Seminar Overview

Seminar Dates: Exhibit Dates: Tuesday–Friday, Tuesday–Thursday, October 12–15 October 12–14

www.asis2010.org Business as usual doesn’t cut it anymore. “No other event provides In today’s uncertain economy, is your the broad array of vendors, organization repositioned for success? technology and networking opportunities as the annual Come to ASIS 2010 to gain the knowledge, resources, “The annual convention is a ASIS Seminar and Exhibits.” and contacts you need to move your organization— must for the serious security Sean McCafferty, practitioner.” Security Administrator and your career—forward. TEAGUE Werner Preining, CPP, CMAS, Captain Interpool Security, Ltd. – European Operations Table of Contents Program Highlights...... 2 ASIS 2010 is: What’s New...... 3 Thank You to our Partners and Sponsors ...... 4 Schedule of Events...... 5 Your best opportunity to learn from industry leaders and Keynotes and General Sessions. . . 6 peers from diverse backgrounds. Choose from 160+ timely ASIS education is unrivaled ASIS 2010 Exhibits...... 8 educational offerings covering the spectrum of security interests. ASIS Certification ...... 11 CSO Roundtable...... 12 Pre-Seminar Programs and Events...... 14 Focus on Homeland Security. . . . 18 Education Sessions ...... 20 A marketplace for the hottest innovations that are changing Knockout a years worth of Networking Events ...... 56 the face of security. Discover thousands of solutions from leading product and supplier research Special Interest Networking manufacturers, service providers, and product experts. in just three days Events...... 57 Guest Program ...... 58 Welcome to Dallas...... 59 General Information/Housing . . . . 60 ASIS Foundation Events...... 61

The event for security decision makers. Meet professionals 64% of Seminar attendees are management, from all vertical industries and government sectors, from Fortune of which 100 companies to the Department of Homeland Security. 58% are senior level

Where top security influencers connect on a higher level. Meet influencers and decision makers from around the world Unparalleled networking during high-caliber events and a myriad of opportunities on and opportunities off the show floor.

Admission to the Exhibits is FREE when you register in advance! $75 fee for nonmembers after October 8 Find up-to-the-minute information and registration details at: www.asis2010.org

Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 1 Program Highlights What’s New

Education Partners. ASIS is partnering Young Professionals. Designed for with key professional organizations that security professionals, ages 21–40. For the Who You’ll Meet Here specialize in distinct aspects of security to first time, a track of sessions is identified for support and expand this year’s educational Young Professionals that addresses relevant • Security directors and managers • Law enforcement professionals offerings. (ISC)2, ISACA®, and IT-ISAC management issues and other topics of • Homeland security professionals • Facility/plant/operations managers bring their expertise in the information interest. In addition, you won’t want to security arena, either by providing topics miss the first installment of theYoung • CEOs, presidents, and VPs of • Architects/engineers and speakers or by co-sponsoring specific Professionals’ Leadership Series held on critical infrastructure businesses • Human resource professionals sessions on the schedule. Members of Monday, October 11, followed by a special • Government/military personnel • Other professionals with an interest these organizations will enjoy ASIS member reception. See page 15 for details. pricing when they register. with security responsibilities in security Accolades Showcase. The Accolades • Security consultants Enhanced Planning and Onsite Competition awards the most innovative Tools. This year’s online show planner will new security technology, product, and be integrated with ASIS Mobile (for use on service solutions and is open to all ASIS your smart phone), making it easier than 2010 exhibitors. New this year—entries Keynotes/General Sessions. Outstanding keynote presentations and thought- ever to schedule the sessions, exhibitors, will be showcased in a special area of the provoking general sessions featuring world-class speakers set the stage for this year’s show specials, and networking events exhibit hall! event. See page 6 for details. you’re interested in and enhance your overall Seminar experience in advance Education Sessions. More than 160 sessions—many appearing for the first time— and onsite! address the range of timely security topics and critical issues, as well as core security management best practices and strategies to meet the dynamic needs of today’s security professionals. Mix ‘n match from 18 tracks and design a program that’s right for you.

Refer to the daily Schedule-at-a-Glance—at the beginning of each day’s listing— for an overview of programming scheduled that day. The full lineup begins on page 20. We Know Budgets Are Tight—Here Are Six Ways to Save Homeland Security. A total of 31 sessions focus on protecting the homeland, whether in the U.S. or abroad. See page 18 for a quick overview. 1. Take advantage of early bird discounts when you register by August 27. Pre-Seminar Programs and Events. These special programs and events are held 1. immediately prior to the Seminar. Additional registration fees apply where noted. 2. Make your hotel reservation early to obtain your preferred hotel and rate! Sessiones en Español. A track of sessions presented in Spanish and focused on 2. security issues is offered. In addition, 9 sessions will be simultaneously translated from 3. Exhibits-only registration is FREE until October 8. English to Spanish. 3.Or attend the program for a single day at a reduced fee. Se ofrece una serie de sesiones en español centradas en temas de seguridad. Además, en nueve sesiones habrá interpretación simultánea del inglés al español. 4. If you’re not an ASIS member—join now and save up to $335 on your registration! See 4.www.asis2010.org/registration for details. The Seminar’s comprehensive educational program is designed by the Seminar Program Committee, a group of committed professionals who are experts in every facet of security 5. Bring your team! Register 10 individuals from the same management, from across industry sectors. Each proposal submitted is vetted by this group of organization and the 11th person registers for free. your peers and only a fraction of proposals are selected. Vendor sales presentations are not eligible. This process ensures that the education sessions at the Seminar are of the highest quality and designed to meet the dynamic needs of today’s security management professionals. 5. 6. Dallas is affordable and less than a four-hour flight from most U.S. cities, Canada, and Mexico.

Register today6. at www.asis2010.org!

