Security Management Program Development:

Size: px
Start display at page:

Download "Security Management Program Development:"

Transcription

1 Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N

2 Are you confident in your ability to create an integrated, end-to-end security program? Can you confidently answer these questions? What standards, models, and resources do utilities utilize to design programs to protect critical infrastructure? How do law enforcement and the intelligence community factor into a security plan? How are different security solutions aligned with varying complexities of security problems while maintaining an integrated security focus? What does an integrated security risk management program look like? How are metrics used to build on security program success? What is the standard for physical security protection in critical infrastructure? How can cyber-security be effectively integrated into an enterprise security program? Join us in New Orleans and get the answers! This program provides protection planning information using practical, real life examples from the diverse and complex utilities, critical infrastructure protection domain. A broad array of security solutions with sound protection philosophy is applied culminating in a fully integrated, end-to-end security program that any industry can apply in part or in whole. Learn how utilities security professionals are adapting to the new reality of integrated security management. Come away with valuable resources to assist you in your own security program Sponsored by planning. the ASIS Utilities Security Council and the Critical Infrastructure Working Group RETURN ON YOUR INVESTMENT Expand your knowledge of security program development and application. Learn how to integrate complex and diverse security solutions into a cohesive, functioning security program. Benefit from the expertise of experienced professionals who have not only developed security plans and programs for many of North America s largest utilities in order to protect critical infrastructure, but have also worked with governments, regulatory bodies, and law enforcement to develop fully integrated and comprehensive security solutions, compliance programs, and security frameworks. PROFESSIONALLY DEVELOPED FOR Physical and cyber security managers and directors Risk managers Specialists/managers/directors of critical infrastructure security programs Homeland security specialists and managers Business continuity planners Facility and infrastructure managers Emergency management professionals Professionals preparing to take the CPP or PSP exams Senior risk managers Register by May 16 for earlybird rates!

3 PROGRAM OVERVIEW Security Program Development and Effective Risk Management Review risk management standards and risk assessment tools. Review how risk management is used to mitigate threats for enhanced security planning. Learn to plot risk for enterprise risk management alignment; determine your risk tolerance; and learn how to use integrate physical, IT, and operational technology (OT) risk management. Standards and Guidelines Examine the difference and learn why we need both. See how they can be used in the assessment process. Sample security standards will be reviewed. A call for involvement will be presented as well. Program Design: Complex Security Problems, the Utilities View Bring it all together for dams and powerhouses, nuclear plants, reservoirs, Security Governance pipelines, and transmission lines. Acts of Often misunderstood and left unapplied, terrorism, building response programs, a good governance structure is necessary and working with outside agencies will to effective security management. also be included. Security governance, risk, and compliance management are linked as NETWORKING an important triad in the security model. Use this exciting opportunity to collaborate with other security Protection Principles practitioners from diverse industries. Hear Examine the protection principles used from seasoned security professionals. within our security programs. Review in depth defense, deterrence, detection, Program content updates will be posted delay, and response concepts. Critical at asset identification, adversary path applications, worst case scenario planning, response exercises, and the relationship between business continuity, disaster recovery, and safety are covered. Security Program Metrics Review who uses metrics, how to select the best ones for your program, and why they are important especially in promoting your department. Discuss the contribution of security incident management to metrics and learn how useful audits can be using metrics as a baseline. Security Technology Application A fully integrated security program model is necessary in today s security management plan and for futureproofing your security program. Evaluate the capabilities of common physical and cyber security technologies; then learn to measure system effectiveness. Learn how information technology management and operational technology management link to the overall technology applied to the security program.

