risk assessment program. Learn how to match the scope to the resources available.
Treatment of the Risks/Mitigation
Risk rating scales are defined in relation to an organizations' objectives and scope. Risks are typically measured in terms of impact and likelihood of occurrence. Impact scales of risk should mirror the units of measure used for organizational objectives, which may reflect different types of impact such as financial, personnel, and/or reputation.
Organizational Resilience and Risk
Building a resilient organization is a cross-disciplinary and cross-functional endeavor. An organizational resilience approach to managing risk encourages critical infrastructure businesses to develop a more natural capability to deal with unexpected disruptions to business-as-usual activity. Discover the most effective ways to approach resilience that allow organizations to adapt to changes in their operating environment over time.
Test, Measure, Review, Document Control and Assurance
Understand the various tools and techniques that can be utilized to determine risk assessment. Identify how the organization can now bring its individual residual risk ratings together into a portfolio view to identify interdependencies and interconnections. Management can then determine any actions necessary to revise its risk responses or address design or effectiveness of controls.
Managing a Risk Assessment Program
Thinking with the end in mind, the culmination of this workshop will be review as well as the foundation and fundamentals of a risk assessment program. A risk assessment program establishes a framework for the overall assessment steps in the risk assessment process. It sets parameters for the overarching organizational structure, resources, commitment, and documented methods used to plan and execute risk assessments with clearly defined objectives.
Visit a major employer in the Atlanta, GA area to see how the organization has applied the principles of risk management. Return to the classroom to further explore how theory and practice come together. (Site visit location will be announced soon.)
This course includes a visit to a third-party site. The host organization may require the use of non-disclosure agreements or have other requirements for visitors to the site. The site tour is subject to the requirements of the host organization.
InterContinental Buckhead Atlanta
3315 Peachtree Road NE
Atlanta, GA 30326
For hotel reservations, contact our reservations department at 1.404.946.9191 or toll free at 1.877.422.8254. To receive our special group rate of $179.00 per night (plus taxes and fees), place your reservation by Friday, 7 June at 5:00pm EST and let them know you are participating in this course.