2 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 3 sponsors Schedule of Events Thank You to our Partners All events are held at the Dallas Convention Center unless noted otherwise. and Sponsors Friday, October 8 5:00 pm–6:30 pm Early Registration for Certification Reviews, Hilton Anatole Saturday, October 9 Education partners 8:00 am–5:30 pm CPP, PCI, and PSP Certification Reviews, Hilton Anatole Curso de Repaso para el examen de certificación para Profesionales de la Protección Formed in 1989, (ISC)²® is a global, not-for-profit entity known for (CPP), Hilton Anatole world class education and Gold Standard certifications. Members Sunday, October 10 in more than 135 countries are tested on the (ISC)² CBK® which 8:00 am–2:00 pm CPP, PCI, and PSP Certification Reviews, defines global standards, and abide by the (ISC)2 Code of Ethics, Hilton Anatole Curso de Rapaso para el examen de certificación para Profesionales de la Protección maintaining the integrity and professionalism of the information (CPP), Hilton Anatole security industry. 8:00 am–5:00 pm Pre-Seminar Programs and Events, Hilton Anatole Monday, October 11 The Information Technology-Information Sharing and Analysis 8:00 am–1:30 pm ASIS Foundation Golf Classic, Cowboys Golf Club Center (IT-ISAC) is a trusted community of security specialists from across the IT industry dedicated to protecting the IT infrastructure 8:00 am–5:00 pm Pre-Seminar Programs and Events, Hilton Anatole by identifying threats and vulnerabilities, and sharing best practices 1:00 pm–6:00 pm Women in Security on how to address them. 5:00 pm–6:00 pm Young Professionals’ Reception 6:00 pm–7:00 pm First-Time Attendee/New Member Reception Registration Hours ISACA is a leading global provider of knowledge, certifications, 7:00 pm–9:00 pm Welcome Reception Monday, October 11 community, advocacy and education on information systems Tuesday, October 12 assurance and security, enterprise governance of IT, and IT-related 12:00 noon–8:00 pm 7:45 am–9:00 am Opening Ceremony risk and compliance. ISACA sponsors international conferences Tuesday–Thursday, and develops international IS auditing and control standards. 9:00 am–11:00 am Exhibit Hall Grand Opening October 12–14 9:00 am–4:30 pm Exhibit Hall Open 7:00 am–5:30 pm daily

The International Association of Professional Security Consultants, 11:00 am–12:00 noon Education Sessions Friday, October 15 Inc. (IAPSC) is the most respected and widely recognized consulting 12:00 noon–1:30 pm Networking Luncheon 7:30 am–12:00 noon association in the security industry. Its rigid membership require- 1:45 pm–3:00 pm Education Sessions Exhibit Hall Hours ments ensure that potential clients may select from the most elite group of professional, ethical, and competent security consultants 3:00 pm–4:30 pm Exclusive Exhibits Review Tuesday–Thursday, available to them. 4:30 pm–5:30 pm Education Sessions October 12–14 9:00 am–4:30 pm daily 7:00 pm–10:00 pm President’s Reception, Dallas Heritage Village Wednesday, October 13 Exclusive Exhibits Viewing Tuesday–Thursday, Sponsors 8:00 am–9:00 am Keynote: Chesley Sullenberger III October 12–14 9:00 am–11:00 am Exclusive Exhibits Review 9:00 am–11:00 am 9:00 am–4:30 pm Exhibit Hall Open and 3:00 pm–4:30 pm daily 11:00 am–12:00 noon Education Sessions 12:00 noon–1:30 pm Networking Luncheon 1:45 pm–3:00 pm Education Sessions 3:00 pm–4:30 pm Exclusive Exhibits Review 4:30 pm–5:30 pm Education Sessions Thursday, October 14 8:00 am–9:00 am Keynote: President Pervez Musharraf 9:00 am–11:00 am Exclusive Exhibits Review 9:00 am–4:30 pm Exhibit Hall Open (Final Day for Exhibits) 11:00 am–12:00 noon Education Sessions 12:00 noon–1:30 pm Law Enforcement/Military Appreciation Luncheon 1:45 pm–3:00 pm Education Sessions 3:00 pm–4:30 pm Exclusive Exhibits Review 4:30 pm–5:30 pm Education Sessions 7:00 pm–9:30 pm Texas BBQ at Eddie Deen’s (ASIS Foundation Event) Friday, October 15 8:00 am–9:20 am Get Off My Cloud: Opportunities, Dangers, and Realities of Cloud Computing 9:35 am–10:55 am Perspectives on Security: What’s Your Weakest Link? 11:10 am–12:30 pm Security Insights Program: Connecting the Dots—Security and Corporate Ethics 12:30 pm–2:15 pm Closing Luncheon with Dave Barry Schedule subject to change.

4 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 5 KeyNotes and General Sessions