4 FAST FACTS Registration Hours Tuesday 5:00 6:00 pm Wednesday 7:00 8:00 am Program Hours Wednesday-Thursday 8:00 am 5:15 pm Registration Fees Registration fees include a networking reception, daily refreshment breaks and continental breakfast. Hotel costs are not included. Early-bird 5/16 After 5/16 Member $ 825 $ 925 Nonmember $1,125 $1,225 Program Chair Doug Powel, CPP, PSP Manager, SMI Security, Privacy & Safety BC Hydro & Power Authority Instructors Sarah Bynum, CPP, CISSP Director of Security Siemens Energy, Inc. Darren Nielsen, CPP, PCI, PSP, CISA Senior Compliance Auditor, Cyber and Physical Security Western Electricity Coordinating Council Scott Stephens, CPP Security Design Specialist Austin Water Utility Updates will be posted online Hotel Be sure to mention ASIS when requesting the special room rate of $123 single/double (plus tax). It will be honored until the room block is full or June 22. Hyatt French Quarter 800 Iberville St Team Discounts 10% off when three to five attendees register from the same organization; 15% for six or more. For details, asis@asisonline.org. HOW TO REGISTER Web Phone

5 Upcoming Programs APRIL 2015 JULY CPP, PCI, and PSP Reviews New York, NY Workplace Violence Managing The Program th New York City Security Conference & Expo New York, NY Enhanced Violence Indianapolis, IN Active Shooter Indianapolis, IN MAY High Rise Security Phoenix AZ 4-7 ASIS Assets Protection CourseTM: Practical Applications (APC II) Chicago, IL 7-8 CPP and PSP Reviews In conjunction with PSA-TEC Westminster, CO 20 So You Would Like to be a Writer...It s Easy Executive Protection Certificate Program How Data and Information can be Used to Plan an Attack Security Management Program Development AUGUST Emergency Management Interface with Public Safety Responders SEPTEMBER Bullying, Harassment, Hazing, and Domestic School Violence CPP, PCI, and PSP Reviews Anaheim, CA Pre-Seminar Programs and Tours Anaheim, CA 28-10/1 61st Annual Seminar & Exhibits Anaheim, CA JUNE /2 Education Sessions Sponsored 8-11 Effective Management for by ASIS Gaming and Wagering Security Professionals Protection Council for G2E Madrid, Spain Las Vegas, NV 8-10 Facility Security Design San Antonio, TX OCTOBER Physical Security Systems San Antonio, TX Corporate Investigations Security Force Management San Antonio, TX Physical Security Master Planning ASIS Assets Protection CourseTM: Functional Management (APC III) 21 Retail Data Security: The St. Pete Beach, FL Intersection of the Physical and Digital Worlds 17 The Contract Is Key: Protecting the Professional Security Provider from 3rd Party The Investigative Interviewing Method Liability Risk, Threat, and Vulnerability Assessment Certificate Program 23 Command Center About ASIS International ASIS International (ASIS) is the preeminent organization for security professionals, with more than 38,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests, such as the ASIS Annual Seminar and Exhibits, as well as specific security topics. ASIS also advocates the role and value of the security management profession to business, the media, government entities, and the public. By providing members and the security community with access to a full range of programs and services, and by publishing the industry s number one magazine Security Management ASIS leads the way for advanced and improved security performance.

6 Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 ASIS Delivers Distinctive Security Education Save $100! Register by May 16. Leading security practitioners, who face the same challenges you face, develop and deliver distinctive ASIS programs. They address real-world security issues through personal experiences and by applying theories, proven and tested, by leading security professionals. Your colleagues highly rate ASIS programs for providing best practices and the newest strategies for mitigating ever-changing security threats today s implementation for tomorrow s security. For more information, visit Prince Street Alexandria, VA USA Non-Profit US Postage PAID ASIS

Facility Security Design

Facility Security Design Facility Security Design June 8 10, 2015 San Antonio, Texas Earn up to 21 CPEs EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION Use your security dollars wisely! A cost-effective, fully functional

More information

Physical Systems Master Planning

Physical Systems Master Planning Physical Systems Master Planning October 19 20, 2015 Earn up to 14 CPEs NEW CLASS EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Physical Systems Master Planning This workshop

