ASIS to Pilot Two New Certificate Programs at ASIS 2014

Two certificate programs, Critical Thinking Skills for Security Solutions and Developing and Implementing an Insider Threat Program, join the slate of high-quality pre-Seminar programing taking place the days before ASIS 2014 opens.

Certificate courses follow the rigors of higher education and provide evidence of attainment through assessment or testing. Both offerings will be held at the Georgia World Congress Center.

Critical Thinking Skills for Security Solutions
September 28-29

How can security professionals best assess ambiguous situations and solve difficult problems? What thinking techniques help minimize cognitive biases and encourage new insights? How do they think critically about current and future challenges?

Each day security professionals confront real-world threats and dilemmas, often reacting instinctively to uncertainty and conflicting information rather than approaching problems critically and analytically. Structured analytic techniques help professionals frame projects, avoid analytic traps, stimulate creative alternatives, and make arguments more compelling. Understanding and applying basic critical thinking skills and structured analytic methods generate better security solutions, save time over the long run, and build collaborative teams.

This two-day workshop provides practical guidance in applying key critical thinking techniques to security problems ranging from sensitive facilities to insider threats. Learn and practice analytic strategies that improve rigor, avoid mental traps, and communicate clearly with others. Hands-on exercises and case studies teach you how to use logic, analysis, synthesis, creativity, judgment, and systematic approaches to gather, evaluate, and challenge information to effectively form decisions and outcomes.

Program #1409-CRITI
$595 member/$695 nonmember

Developing and Implementing an Insider Threat Program
September 28-29

An insider threat arises when anyone with authorized access to the information or assets an organization values most uses that access—either intentionally or unintentionally—to inflict harm to the organization or damage national security. Failing to identify and mitigate the threat can have devastating consequences for your organization’s assets and increase vulnerability to terrorist activity or economic espionage.

This comprehensive program is designed to develop the critical components of an Insider Threat Program using modern analytic techniques and measures. Using a security Return on Investment (ROI) approach, learn how to evolve your current security program into a converged management structure that will identify and deter individuals posing both violent and non-violent threats. Learn the skills and procedures required to identify social-psychological factors critical to shaping a comprehensive insider threat program. Real case studies are used to explain how counterproductive work behavior can reveal early signs of a potential insider threat. The program will examine potential risk indicators and how organizations can best be structured to detect and deter the insider threat.

Program #1409-INSDR
$595 member/$695 nonmember

Featured

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.