Chesley B. Sullenberger III Get Off My Cloud: Security Insights Program: Wednesday, October 13, 8:00 am–9:00 am Opportunities, Dangers, and Connecting the Dots—Security Captain Sullenberger became Realities of Cloud Computing and Corporate Ethics an international hero on Friday, October 15, 8:00 am–9:20 am Friday, October 15, 11:10 am–12:30 pm January 15, 2009 as the pilot Cloud computing and virtualization will Ethics. Compliance. Security. These three highly who successfully carried out dramatically affect Information Technology (IT) interwoven issues are a major concern to today’s the emergency landing of US in virtually every organization. Many will com- security professionals. This year’s program offers Airways Flight 1549 in the pletely outsource the IT function. New security an in-depth exploration of the manner in which Hudson River, saving the lives capabilities as well as exposures relating to the corporate ethics, security, and compliance affect ‘Green’ Session Handouts of all 155 passengers onboard. protection of critical information assets will be the everyday life of the conscientious practitioner. If you are registered for the full Seminar After serving as a fighter pilot, flight leader, and created. Adversaries will benefit as well, capable Panelists include the executive director of the or single day program, you’ll have two training officer in the United States Air Force, of new and more powerful attacks. This session Ethics and Compliance Officers Association ways to access handout materials: Captain Sullenberger became a commercial examines these issues and provides you with the as well as security professionals working with airline pilot and has 19,000+ flight hours. An information you need to deal effectively with this these issues. Hard copies of handout materials can aviation safety expert and accident investigator, be printed out, on-the-spot, at the print emerging technology that has the potential to Moderator: Regis Becker, CPP, Chief Compliance Sullenberger serves as the founder and CEO of change IT as dramatically as the Internet did. Officer, PPG Industries, Inc. station located near the meeting rooms Safety Reliability Methods, a consulting company in the Dallas Convention Center. dedicated to management, safety, performance, Moderator: Raymond T. O’Hara, CPP, Executive Keith T. Darcy, Executive Director, Ethics & Vice President, Consulting & Investigations, Andrews and reliability consulting. Compliance Officer Association; Donna C. Boehme, All handouts (received by ASIS) will be International Principal, Compliance Strategists LLC, former Group available for your online access, both Panel: David Cullinane, Chief Information Security Compliance and Ethics Officer, BP plc.; Perry A. in advance and after the Seminar. President Pervez Musharraf Officer, eBay; Stephen Scharf, SVP & Global CISO, Minnis, Chief Officer, Minnis and Associates; Thursday, October 14, 8:00 am–9:00 am Experian; David Tyson, CPP, CISO, PG&E; Timothy Richard M. Kelly, Corporate Compliance Officer, For those not registered to attend the Director – Global Security & Compliance, Harsco sessions, you’ll be able to purchase President Pervez Musharraf L. Williams, CPP, Director of Global Security, Corporation online access to Seminar recordings served as the 10th President of Caterpillar or on DVD. Pakistan (2001–2008) and the Co-sponsored by the Information Security Management Chief Executive of Pakistan Advisory Commission; Cloud Security Alliance; and the Closing Luncheon (1999–2001). After the attacks CSO Roundtable with Dave Barry of September 11, 2001, he also Friday, October 15, 12:30 pm–2:15 pm became America’s chief ally Humorist and best-selling in the region in the struggle author, Dave Barry was a against the Taliban, playing a crucial role in the syndicated columnist for global war on terror. 25 years whose work President Musharraf has survived two assassina- Perspectives on Security: appeared in more than 500 tion attempts; rooted out militants in his own What’s Your Weakest Link? newspapers in the United government; helped direct countless raids against Friday, October 15, 9:35 am–10:55 am States and abroad. In 1988 he won the Pulitzer Prize for Al Qaeda; and tracked Osama Bin Laden with Today, most products and services are the Commentary. He also was the inspiration for the technical and human intelligence. His candid result of inputs by numerous suppliers outside CBS TV sitcom, Dave’s World. Barry has defined memoir, In the Line of Fire, documents his the fabric of the host company, with raw materials a sense of humor as “a measurement of the struggles for the security and political future of and services resourced from all points of the extent to which we realize that we are trapped Pakistan, with high stakes for the world at large. globe. Many finished products are provided to in a world almost totally devoid of reason. consumers under familiar name brands. Yet, are Laughter is how we express the anxiety we we assured that what we receive, ingest, and feel at this knowledge.” operate performs, and is, as advertised? What is the weakest link in your supply chain that could adversely affect consumer confidence “The ASIS Seminar and Exhibits and the brand name? A panel of highly qualified is the premiere security event of experts to include those representing manufactur- the year. No other conference that ers of various types of goods examines this critical topic. I know of offers the security and Moderator: Steve Chupa, CPP, Director, Security business continuity professional Worldwide, Johnson & Johnson such a wide array of cutting-edge Panel: Ken Konigsmark, Senior Manager, Supply Chain & Aviation Security Compliance, The security technology exhibits, Company; Dr. Yossi Sheffi, Professor, learning opportunities, and Massachusetts Institute of Technology, Head of MIT’s The Power Behind the ASIS Annual Seminar and Exhibits Engineering Systems Division (ESD) and Director of ASIS International (ASIS) is the preeminent organization for security profession- the ability to benchmark your the MIT Center for Transportation and Logistics als, with more than 37,000 members worldwide. Founded in 1955, ASIS is dedi- operations with others.” (CTL); Tony Strange, Director, Channel Integrity, cated to increasing the effectiveness and productivity of security professionals by Medical Device and Diagnostic sector, Johnson & developing educational and networking opportunities that address broad security Joe Zaccaria, CPP, Security & Business Johnson interests, such as the ASIS Annual Seminar and Exhibits, as well as specific se- curity topics. ASIS also advocates the role and value of the security management Continuity Manager profession to business, the media, government entities, and the public. By providing members and the security E-Comm 9-1-1 community with access to a full range of programs and services, and by publishing the industry’s number one magazine—Security Management—ASIS leads the way for advanced and improved security performance.

6 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 7 exhibits Exhibit Hall Hours: Tuesday–Thursday ASIS 2010 Exhibits October 12–14 9:00 am–4:30 pm daily

