ASIS to Pilot Two New Certificate Programs at ASIS 2014

Two certificate programs, Critical Thinking Skills for Security Solutions and Developing and Implementing an Insider Threat Program, join the slate of high-quality pre-Seminar programing taking place the days before ASIS 2014 opens.

Certificate courses follow the rigors of higher education and provide evidence of attainment through assessment or testing. Both offerings will be held at the Georgia World Congress Center.

Critical Thinking Skills for Security Solutions
September 28-29

How can security professionals best assess ambiguous situations and solve difficult problems? What thinking techniques help minimize cognitive biases and encourage new insights? How do they think critically about current and future challenges?

Each day security professionals confront real-world threats and dilemmas, often reacting instinctively to uncertainty and conflicting information rather than approaching problems critically and analytically. Structured analytic techniques help professionals frame projects, avoid analytic traps, stimulate creative alternatives, and make arguments more compelling. Understanding and applying basic critical thinking skills and structured analytic methods generate better security solutions, save time over the long run, and build collaborative teams.

This two-day workshop provides practical guidance in applying key critical thinking techniques to security problems ranging from sensitive facilities to insider threats. Learn and practice analytic strategies that improve rigor, avoid mental traps, and communicate clearly with others. Hands-on exercises and case studies teach you how to use logic, analysis, synthesis, creativity, judgment, and systematic approaches to gather, evaluate, and challenge information to effectively form decisions and outcomes.

Program #1409-CRITI
$595 member/$695 nonmember

Developing and Implementing an Insider Threat Program
September 28-29

An insider threat arises when anyone with authorized access to the information or assets an organization values most uses that access—either intentionally or unintentionally—to inflict harm to the organization or damage national security. Failing to identify and mitigate the threat can have devastating consequences for your organization’s assets and increase vulnerability to terrorist activity or economic espionage.

This comprehensive program is designed to develop the critical components of an Insider Threat Program using modern analytic techniques and measures. Using a security Return on Investment (ROI) approach, learn how to evolve your current security program into a converged management structure that will identify and deter individuals posing both violent and non-violent threats. Learn the skills and procedures required to identify social-psychological factors critical to shaping a comprehensive insider threat program. Real case studies are used to explain how counterproductive work behavior can reveal early signs of a potential insider threat. The program will examine potential risk indicators and how organizations can best be structured to detect and deter the insider threat.

Program #1409-INSDR
$595 member/$695 nonmember

Featured

  • Survey: Less Than Half of IT Leaders are Confident in their IoT Security Plans

    Viakoo recently released findings from its 2024 IoT Security Crisis: By the Numbers. The survey uncovers insights from IT and security executives, exposes a dramatic surge in enterprise IoT security risks, and highlights a critical missing piece in the IoT security technology stack. The clarion call is clear: IT leaders urgently need to secure their IoT infrastructure one application at a time in an automated and expeditious fashion. Read Now

  • ASIS International and SIA Release “Complexities in the Global Security Market: 2024 Through 2026”

    ASIS International and the Security Industry Association (SIA) – the leading security associations for the security industry – have released ”Complexities in the Global Security Market: 2024 Through 2026”, a new research report that provides insights into the equipment, technologies, and employment of the global security industry, including regional market breakouts. SIA and ASIS partnered with global analytics and advisory firm Omdia to complete the research. Read Now

  • President Biden Issues Executive Order to Bolster U.S Port Cybersecurity

    On Wednesday, President Biden issued an Executive Order to bolster the security of the nation’s ports, alongside a series of additional actions that will strengthen maritime cybersecurity and more Read Now

  • Report: 15 Percent of All Emails Sent in 2023 Were Malicious

    VIPRE Security Group recently released its report titled “Email Security in 2024: An Expert Look at Email-Based Threats”. The 2024 predictions for email security in this report are based on an analysis of over 7 billion emails processed by VIPRE worldwide during 2023. This equates to almost one email for everyone on the planet. Of those, roughly 1 billion (or 15%) were malicious. Read Now

Featured Cybersecurity

Whitepapers

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3