ASIS 2015 Feb. 15, 2015 to Feb. 16, 2015, dubai,uae

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Official Opening of the Exhibition Khamis Muzainah N/A
Keynote Speaker Mohammad G. Al-zahrani N/A
The Rise of the Jihadists - the Second Stage of the Arab Spring Mazen Saadah , Tim Williams We will address what is now a distinct second stage of the Arab Spring and ...
New Operations - Entry and Exit Strategies Ben Murrell New operations entry and exit strategies Incorporating lessons into planning, tactics, and training. Mode of ...
Security By Design in Abu Dhabi Hunter Burkall The SSPM, the first of its kind in the Middle East, establishes a system for ...
Counterterrorism Rewards Programs: Government and Private Sector—Information Sharing to Counter Growing Threats Brian Wood The session discusses current terrorism threats in the region, and how information sharing, including the ...
Does Fraud Matter? Torsten Wolf Organizations perceived to lack the willingness or capability to fight fraud run the risk of ...
Enhancing Threat Analysis through Community Engagement: Leveraging Local Knowledge to Secure Operations in East Africa Tim Jones In East African countries community engagement during threat analysis is of particular benefit to the ...
Airport Security Screening: Changing the Experience? Hans Mudler Security checks at airports are often experienced as being annoying and intrusive. ‘Smart Security’ aims ...
2013 API 780 Risk Assessment Methodology: Rationale for Use, Best Practices, Implementation and Benefits David Moore , Jean Perois , Paul Eddings , Jeffrey Lee , Sami Al Ajmi The purpose of this panel is to discuss the applications of the new API methodology ...
The Three Pillars Approach: Effective Staff Travel Safety Systems for Today’s International Business Scott Ruddick , Steve Ritchie A competitive global economy means staff are traveling to riskier locations. Ensure the integrity of ...
What’s the Difference Between Crisis Management and Emergency Response? Stephan Engel This presentation explains what constitutes an emergency versus a crisis, and provides best practice guidance ...
The Sinking of an Oil Platform - a Crisis Management Event Shawn Winter The fog of communications & responsibilities occurs in any crisis, what happens when key personnel ...
Re-Thinking All Hazards Risk Assessments Michael Edgerton An all-hazard approach to risk assessments and preventive measures seems efficient but it may lead ...
Security without Borders Kevin Daly Discuss new technology that an organization can employ to maintain a secure but open environment ...
Soft Target Hardening: Protecting People from Attack Jennifer Hesterman Provides a critical examination of vulnerabilities to soft target attack, the perpetrators and their targets. ...
In Harm’s Way: Building Successfully Integrated Travel Risk Management, Crisis Response and Evacuation Capabilities Marne Smith , Scott Hume Drawn from real-life case studies, these best practices demonstrate how to successfully implement travel risk ...
A Balancing Act: Building a Robust Aviation Security Solution Whilst Maintaining a Seamless Passenger Journey Waqar Mohamed The future of the aviation industry ultimately requires a balancing act: Building a robust security ...
Keynote Panel: Regional experiences - how the introduction of security industry regulations and framework has contributed to increasing industry’s performance and the effect on the customer and end us Khamis Muzainah , Khalid Al-ageel , Peter D’arcy N/A
Education - the Forgotten Protective Security Measure for Critical National Infrastructure Andy Davis Security education (SyEd) programmes work by increasing security whilst reducing risks! This presentation will demonstrate ...
Inside Information - Terrorist Use of Intelligence Paul Burke This presentation details some of the methods employed by terrorist groups to collect and use ...
Strategic Thinking about Integrated Risk Management Bruce Mcindoe , Ryan Greyling This session will explore how intelligence-driven Integrated Risk Management (IRM) will help an organization protect, ...
Non-Standard Behaviour Detection: Risk from Insider Pramod Bhatt The session focuses on development of Non-standard Behaviour (NSB) Detection framework, by using existing tool ...
Detection, Delay and Response – Designing an Effective Physical Protection System Sorin Pudroschi This analysis will incorporate properties of the physical protection system and capabilities of an adversary ...
Preparing an Enterprise Security Plan Addressing Middle East Cyber Threats & Risks Ali Pabrai Is your security plan updated to address today's threats to compromise sensitive information? Step through ...
Will Hotels Continue to be the Preferred Soft Target of the Future? Andy Williams Insight on hotel attacks in the Middle East through case studies from presenters direct experience ...
Blast Mitigation Measures – a Detailed Look at Products and Approaches to Protect Against Explosions Hollice Stone Knowledge is power. This presentation will provide the pros and cons of current blast protection ...
Supply Chain Security: "from Credo to Grave" Carlos Velez Supply Chain Security Manufacturing Storage Transportation and Distribution Main threats and Global trends Security Best ...
Holistic Physical Security Using Risk Analysis Methods Bödvar Tomasson This paper shows a method for holistic physical security risk analysis. Threat and vulnerability analysis ...
Global Screening: Close Security Gaps and Reduce Risks Dan Shoemaker Global screening helps prevent employee fraud, ensure compliance, and reduce legal risks, but 85% of ...
Private Security in High Risk Environments Marc Siegel Private security service providers are playing an ever increasing role in high risk environments. New ...