Three exciting days to see, test, and compare all you need to meet your operational Gibraltar Material Jeron Electronic challenges in the coming year. Some 750 manufacturers, inventors, service providers, Distribution, LP Systems, Inc. GlassLock, Inc. Johnson Controls, Inc. Discover Security’s Best as we honor the and entrepreneurs will show you what’s possible in today’s high-tech security. Government Security News Jupiter Systems most innovative new technology, product, Guardsmark, LLC JVC Professional and service solutions at ASIS 2010. Gunnebo Entrance Control Products Co. Exhibitor List ASI Group Celayix, Inc. DMP GVI Security JWE DESIGNS Up to 10 winning entries will be selected from as of May 10, 2010 ASI Technologies – Chains Technology Co., Ltd. DoorKing, Inc. Hangzhou Hikvision Digital K & G Spectrum this competition open to all ASIS exhibitors. Marathon Doors Chenbro Micom (USA), Inc. Doosan Infracore Technology Co. Kaba Access Control View product information online pre- 3M Optical Systems Division ASIS International China Public Security Media Portable Power HD Protech KBC Networks and post-show—see entries ‘up close 3VR Security, Inc. ASSA ABLOY Americas Christie Digital Systems Dortronics Systems, Inc. HEAT Armor, LLC Keltron Corporation and personal’ onsite in the 5.11 Tactical Associated Locksmiths CIAS Doyon Government Group Hemi-Group/Grupo Hemas Keri Systems, Inc. A-T Solutions of America Cisco Systems, Inc. DRS Technologies, Inc. HGH Infrared Systems, Inc. KEVIS, Inc. (Korea) Accolades showcase. A. RIFKIN CO. AsticSignals Defenses, LLC Clayton Consultants/ DSI Security Services, Inc. HID Global Key Systems, Inc. A.P. Unix Software Astrophysics, Inc. Triple Canopy DSX Access Systems, Inc. Hill & Smith, Inc. Key Tracer Systems, Inc. A2eTechnologies Austin Mohawk and Company Clinton Electronics DVTel, Inc. HireRight Keyscan, Inc. MaxVision, LLC NIGHTSTICK Innovation ABM Data Systems, Inc. AUTOCLEAR (formerly Corporation DynaLock Corp. Hirsch Electronics KeyTrak, Inc. Maxxess Systems, Inc. by Bayco Access Specialties Control Screening) CNB Technology, Inc. Dynasound, Inc. HMA Consulting, Inc. Kowa Optimed, Inc. May Advertising Niscayah, Inc. International, LLC AutoGate, Inc. COBHAM Surveillance e-DATA Corporation Homeland Security Kromek International NITEK ACCU-TECH CORPORATION Automatic Systems Cobra Key Systems E-ronix, Inc. Newswire KT & C USA MBM Corporation Oberthur Technologies Action Bullet Resistant AVANTE Code Blue Corporation E.J. Brooks Company Honeywell International L-1 Enterprise Access McGard, LLC Obzerv Technologies, Inc. ADS, Inc. Aventura Technologies Cogent Systems, Inc. EasyLobby, Inc. Huffmaster Protective Division (Bioscrypt) Mean Well USA, Inc. On-Net Surveillance ADT Security Services AVIGILON Cohu, Inc., Electronics Division ECSI International, Inc. Services Group L-3 Communications MEDEX Global Group, Inc. Systems, Inc. (ONSSI) AES – IntelliNet AWID, Inc. ColorID, LLC EK Ekcessories Hughes Associates, Inc. Laminex, Inc. Medjet Onity, Inc. AFI and IMAC AXIS COMMUNICATIONS, COMMEND, Inc. ELC Security Products HySecurity Gate Operators LawMate America Meggitt Training Systems Ontario-Canada Delegation ® Aigis Mechtronics INC. Communications Supply eSolve Investigation i2, Inc. Lenel, a UTC Fire & Menda ID/Smart Clock Open Options, Inc. Aiphone Corporation B & B ARMR Corp. Management Software i3 International Security Co. MER, Inc. OPENEYE Airborne Biometrics BAE Systems ICD Security Solutions LenSec-IP Video Meridian Technologies, Inc. OPENonline Group, Inc. Baran Access Solutions “The information and knowledge ICx Technologies Surveillance MG Squared Lowering Optellios, Inc. AlarmSaf Barco ID Wholesaler LexisNexis Systems Optex All Traffic Solutions Basler Vision Technologies collected during the three days of IDenticard Systems LG Electronics USA – Iris Michael Stapleton Orion Images Corp. Allied Tube & Conduit Bass Computers, Inc./ walking the exhibits floor will benefit Identification Systems Technology Division Associates OT Systems, Ltd. AlliedBarton Security Services AVerMedia Group Liberty Uniform Mfg. Microsemi/PowerDsine Pacific Lock Company Allsafe Technologies, Inc. BearCom me for the next 12 months.” idOnDemand Co., Inc. Microsoft Corporation Panasonic System Alpha Technologies BEI Security IDVIEW LifeSafety Power, Inc. Middle Atlantic Solutions Co. ALTRONIX CORP. Bellevue University Jacinto A. Toledo, CPP, Security Advisor iJET Intelligent Risk LightLOC Divison of Products, Inc. Par-Kut International, Inc. ALUTIIQ, LLC Boon Edam, Inc. Vigilancia Privada Silgua C.A. Systems Woven Electronics MILESTONE SYSTEMS Parabit Systems, Inc. ALVARADO TURNSTILES BOS Security, Inc. Ikegami Electronics Lion Uniform Group, a G&K Minuteman UPS/Para Patriot3, Inc. AMAG Technology, Inc. Brady People ID (U.S.A.), Inc. Services Company Systems, Inc. Paxton Access, Inc. AMANO Cincinnati, Inc. BRICKCOM CORPORATION COMNET ESRI Iluminar LiveLine Mobotix Corp. Payne Fence Products American Heart Association BrickHouse Security Competitive Edge Etrovision Technology, Inc. Immervision, Inc. LockDown, Inc. Modern Industrial Pelco American Military University Brivo Systems, LLC Software, Inc. Evax Systems Imron Corporation Logical Decisions, Inc. Services, Inc. PENTAX Imaging American Physical Security Broadview Security Concentric Security, LLC EverFocus Electronics IndigoVision, Inc. LOUROE ELECTRONICS Modular Security Perceptics, LLC Group Brooklyn Computer Concept Seating, Inc. Corporation INEX/ZAMIR LSI – Lockmasters Security Systems, Inc. Pivot3 American Saferoom Door Systems, Inc. Control Risks Exacq Technologies, Inc. Infinova Schlage Institute/Lockmasters, Inc. MorphoTrak Pixim, Inc. Company Brownyard Group Contronics Technologies Feeling Software XceedID Corporation Lumidigm, Inc. Morse Watchman, Inc. Plasco ID American Science & Brownyard Programs, Ltd. CORNELL Fiber SenSys Ingersoll Rand Security M.C. Dean, Inc. NAPCO Security PlaSec, Inc. Engineering, Inc. BRS Labs Costanza Insurance Field Forensics, Inc. Technologies Madico, Inc. Technologies, Inc. PLEXTEK, LTD. American Security Bryce Fastener, Inc. Agency, Inc. Fire King Security Group Innotive, Inc. MAGICARD – Ultra NASATKA BARRIER, INC. Polaroid ID Systems Products Co. BSI Cross Match Firetide InstaKey Security System Electronics National Background Data Porta-King Building Technologies, Inc. Fisher Labs Installations, Inc. Magnetic Automation Corp. NC4 Systems Crossroads Training Academy FLIR Systems, Inc. Insulgard Security Products March Networks NEDAP POWDERSAFE Pty. Ltd. – an Andrews Int’l. Co. FLUIDMESH NETWORKS Integrated Security Marshall Electronics, Inc. Network Video Technologies PPM 2000, Inc. Admission to the Exhibits is FREE CSO Magazine FreeLinc Corporation Matrix Systems, Inc. Next Level Security PRO Barrier Engineering when you register in advance. Cygnus Security Group FreightWatch International INTELLIKEY Corporation MAXIM Integrated Systems, Inc. Protech/Protection DAHLE North America (USA), Inc. Intergraph Corporation Products, Inc. NICE Systems, Inc. Technologies, Inc. After October 8, registration is $75 for Data Management, Inc. Fujinon, Inc. International Association of nonmembers. Datacard Group Future Fibre Technologies Chiefs of Police (IACP) DataDirect Networks FutureSentry International Datastrip, Inc. G4S Wackenhut Electronics, Inc. Dayton T. Brown, Inc. GAI-Tronics Corporation InterPage Corp. Make the Most of Your Time with the American Video Equipment Building Reports DEANSTEEL MFG CO. Galaxy Control Systems INTERSEC Ameristar Fence Products C.R. Laurence Co., Inc. DEDICATED MICROS, INC. Gale Force Software Intransa, Inc. Online Show Planner! Ameritex Guard Services California University of PA Deister Electronics Corporation Investigations Canada, Inc. AMICO CALL24 Wireless Designed Security, Inc. (DSI) Gallagher Security USA, Inc. ION Applications, Inc. • Plan your session schedule. Analogic Callbox Systems DeTekion Security Garrett Metal Detectors Ionit Technologies, Inc. Andrews International Cambridge Resources Systems, Inc. GATEWORKS/VisoMetrix IQeye eStore • Search for companies, products, and services. Anixter, Inc. CAMSTAR USA DETEX Gavin de Becker & Associates IQinVision • Pre-book appointments with exhibitors, and more! AOptix Technologies, Inc. Cantronic Systems, Inc. Dewalt MOBILELOCK GBO: – GBO Security IRIS Companies Arecont Vision, LLC CAP Index, Inc. Diebold Incorporated (USA), Inc. IRIS Digital Video Systems • Select the on-floor Solutions Theater presentations Ares Corporation CapitalPlus Equity, LLC Digital ID Solutions, LLC GE Security ISIS ARH, Inc. Card Scanning Solutions Digital Management Solutions General Lock iView Systems you want to see. ARINC CBC (America) Corp. Digital Supply International Genetec J.A.M. Plastics ARMORTEX CEIA USA Digitize, Inc. GeoVision, Inc. J.C. Gury Company, Inc.

8 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 9 ASIS Certification

Protection One, Inc. Security Engineered TAMRON USA, INC. University of Denver Perform your best on the CPP, PCI, or PSP examination. Attend a certification ProxiGuard/BlueCard Machinery TASER International University of Maryland Software Technology Security Information Tatung Co. of America, Inc. University College classroom review in advance of ASIS 2010. Co., Ltd. Systems, Inc. TDIndustries, Inc. Valiant Solutions, Inc. Proxim Wireless Security Journal/Palgrave Team NiSCA Vance Int’l. de Mexico SA de Earn 19 Recertification Credits Proximex Corporation Macmillan TEAM Software, Inc. CV – an Andrews Int’l. Co. CPP Review Program #1021 Quantum Secure, Inc. Security Management Telephonics Corporation Vance Security USA Corp. – If you’re a CPP, PCI, or PSP, earning your required Quartermaster, Inc. Security Management Telular Corporation an Andrews Int’l. Co. Curso de Repaso para el credits has never been easier or more affordable! examen de certificación para Quest Diagnostics Group International Texecom Limited Ventas De Seguridad Program #1024 You can earn up to 19 recertification CPEs by Profesionales de la Protección Quintron Systems, Inc. Security Products Int’l., Inc. The Anvil Group, Ltd. Veracity USA, Inc. (CPP) attending the Annual Seminar and Exhibits. Rainbow CCTV SECURITY PRODUCTS The Loss Prevention Group Verint Video Solutions Ranger Security Detectors MAGAZINE THE MECHANIC Vicon Industries, Inc. 1. Those who register for the full Seminar PCI Review Program #1023 Rapiscan Systems Security Resources, Inc. GROUP, INC. Video Insight, Inc. (4 days) will automatically receive sixteen (16) CPE Rath Security Security Sales & Integration THE STEELE FOUNDATION Videolarm, A Moog PSP Review Program #1022 credits plus three (3) CPE credits for attendance at Raytec Magazine Theia Technologies Company the exhibit hall. (No documentation is required.) Raytheon Civil Security Solutions Group THETW Videology Imaging Communications (Visual Solutions) Tilt-A-Way/Ideal Mfg., Inc. Solutions, Inc. Prepare for ASIS Board 2. Those who register for a single day registration Solutions Security-Net Today’s Facility Manager videoNEXT Network Certification—Take a Review will automatically receive four (4) CPE credits RBH USA, INC. SecurityMan, Inc. TOKINA INDUSTRIAL, INC. Solutions, Inc. plus three (3) CPE credits for attendance at the Realtime DAR Security Today – India Toshiba Security Products VIDEX, INC. Before the Seminar exhibit hall. Research Electronics Senstar, Inc. ToteVision VidSys, Inc. Saturday, October 9–Sunday, October 10 Int’l., LLC Sentry 360 Security Hilton Anatole Hotel 3. Those who register as “Exhibits Only” can Restore Energy Systems SentryNet The most respected leaders in security manage- claim three (3) CPE credits (copy of the name RF IDeas, Inc. Serial Innovations “The number and quality of exhibits ment are board-certified by ASIS International. badge is required as a form of documentation). RGB Spectrum SGI Distinguished among their peers as credible, RISCO Group ShotSpotter, Inc. is impressive and very worthwhile 4. Those who attend as Exhibitors can claim three Robotic Security SIEDLE for gaining knowledge on competent practitioners, certificants are in high (3) CPE credits and one (1) CPE credit per session Systems, Inc. SightLogix demand by organizations within the private and that they can attend. (Copy of the name badge is ROFU International Corp. SimonsVoss companies and new products.” public sectors around the world. Prepare to earn required as a form of documentation.) RS2 Technologies, LLC SimplexGrinnell one of three ASIS designations (CPP, PCI, or RTM Soft SITE – SECURE Joe Blevins, President PSP) at the Seminar and Exhibits by attending RYTEC CORPORATION Sloan Security Group Blevins Consulting LLC a certification classroom review. Experienced Obtenga 19 créditos de S2 Security Corporation Smarter Security Systems – instructors provide a focused review of the Recertificación Safeguards Technology, LLC Fastlane Division subjects tested on each exam. Study guide is Si usted es un profesional certificado por ASIS en Safety Technology Smiths Detection Traka USA VIGITRON, INC. International, Inc. Sony Electronics Transformational Viking Electronics, Inc. included. Register online at www.asis2010.org. práctica activa y se registra para atender los Security, LLC Viscount Systems, Inc. ASIS member: $725; nonmember: $925 cuatro días del seminario, obtendrá 19 créditos TransNational Security Watec/Genwac para su certificación. Group, LLC Wausau Tile, Inc. TransTech Systems, Inc. WeatherData, an Certification Reviews— 1. Los que se registre para participar los cuatro Travel Guard AccuWeather Co. Audit Only días del seminario recibirán automáticamente 16 Tridium Webster University If you have attended a certification review or CPE créditos por atender las sesiones más 3 CPE Truescreen, Inc. WEISER SECURITY online review in the past two years, you have créditos por atender el salón de exhibiciones. SERVICES, INC. Tyco International the option to audit a review program at a U.S. Postal Inspection Weldex Corporation 2. Los que se registren por un día recibirán Service West, a Thomson Reuters reduced cost. (Applicable only to the same type automáticamente 4 CPE créditos por atender las U.S. SECURITY Business of review previously attended. This does not sesiones más 3 (CPE) créditos por atender el salon ASSOCIATES, INC. Whelan Security Co. apply to attendance at a chapter review.) Audit de exhibiciones. UDP USA Whitaker Brothers, Inc. fees are $275 for members and $400 for 3. Los que se registren para visitar solamente Uncle Mike’s Law Winland Environmental nonmembers. Study guides are not included. Enforcement Security las Exhibiciones recibirán 3 CPE créditos. El Underwriters Winsted Corporation Formulario de Recertificación deberá ser comple- Laboratories, Inc. WinTec Security USA tado y se requiere copia de la insignia (badge). UniPro Uniforms WIRECRAFTERS, LLC “The ASIS Annual Seminar and United States Bullet X-Test 4. Los que participan como Exhibidores recibirán Proofing, Inc. XTec Incorporated Exhibits is THE must attend 3 CPE créditos y 1 CPE crédito por sesión que SAIC Southwest Microwave, Inc. Universal Safety Response – Xtralis event for security professionals puedan participar. El Formulario de Recertificación Salient Systems SPAWAR SYSTEMS GRAB Barrier Zebra Technologies deberá ser completado y se requiere copia de la Salto Systems, Inc. CENTER, CHARLESTON Universal Services of Zippy Technology Corp. seeking a one-stop shop for insignia (badge). Samsung Techwin SPECO Technologies America ZKSoftware, Inc. Sarnoff Corporation Stanley Security UTC Fire & Security networking, education, personal Scallop Imaging Solutions, Inc. development and hands-on Schirmer Engineering StarDot Technologies Corporation STENTOFON/Zenitel Group familiarization with the newest Schneider Electric Stone Panels, Inc. advances in security School Planning & STOPware, Inc. Management/College Stretch, Inc. technology.” Planning & Management Sunex, Inc. SDC-Security Door Controls SUPERCIRCUITS, Inc. Richard Goss, CPP, Managing Director SDM & Security Magazines T.S. MicroTech, Inc. Corporate Protective Solutions Limited SecurAmerica, LLC T3 Motion, Inc. Securitas Security TACT Squad Services USA TagMaster North Securitech Group, Inc. America, Inc. Security Director News and TAKEX AMERICA, INC. Security Systems News TALK-A-PHONE CO.

10 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 11 CSO Roundtable

The CSO Roundtable provides a dedicated forum for the most Distinguished Speaker Series: Conducting International senior security professionals from the largest and most influential Pervez Musharraf Due Diligence organizations in the world. An initiative of ASIS International, Thursday, October 14, 10:15 am–10:45 am Thursday, October 14, 4:30 pm–5:30 pm the CSO Roundtable’s missions are to gain recognition for and After his ASIS keynote presentation on Thursday, If you work for a multinational company, how enhance the standing of the CSO position; to assist CSOs in job the former premier of Pakistan will hold an do you vet potential partners? Locate and hire intimate, 30-minute session exclusively for new employees overseas? Do you know the performance, leadership and professional development; and to members of the CSO Roundtable. Questions for legal restrictions and cultural niceties in every develop the next generation of corporate CSOs. the ex-president must be in written form and country in which your organization has offices? submitted in advance. For CSO Roundtable This session will examine these challenges and The CSO Roundtable has developed a track of sessions targeting the specific needs members only. provide some clear-cut advice on how to find of CSOs and their top deputies, described below. In addition, a private lounge with partners you can trust when working overseas. food and top-shelf spirits will be open to CSO Roundtable members at the President’s The CXO View of Security For CSO Roundtable members and those eligible Reception at Dallas Heritage Village at Old City Park on Tuesday, October 12, from Thursday, October 14, 11:00 am–12:00 noon to apply only. 7:00 pm–10:00 pm. The lounge will be open to paid CSO Roundtable members only. Perception of security risks changes depending James Wygand, Principal, Critical Corporate Issues on where you sit; and if you sit in the CEO’s or (CCI); Frank Schurgers, Managing Director, Integris International, Ltd. the CFO’s office, risks look very different than Session Schedule Great Risks, Great Deeds: they do to security professionals. Learning how the rest of the C-suite recognizes and evaluates Get Off of My Cloud: An Update on ESRM these risks, and understanding their perception Distinguished Speaker Series: Wednesday, October 13, 11:00 am–12:00 noon Opportunities, Dangers, and of the security professional’s job, are critical skills Realities of Cloud Computing Dennis Hastert Open to all paid attendees. See page 34 for for security leaders. This session will allow CXOs Friday, October 15, 8:00 am–9:00 am Tuesday, October 12, 11:00 am–12:00 noon details. to discuss the perception of security throughout Hastert, Speaker of the U.S. House of the organization and provide guidance on how Open to all paid attendees. See page 55 for Representatives from 1999 to 2007, will offer Career Guidance for security can raise its profile. For CSO Roundtable details. his views on the state of Congress and the federal Security Executives members only. government as a whole. Drawing on his active Wednesday, October 13, 1:45 pm–3:00 pm 20-year tenure in Congress and as a member of Dickstein Shapiro’s public policy and law practice, When security executives are looking for new Hastert will forecast scenarios that might follow career opportunities, it’s not enough to have the crucial 2010 midterm elections. Gain an an impressive background. Without a strong enhanced picture of the U.S. political landscape résumé and excellent interview skills, moving and what that might mean for private security up the ladder is all but impossible. This session, led by executive recruiters who specialize in the Nobody Expected a Volcano: legislation and regulation. For CSO Roundtable ALL INFORMATION ABOUT ALL INFORMATION ABOUT ALL INFORMATION ABOUT members and those eligible to apply only. security industry, will help attendees to update Protecting the Supply Chain their résumé and polish their interview skills so that they’re prepared to embrace new career No Matter What Happens Thursday, October 14, 1:45 pm–3:00 pm So You Want to Be a CSO? opportunities. For CSO Roundtable members ASIS 2010 Tuesday, October 12, 1:45 pm–3:00 pm and those ASISeligible to apply 2010 only. TheASIS crisis caused 2010 by the Iceland volcano eruption this spring highlighted the dangers of having a SEMINAR & Open to all paid attendees. See page 28 for Jerry Brennan,EXHIBITORS President, Security Management globalSESSIONS supply chain. This session will look at how details. Resources;AT Peter YOUR French, FINGERTIPS CPP, CEO, SSR Personnel AT YOUR FINGERTIPS EXHIBITS to evaluate the risks in a supply chain and explore AT YOUR FINGERTIPS the best practices that will help keep that chain Distinguished Speaker Series: open—even in times of chaos. Responses to a Chesley B. Sullenberger III VISIT CSO RoundtableVISIT survey about the issues faced VISIT Wednesday, October 13, 10:15 am–10:45 am “The CSOwww.asis2010mobile.org events at the Seminar bywww.asis2010mobile.org businesses during the crisis will be discussed www.asis2010mobile.org After his ASIS keynote presentation on Wednes- were a resoundingFROM YOUR SMARTPHO successNE last as well.FROM For YOUR CSO SMARTPHO RoundtableNE members and those FROM YOUR SMARTPHONE day, Captain Sullenberger, the quick-thinking pilot eligible to apply only. year (2009).” who saved 155 passengers by landing a stalled Bryan Fort, CPP, Manager, Corporate Security, Airbus A320 on the Hudson River, will hold an Marshall Sanders, Vice President, McCormick & Company, Inc.; Christopher Mark, intimate, 30-minute Q&A session exclusively for Corporate Security Corporate Director of Security, American Sugar members of and those eligible for membership in Refining, Inc.; Bernie Sullivan, Corporate Security the CSO Roundtable. For CSO Roundtable SRA International Manager, PPG Industries, Inc.; Walt Fountain, members and those eligible to apply only. Director, Loss Prevention and Enterprise Security, Schneider National, Inc.

12 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 13 Pre-Seminar PRograms and Events

Make the most of your time and resources in Dallas by adding one or more of these The Reality of Threat Assessment Women in Security exciting programs to your agenda. These optional events are scheduled prior to the and Response Monday, October 11, 1:00 pm–6:00 pm official opening of the Annual Seminar and Exhibits. Additional fees apply where noted. Monday, October 11, 8:00 am–5:00 pm Join your colleagues for this half-day Most programs will be held at the Hilton Anatole Hotel. This full-day program takes emergency manage- ment and planning to a new level. We consistently special program, sponsored by the CSO hear about threat analysis, risk management, and Roundtable, addressing the unique Pre-Seminar programs Beyond the Basics: other descriptions of programs that set forth challenges you face as a professional Next Steps for Protecting professional guidelines to deal with crises. This woman in the security industry. The Successful Security program introduces the concepts involved in Consultant Faith-based Organizations Registration fee: $50 Monday, October 11, 8:00 am–5:00 pm determining realistic threats facing any facility or Sunday–Monday, October 10–11, institution and proceeds through the best practices Houses of worship and other faith-based 8:00 am–5:00 pm methodology of analyzing and mitigating those How to Promote Yourself organizations continue to be targets of both Launch a new security consultant practice or threats. Experienced professionals in emergency 1:00 pm–2:00 pm opportunistic crime as well as planned criminal jump-start an existing one—this popular, two-day management lead you through a practical, Trying to negotiate a salary increase during the activity and were recently identified as one of program will show you how! Learn from a faculty hands-on exercise in dealing with crisis situations. economic downturn? Seeking a flexible work the top five at-risk sectors for terrorism. This of seasoned consultants how to avoid the schedule? Hoping to give your resume an edge session walks you through the risk management Sponsored by International Foundation for Cultural expensive mistakes that can sabotage your in a competitive job market? Join our panelists process and provides justification for develop- Property Protection (IFCPP) and Layne Consultants success. The program is filled with practical —who have dozens of years of collective ment of a new houses of worship security International (LCI) information that will save you time, money, and experience in recruiting, human resources, and program or the growth of an existing one. frustration. Take home a comprehensive work- ASIS member: $395; corporate security—to learn how to put your Specific topics include security management, book of sample proposals and reports that give nonmember: $495 best face forward in all aspects of business. risk assessment, crime prevention, emergency you a clear advantage when competing for a Program #1086 planning, and terrorism awareness. This session Panel: Kathy Lavinder, Executive Director, security consulting assignment. offers a non-denominational approach and is SI Placement, Inc.; Stephanie Angelo, SPHR, President & Owner, Human Resource Essential, Sponsored by International Association of Professional open to attendees from all houses of worship LLC; Ed McDonough, CPP, Director of Security Consultants (IAPSC) and faiths. Young Professionals’ Global Security, Tyco ASIS member: $595; Sponsored by the ASIS Cultural Properties Council; nonmember: $695 Faith-based Organizations Security Committee Leadership Series Staying Competitive While Program #1082 Monday, October 11, 3:30 pm–4:45 pm ASIS member: $195; nonmember: $245 Managing the Work/Life Balance The first program of this inaugural series provides a Program #1084 2:00 pm–3:00 pm review of The Leadership Code: Five Rules to Lead Everyone wants to maximize their work/life Detecting Deception in Verbal By. “The book, in a brief and clear way, combines Facility Security Assessment balance by maintaining a close home life while and Written Statements the frameworks, tools, processes, and studies of and Initial Conceptual Design leadership to identify the essential rules that govern still climbing the corporate ladder. As a woman, Sunday–Monday, October 10–11, is it possible to do both? Have you ever had to Monday, October 11, 8:00 am–5:00 pm what all great leaders do.” Discover a compelling 8:00 am–5:00 pm settle for a lesser job because of life conflicts? Explore initial security design topics leading and practical guide for developing organizational The ability to determine truth vs. deception Is there a “motherhood penalty”? This session to: the identification of risks and the definition capabilities for business success. A must for in written or verbal statements is crucial for will focus on tips to staying relevant in the of functional requirements; the definition aspiring leaders and managers! No admission fee. today’s investigators, security and loss prevention workplace when you have a home life and give and preparation of the basis of design and managers, and law enforcement professionals. examples of real women and their experiences assessment report; the definition and preparation This practical, two-day program will help you Young Professionals’ Reception managing a work/life balance. of the conceptual design and supporting master this skill and become more effective when Monday, October 11, 5:00 pm–6:00 pm documentation; the preparation of the initial Panel: Natalie Runyon, Vice President, interviewing or interrogating witnesses and Connect with this group of up and coming Leadership and Training, Goldman Sachs; Lorrie construction cost estimate; and the preparation suspects, investigating crimes, or reviewing industry leaders to network, share ideas, and Bentley-Navarro, CPP, Deputy Director Security, and presentation to management of a business written statements. discuss the unique challenges you face in a relaxed SAS Institute case for security. The program is particularly atmosphere. No admission fee. Partnered with Dietz and Associates relevant for practitioners responsible for an Moderator: Normadene Murphy, Manager-In- ASIS member: $595; nonmember: $695 organization’s security systems design, Charge, Guardsmark Program #1083 implementation, and operation. Break Sponsored by the ASIS Security Architecture & Engineering 3:00 pm–3:30 pm Council ASIS member: $395; nonmember: $495 Women in Security: Program #1085 An Open Session 3:30 pm–5:00 pm Picking up where the 2009 ASIS women’s program in Anaheim left off, this open session will allow participants to pose their questions and discuss their experiences in an open forum with their peers. Questions and topics will be submitted in advance of the program. Moderator: Tanya Spencer, Director, TrainingSolutions Networking Reception 5:00 pm–6:00 pm

14 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 15 Pre-Seminar PRograms and Events

professional Tours

Dallas Police Department Tour “ASIS met all my expectations. Monday, October 11, 1:30 pm–4:00 pm Safety is the single most important challenge The exhibits were pertinent to my facing the city of Dallas. One of the ways the applications and I learned a very Dallas Police Department is fighting crime is great deal, especially of future through a successful public/private partnership utilizing wireless video surveillance technology trends and technologies in video in the downtown area. surveillance. A worthwhile show The tour commences from the convention center for anyone involved with security and includes driving through a key surveillance area near downtown Dallas en route to police issues.” headquarters where you will learn about the Michael J. Jenkins, Industrial Electronics public/private partnership and implementation results. You will tour the Dallas PD’s video Maintenance Tech. surveillance monitoring center and receive an Northrop Grumman Corp. explanation of the video surveillance technology. A senior police official will deliver a summary presentation describing how the Police Depart- ment is using the technology, crime-fighting results, benefits, value, and future plans for the city and Police Department as they relate to the use of physical security technology. The vip Follow ASIS2010: $50 per person (includes transportation) Program #1087 Alumni Program Dallas Cowboys Stadium Tour Monday, October 11, 1:15 pm–4:30 pm Rewards LoYalty Dallas Cowboys security, law enforcement, and even federal officials describe security plans and measures at Cowboys Stadium as state-of-the- art, well rehearsed, and tightly collaborative. Constant communication is the backbone for much of the strategy of handling events and games. The stadium has a ground-level control If you have attended the Annual Seminar as a paid room and a command center high above the structure’s floor—and detention facilities for those attendee for the past three years, you are eligible to who might commit crimes at the stadium. participate in the VIP Alumni Program. On the tour, hear from Cowboys Stadium security and A/V officials, and get a backstage tour of the This program is our way of saying ‘thank you’ for your electronic and security systems of the stadium. loyalty to the industry’s leading security event, and the Learn about the capabilities of the command center, the brain of the entire operation. While one event you won’t want to miss. many of the security features of the stadium will be available for viewing, the control room will remain off limits. Tour description and availability is subject to As a VIP Alum, you’re entitled to these benefits:* change without notice. $50 per person (includes transportation) • Free Pre-Seminar Program or Industry Tour of your Program #1088 choice (ASIS Council-sponsored programs and Industry Tours only) • VIP recognition on your badge • Opportunity to win a ticket to a VIP book signing

Register today!

*Applicable to full or single day paid registrants only.

16 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY Focus on Homeland Security

This year’s comprehensive education program includes 31 sessions in the homeland Wednesday, October 13 Thursday, October 14 security track. If you’re responsible for protecting the homeland, these topics, presented by leading experts from government and industry, may be of special interest 11:00 am–12:00 noon 8:00 am–9:00 am to you. But don’t limit yourself to these sessions—you’re sure to find additional Water: The Next Battleground Keynote: President Pervez Musharraf relevant topics throughout the program. (See Education Sessions beginning on page Alan Nutes, CPP, Security Manager, City of Atlanta 20 for full details.) CFATS Implementing and Maintaining a Compliant Program 11:00 am–12:00 noon Dan Walters, CPP, Manager Security & The Chemical Facility Anti-terrorism TUESDAY, OCTOBER 12 1:45 pm–3:00 pm Environment Risk, Terra Industries; Sue Standard (CFATS): Beyond the SSP Securing Soft Targets Armstrong, Director, Infrastructure Security Michael Saad, CPP, Senior Director Consulting 11:00 am–12:00 noon Compliance Division, U.S. Department of Homeland Services, Huffmaster Crisis Response, LLC; Wade James C. Reynolds, CPP, Director of Safety and Financial Institutions Counter Terrorism: Security; Dennis Deziel, Acting Director, U.S. Pinnell, CPP, Vice President, Huffmaster Companies; Security, Hilton Hotels Corp.; David Bareño, CPP, Department of Homeland Security Evan Wolff, Director, Homeland Security Practice A Public/Private Partnership Detective Tourist Crimes, Orange County Sheriff’s Resources Regulatory and Environmental Law, Steven Bullitt, Assistant to Special Agent in Charge Office; Sheldon Lightfoot, CPP, Security Manager, Lessons Learned from a Kidnapping Hunton and Williams and Supervisor of the North Texas Electronic Crimes Six Flags Great Adventure; Andrea Schultz, Tom Robertson, CPP, Director, Sun Life Financial Task Force, USSS Dallas Field Office; Leland Dean, Department of Homeland Security CPP, CFFSP, CFSVP, Global Corporate Security/ Security Profiling: Overcoming Southwest U.S. Regional Manager, The Bank of New An A–Z Approach to Protect the Food the Controversy 1:45 pm–3:00 pm York Mellon Protection Stream that Meets Regulation Zvi Kremer, Managing Director, EstablishNet Homeland Security Policies: Impact on and Customer Expectation International, LLC Understanding Islam: A Candid Look William Ramsey, Security Director, McCormick and Business, Immigration, and Privacy Nawar Shora, CEO, Shams Training and Company, Inc.; Frank Pisciotta, CSC, President, Benjamin Frankel, Editor-in-Chief, Homeland Development Business Protection Specialists, Inc.; Dr. James Security Daily News Wire Pastor, President, SecureLaw Ltd. and Associate 1:45 pm–3:00 pm The Implications of Northwest Professor, