ASIS 2013 Dec. 3, 2013 to Dec. 5, 2013, Macau,China

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
New Dimension in Profiling Terrorists Raymond H. Hamden The media interest in profiling terrorist cases via security and law enforcement is a glamorous ...
Food Defense Freight Security Requirements Tyn van Amelsfoort Food Defense Freight Security Requirements , or FDFSR, is an risk - based, integrated security ...
Rethinking Cyber Security Threats Frank Chow Cyberspace has become an important source of information sharing and professional activities like business, banking ...
Choosing the Right Ingredients of Due Diligence to Survive a Media Or Regulator Tsunami Stephen Chandler The presentation will examine the options available to build a due diligence package that will ...
Undercover Techniques used in Intellectual Property cases in China (case studies) Theodore Kavowras The presentation will detail several case studies which the speaker has undertaken undercover investigations in ...
Understanding the Mindset of the Fraudster James D. Ratley What causes an employee to cross the line and steal from his employer? Why do ...
Investigating Workplace Violence in Asia Geoff Brown As companies expand into Asia and increase their work force, so does the number of ...
A Framework For Managing Crime and Fraud Torsten Wolf Enterprises are increasingly confronted with the challenging task to protect their assets and their reputation. ...
IP Protection Best Practices' in China (an operations perspective) Neil Marshall Intellectual Property Rights and Fraud & Corruption are two of the top risk categories confronting ...
Casino Investigations, Data Analysis and Business Intelligence: Mitigate Potential Litigation, Resolving Disputes & Claims for Table Games, Transaction Accountability with IP Integrations and Video Douglas Florence , Malcolm Rutherford DEFCON is an annual conference sponsored by hackers so why not learn how cheaters now ...
Security Master Planning, Iconic Buildings, and APAC Projects – Opportunities Gained and Lost to Build in Resilience. Mark Hayman Design approaches differ across the Region. Some cities have adopted integrated master planning, considering the ...
Those Famous Last Words! - Conflict Resolution Skills as part of Organizations Risk Management Strategy Totti Karpela Difficult customers, internal employee conflicts, receiving claims from unhappy customers, dealing with indivuals who are ...
East Meets West: Business Continuity Trends, Issues & Best Practices in Asia That You Should Know About Henry Ee The purpose of this presentation is to provide the international community with an overview of ...
Keynote Tim Summers A year after a transition to new leadership at the top of the Communist Party ...
Social Engineering – Posing Challenges To The Thinking Security Professional Paul Devassy Social engineering saps life from organizations. As practitioners of Corporate Security we have to evolve ...
City CCTV Surveillance Systems and the Prospects for Integrating Social Media Into CCTV Operations Chris Cubbage An insight into Capital and Regional City use of public CCTV systems in the Asia ...
Is Your Security Function Future Proof? Sanumon Mp Weakest link in the security system is the human element. Individuals’ competency and motivation plays ...
Major Theft - A Gateway Crime With National and Economic Security Implications Eric Ives The presentation discusses the economic and national security implications of major theft crimes and provides ...
Advanced Persistent Threat (APT): Next Generation Cyber Attack Werner Preining , Leonard Ong Cyber attacks usually confined to information loss and is detected with available end-point security software. ...
Securing Indonesia's Port and Maritime Industry: Challenges and Solutions Scott Bernat The security of Indonesia's ports and maritime infrastructure is dependent on the development of cost-effective ...
Non-Standard Behaviour Detection: Risk From Insider Pramod Bhatt An insider, who has access to organization’s information, can misuse it in a manner that ...
Title:State of High Rise Building Security Geoffrey T. Craighead N/A
Private Investigators Survive Or Extinct in China? Jack Chu Personal data flashed around the market in China is not a secret; recently number of ...
Session 22 Christopher Phinney This presentation will provide an overview of a PhD research project to define the commercial ...
Intelligence: The Neglected Better Half of Security Dencio Severo Acop The presentation argues that the security solutions employed by today's companies prove inadequate. These solutions ...
Organizational Resilience”? Building a more resilient organization Marc Siegel The presentation will discuss how to use the tools of organizational resilience and enterprise security ...