More information

What You Need to Know About Security Training

What You Need to Know About Security Training Physical Security Systems June 8-10, 2015 Earn up to 14 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Delivering Organizational Value through Security Understand the

More information

Security Force Management:

Security Force Management: Security Force Management: Functional Management in Today s Economic Environment June 10-11, 2015 San Antonio, Texas Earn up to 14 CPEs EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION Take

More information

Facility Security Design

Facility Security Design Facility Security Design February 24 26, 2016 Fort Worth, TX Earn up to 21 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Use your security dollars wisely! A cost-effective,

More information

Security Documents and Project Management Process

Security Documents and Project Management Process Security Documents and Project Management Process February 25 26, 2015 New program. Inaugural pricing. Earn up to 14 CPEs EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION Use your security

More information

Security Practices in a High Rise Environment

Security Practices in a High Rise Environment Security Practices in a High Rise Environment May 4-5, 2015 Phoenix, AZ Earn up to 14 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Modern high rise security in a post-9/11

More information

Risk, Threat, and Vulnerability Assessment

Risk, Threat, and Vulnerability Assessment Risk, Threat, and Vulnerability Assessment October 23 24, 2014 Earn up to 14 CPEs New Program EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N REDUCE RISK INCREASE RESILIENCE

More information

Physical Security: Introductory Applications and Technology

Physical Security: Introductory Applications and Technology Physical Security: Introductory Applications and Technology February 22 23, 2016 Fort Worth, TX Earn up to 14 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Delivering

More information

Physical Security: Introductory Applications and Technology

Physical Security: Introductory Applications and Technology Physical Security: Introductory Applications and Technology February 23 24, 2015 Earn up to 14 CPEs EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION Delivering Organizational Value through

More information

Enhanced Violence April 7-8, 2014. Active Shooter April 9-10, 2014. Denver, CO. Earn. up to 29 CPEs* , AN AT I D. *by attending both programs

Enhanced Violence April 7-8, 2014. Active Shooter April 9-10, 2014. Denver, CO. Earn. up to 29 CPEs* , AN AT I D. *by attending both programs Enhanced Violence April 7-8, 2014 Active Shooter April 9-10, 2014 Earn up to 29 CPEs* *by attending both programs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Security

More information

Facility Security Design

Facility Security Design Facility Security Design Experience, Dedication, and Leadership in Security EDUCATION June 3 5, 2013 Indianapolis, Indiana Earn up to 21 CPEs Use your security dollars wisely! A cost-effective, fully functional

More information

Security s Transformative Technology. October 24-25, 2013 Scottsdale, AZ. Earn up to 14 CPEs. Cloud Computing:

Security s Transformative Technology. October 24-25, 2013 Scottsdale, AZ. Earn up to 14 CPEs. Cloud Computing: Cloud Computing: Security s Transformative Technology EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION October 24-25, 2013 Earn up to 14 CPEs Get your head in the cloud Can you name the top

More information

APC. ASIS Assets Protection Course. ASIS Assets Protection Course PAID. Distinctive Education. ASIS Delivers NOVEMBER 2015 APRIL 2016 MAY 2016

APC. ASIS Assets Protection Course. ASIS Assets Protection Course PAID. Distinctive Education. ASIS Delivers NOVEMBER 2015 APRIL 2016 MAY 2016 For information on how to bring I,, or I to your facility, visit us at www.asisonline.org/education. 4 6-8 18 3-4 With membership and chapters around the globe, ASIS develops and delivers board certifications

More information

Physical Security: Introductory Applications and Technology

Physical Security: Introductory Applications and Technology Physical Security: Introductory Applications and Technology February 24 27, 2014 Tampa, Florida Earn up to 28 CPEs EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION Delivering Organizational

More information

Executive Protection. November 16-17, 2015 Providence, RI. Earn up to 14 CPEs

Executive Protection. November 16-17, 2015 Providence, RI. Earn up to 14 CPEs Executive Protection November 16-17, 2015 Providence, RI Earn up to 14 CPEs EXPERIENCE, DEDICATION, AND LEADERSHIP IN SECURITY EDUCATION Now is not the time to be complacent What perils should you be anticipating?

More information

Facility Security Design

Facility Security Design Facility Security Design Experience, Dedication, and Leadership in Security EDUCATION June 7 9, 2010 Boston, Massachusetts Earn 22 CPEs Hedge your bet with integrated security design. Integrating multiple

More information

2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program

2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program 2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program WHERE: CENTRO EUROPA-Banco Popular de PR TRAINING CENTER (Frente Centro Bellas Artes, Ave Ponce De León, Santurce

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

security standards and guidelines development

security standards and guidelines development ASIS INTERNATIONAL The worldwide leader in security standards and guidelines development > ASIS Standards and Guidelines bring together volunteers and seek out views of persons who have an interest in

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

University of Maryland University College. American Military University. Henley-Putnam University

University of Maryland University College. American Military University. Henley-Putnam University A P R I L 2 0 1 1 Table of Contents 2-3 UMUC: Training Tomorrow s Cybersecurity Leaders Today University of Maryland University College 4-5 Preparing Those Who Protect the Public American Military University

More information

IT Senior Audit Leader

IT Senior Audit Leader IT Senior Audit Leader Locations: Minneapolis, MN; Phoenix, AZ; Denver, CO; Des Moines, IA; Philadelphia, PA; Charlotte, NC; San Francisco, CA and San Antonio, TX Job Description Wells Fargo Audit Services

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

th Annual SPONSORSHIP OPPORTUNITIES NaBITA Conference November 13-15, 2016 San Antonio, TX

th Annual SPONSORSHIP OPPORTUNITIES NaBITA Conference November 13-15, 2016 San Antonio, TX SPONSORSHIP OPPORTUNITIES 8 th Annual NaBITA Conference November 13-15, 2016 San Antonio, TX NOVEMBER 13-15, 2016 SAN ANTONIO, TX HYATT REGENCY SAN ANTONIO RIVERWALK About Us NaBITA The National Behavioral

More information

EXPERIENCE THE BEST OF THE BEST! ALL STAR. CONFERENCE Oct. 19 21, 2015 / Ft. Lauderdale, FL. Register early and save. www.theiia.

EXPERIENCE THE BEST OF THE BEST! ALL STAR. CONFERENCE Oct. 19 21, 2015 / Ft. Lauderdale, FL. Register early and save. www.theiia. EXPERIENCE THE BEST OF THE BEST! 2015 ALL STAR CONFERENCE Oct. 19 21, 2015 / Ft. Lauderdale, FL Register early and save. www.theiia.org/goto/allstar BEST OF THE BEST! Members: Register by Aug. 15 to save

More information

August 16 August 22, 2009 November 1 November 7, 2009

August 16 August 22, 2009 November 1 November 7, 2009 Homeland Security Executive Certificate Studies Program Strategies for Combating Terrorism: Lessons from Experts in High-Risk Environments August 16 August 22, 2009 November 1 November 7, 2009 S ecurity

More information

Organizational Security Track FAQ

Organizational Security Track FAQ Organizational Security Track FAQ What do organizational security management professionals do? Organizational security management professionals are employed by organizations (corporations, partnerships,

More information

MBA S NATIONAL TECHNOLOGY IN MORTGAGE BANKING CONFERENCE & EXPO 2015

MBA S NATIONAL TECHNOLOGY IN MORTGAGE BANKING CONFERENCE & EXPO 2015 MBA S NATIONAL TECHNOLOGY IN MORTGAGE BANKING CONFERENCE & EXPO 2015 The world is ever-changing, and technology is a key driver of innovation. With cybersecurity attacks on the rise, new regulations challenging

More information

6th Annual Homeland Security Professionals Conference & Expo October 3-7, 2011

6th Annual Homeland Security Professionals Conference & Expo October 3-7, 2011 This year s conference looks at developments around the Globe that will impact on terrorism and crime in the USA. Instead of looking at attack response, as in past years, the conference will be dedicated

More information

Community Cyber Security. Center for Infrastructure Assurance and Security

Community Cyber Security. Center for Infrastructure Assurance and Security Community Cyber Security Overview CIAS program Nevada implementation Get involved Physical and Cyber Threats Intersect The most destructive scenarios involve cyber actors launching several attacks on our

More information

HOMELAND SECURITY INTERNET SOURCES

HOMELAND SECURITY INTERNET SOURCES I&S Internet Sources I&S HOMELAND SECURITY INTERNET SOURCES USEFUL SITES, PORTALS AND FORUMS Homeland Security Home Page http://www.whitehouse.gov/homeland/ A federal agency whose primary mission is to

More information

NARCA - National Association of Retail Collection Attorneys - 2015 Fall Collection Conference

NARCA - National Association of Retail Collection Attorneys - 2015 Fall Collection Conference National Association of Attorneys General Bankruptcy Seminar October 4-7, 2015 Crowne Plaza Seattle Hotel Seattle, WA visit: http://www.naag.org/meetingstrainings/oer/bankruptcy-seminar1.php ABI and UMKC

More information

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity

RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

LaSorsa & Associates

LaSorsa & Associates Practical Training Solutions for Today's World Reality - Efficiency - Survivability LaSorsa & Associates Executive Protection Consulting & Risk Mitigation SIGN UP NOW Evasive Driving Medical Response TECHNICAL

More information

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 James.Costello@srpnet.com James J. Costello Director, Enterprise IT Security April 8,

More information

Homeland Security Executive Certificate Studies Program Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts

Homeland Security Executive Certificate Studies Program Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts March 9-15, 2014 September 14-20, 2014 Current Security Challenges Terrorism poses an expanding and escalating

More information

Homeland Security Executive Certificate Studies Program Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts

Homeland Security Executive Certificate Studies Program Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts Strategies for Homeland Security and Risk Management: Lessons from the World s Top Experts March 9-15, 2014 September 14-20, 2014 Current Security Challenges Terrorism poses an expanding and escalating

More information

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

2015 NATIONAL SCHOOL SAFETY CONFERENCE

2015 NATIONAL SCHOOL SAFETY CONFERENCE 2015 NATIONAL SCHOOL SAFETY CONFERENCE Co-hosted by the Clark County School District and the Clark County School District Police Department FEATURING July 27-31, 2015 M RESORT LAS VEGAS, NV National Town

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

Cybersecurity Training

Cybersecurity Training Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/web2014/cybetrn Expert-led training

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

Emerging Strategies for Performance Auditing

Emerging Strategies for Performance Auditing IIA R E S E A R C H R E P O R T Emerging Strategies for Performance Auditing Insights from City Auditors in Major Cities in the U.S. and Canada Ronald C. Foster, CIA, CRMA, CISA, CPA, CMA, PMP, CFE Thomas

More information

Homeland Security Executive Certificate Studies Program Strategies for Combating Terrorism: Lessons from the World s Top Experts in Homeland Security

Homeland Security Executive Certificate Studies Program Strategies for Combating Terrorism: Lessons from the World s Top Experts in Homeland Security Strategies for Combating Terrorism: Lessons from the World s Top Experts in Homeland Security April 7-13, 2013 October 6-12, 2013 Current Security Challenges Terrorism poses an expanding and escalating

More information

SANS Vendor Marketing Programs

SANS Vendor Marketing Programs SANS Vendor Marketing Programs The audience at SANS represent some of the most forward thinking IT security practitioners looking for new ideas and realworld solutions. Phillip Lin Director of Marketing

More information

ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor

ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor Cavendish Scott, Inc. 984 S. Vine St. Denver, CO. 80209 Tel. 303 480 0111 www.cavendishscott.com training@cavendishscott.com Course

More information

The 20th Annual Texas Workers Compensation Educational Conference

The 20th Annual Texas Workers Compensation Educational Conference The 20th Annual Texas Workers Compensation Educational Conference Hyatt Regency Hotel Austin, Texas July 19-21, 2010 and Renaissance Dallas-Richardson Hotel Dallas, Texas August 2-4, 2010 Featuring Experts

More information

CERTIFIED DISASTER RECOVERY ENGINEER

CERTIFIED DISASTER RECOVERY ENGINEER CERTIFIED DISASTER RECOVERY ENGINEER KEY DATA COURSE OVERVIEW ACCREDITATION Course Title: C)DRE Duration: 4 days CPE Credits: 32 Class Format Options: Instructor-led classroom Live Online Training Computer

More information

ITIL Foundation. Learn about process improvements, benefits, and challenges of ITIL, and get your ITIL Foundation certification.

ITIL Foundation. Learn about process improvements, benefits, and challenges of ITIL, and get your ITIL Foundation certification. ITIL Foundation Learn about process improvements, benefits, and challenges of ITIL, and get your ITIL Foundation certification. In this exciting and dynamic course, you will get an introduction to the

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization?

What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could spend three exciting days surrounded by peers, focused on exploring the topics most important to you and your organization? What if you could not only maintain, but update and upgrade

More information

Conference Sponsorship Opportunities

Conference Sponsorship Opportunities Conference Sponsorship Opportunities The #1 Business Continuity Publication in the World Every issue, Disaster Recovery Journal (DRJ) delivers how-to, in depth knowledge into business continuity planning

More information

IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society

IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society EARLY BIRD DISCOUNT Register by September 30, 2014 2014 The Illinois CPA Society Tuesday, October 21, 2014 Rosemont, IL IRS/Tax Practitioners Symposium Interact with experts, hear the latest updates and

More information

How To Buy Cyber Insurance

How To Buy Cyber Insurance 10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

How To Plan A Crisis Management Program

How To Plan A Crisis Management Program Building a Security Conscious Business Continuity Management (BCM) Program Sam Stahl, CBCP, MBCI EMC Global Professional Services Program Manager stahl_samuel@emc.com ASIS Singapore, 2014 Agenda Overview

More information

L101 Foundations of Emergency Management Wirtz, VA Oct 5-30

L101 Foundations of Emergency Management Wirtz, VA Oct 5-30 Emergency Management Institute Fiscal Year 2016 Schedule of Courses by Curriculum 1st and 2nd Semesters E - EMI Campus L - RESIDENT OFF-SITE V - VIDEO TELECONFERENCE COURSES K - Virtual (Adobe Connect)

More information

Demand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA

Demand Planning. & Forecasting. Predictive Intelligence Summit. October 10-11, 2012 San Diego, CA Demand Planning & Forecasting 2012 Predictive Intelligence Summit October 10-11, 2012 San Diego, CA Leverage demand planning to improve forecasting accuracy and drive decision making Enhance sales and

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014

The Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014 BYOD and Securing Mobile Devices September 25, 2014 The Hunt for Fraud September 26, 2014 Seminar / Training Central Arkansas Chapter Information Systems Audit and Control Association, Arkansas Division

More information

Perpetuity Group Newsletter

Perpetuity Group Newsletter Perpetuity Group Newsletter Issue 49 April 2011 Quick Links Perpetuity Group Perpetuity Training Perpetuity Research Perpetuity Consultancy Secured Environments ---------------------- Featured Course Risk,

More information

Our full capabilities include:

Our full capabilities include: Network Services Network Services Connecting to greater performance Our Network Services division is comprised of a large staff with a breadth and depth of IT experience. We ll ensure your network is designed

More information

Events Calendar for 2004

Events Calendar for 2004 Events Calendar for 2004 November 2004 Monday, November 1 Anaheim, CA Controversies in Batterer Intervention Programs Annual Domestic Violence Conference Sponsored by the National College of District Attorneys

More information

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY 14304-1745 ECP - 601: Effective Business Continuity Management: ISO 22301 This 3-day course provides an intensive, hands-on workshop covering all major aspects for the design of an effective Business Continuity Plan

More information

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to

More information

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015 Cyber Security Auditing for Credit Unions ACUIA Fall Meeting October 7-9, 2015 Topics Introduction Cyber Security Auditing Program Discuss an effective and compliant Cyber Security Auditing Program from

More information

Human Resources Level 1 Human Resources Level 2

Human Resources Level 1 Human Resources Level 2 Ten half-day modules, over five weeks. Take one course or take all ten. Certificate Series Human Resources Level 1 Human Resources Level 2 Multiple Attendee Discount! Register Three for the Series at the

More information

PROJECT MANAGEMENT. Seminars in. Powerful skills for today s toughest PM challenges. save. off any AMA Seminar $200. www.amanet.

PROJECT MANAGEMENT. Seminars in. Powerful skills for today s toughest PM challenges. save. off any AMA Seminar $200. www.amanet. www.amanet.org Seminars in PROJET MANAGEMENT Powerful skills for today s toughest PM challenges save $200 off any AMA Seminar See inside for details When the stakes get higher, your project skills need

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

CIP-014-1 Physical Security. Nate Roberts CIP Security Auditor I

CIP-014-1 Physical Security. Nate Roberts CIP Security Auditor I CIP-014-1 Physical Security Nate Roberts CIP Security Auditor I Notes Critical Infrastructure Protection (CIP) Standard CIP-014-1 is currently pending approval by the Federal Energy Regulatory Commission

More information

Cybersecurity & Public Utility Commissions

Cybersecurity & Public Utility Commissions Cybersecurity & Public Utility Commissions November 12, 2014 TCIPG Ann McCabe, Commissioner Illinois Commerce Commission NARUC (National Association of Regulatory Utility Commissioners) Cybersecurity Primer

More information

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE

ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE create better trained employees. choose the best value in training. ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE PRODUCTIVE train your workforce on-site. save on employee downtime

More information

Subject: Critical Infrastructure Identification, Prioritization, and Protection

Subject: Critical Infrastructure Identification, Prioritization, and Protection For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

Executive Protection Training Program

Executive Protection Training Program TECHNICAL SURVEILLANCE COUNTER-MEASURES, EXECUTIVE PROTECTION & PRACTICAL TRAINING SOLUTIONS FOR TODAY S WORLD Executive Protection Training Program Comprehensive, Realistic, Relevant & Valuable 7 Day

More information

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc. Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets

More information

ISACA North Dallas Chapter

ISACA North Dallas Chapter ISACA rth Dallas Chapter Business Continuity Planning Observations of Critical Infrastructure Environments Ron Blume, P.E. Ron.blume@dyonyx.com 214-280-8925 Focus of Discussion Business Impact Analysis

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

December 17, 2003 Homeland Security Presidential Directive/Hspd-7 For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,

More information

2012 Business Continuity Conference Friday, November 9, 2012

2012 Business Continuity Conference Friday, November 9, 2012 South Central PA Regional Business Preparedness Campaign 2012 Conference Friday, November 9, 2012 The South Central PA Task Force will hold a Regional Conference on Friday, November 9, 2012, at the C.

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

2016 Media Kit. Secure Events INSPIRING A SAFE AND SECURE CYBER WORLD

2016 Media Kit. Secure Events INSPIRING A SAFE AND SECURE CYBER WORLD 2016 Media Kit Secure Events INSPIRING A SAFE AND SECURE CYBER WORLD In 2004, we launched our 1-day and 2-day events around the world with great success. We ve produced over one hundred events to date,

More information

HONOR TREASURE SHAPE. Honrando. Atesorando. Formando. the Past, the Present, the Future NATIONAL ASSOCIATION OF HISPANIC NURSES 39TH ANNUAL CONFERENCE

HONOR TREASURE SHAPE. Honrando. Atesorando. Formando. the Past, the Present, the Future NATIONAL ASSOCIATION OF HISPANIC NURSES 39TH ANNUAL CONFERENCE NATIONAL ASSOCIATION OF HISPANIC NURSES 39TH ANNUAL CONFERENCE Honrando HONOR the Past, Formando SHAPE the Future Atesorando TREASURE the Present, JULY 15 18, 2014 HYATT REGENCY MIAMI, MIAMI, FL EXHIBITOR

More information

Correlating Infection Prevention with Outcomes

Correlating Infection Prevention with Outcomes Correlating Infection Prevention with Outcomes OCTOBER 1, 2014 8:00 AM - NOON HYATT REGENCY O HARE CHICAGO, IL Barbara Strain, SM (ASCP) University of Virginia Hospital System Shannon Candio, R.N. Owens

More information

Certified Disaster Recovery Engineer

Certified Disaster Recovery Engineer Cyber Security Training & Consulting Certified Disaster COURSE OVERVIEW 4 Days 32 CPE Credits $2,500 When a business is hit by a natural disaster, cyber crime or any other disruptive tragedy, how should

More information

Executive Summary. The United States Security Industry. Size and Scope, Insights, Trends, and Data

Executive Summary. The United States Security Industry. Size and Scope, Insights, Trends, and Data Executive Summary The United States Security Industry Size and Scope, Insights, Trends, and Data Late in 2012, ASIS International and IOFM conducted the United States Security Industry Survey. Participation

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013 THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The

More information

REQUEST FOR PROPOSAL

REQUEST FOR PROPOSAL REQUEST FOR PROPOSAL GENERAL SERVICES CONTRACTOR SERVICES Expo! Expo! s Annual Meeting & Exhibition 8-10 December 2009 Atlanta, GA 7-9 December 2010 New Orleans, LA 6-8 December 2011 Las Vegas, NV Future

More information

Nadine Nasser Donovan, Esq. (617) 791-4282 (cell) nadine@seak.com www.seak.com www.malpracticetestifyingtraining.com

Nadine Nasser Donovan, Esq. (617) 791-4282 (cell) nadine@seak.com www.seak.com www.malpracticetestifyingtraining.com Nadine Nasser Donovan, Esq. (617) 791-4282 (cell) nadine@seak.com www.seak.com www.malpracticetestifyingtraining.com CURRENT: SEAK, INC. Falmouth, MA Consultant/Trainer, August 2002-Present Trains experts

More information

Global Security Program Overview

Global Security Program Overview STATE STREET GLOBAL SECURITY Global Security Program Overview ASIS International Kansas City Chapter March 5, 2015 Stephen D Baker CPP Vice President & Deputy Chief Security Officer About State Street

More information

CURRICULUM VITAE. BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com. Adjunct Professor, Taxation New York University School of Law

CURRICULUM VITAE. BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com. Adjunct Professor, Taxation New York University School of Law CURRICULUM VITAE BRYAN C. SKARLATOS 212-808-8100 bskarlatos@kflaw.com PROFESSIONAL POSITIONS: Partner, Kostelanetz & Fink, LLP 7 World Trade Center New York, New York 10007 Adjunct Professor, Taxation

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security)

Release: 1. ICA60308 Advanced Diploma of Information Technology (E-Security) Release: 1 ICA60308 Advanced Diploma of Information Technology (E-Security) ICA60308 Advanced Diploma of Information Technology (E-Security) Modification History Not Applicable Approved Page 2 of 8 Description

More information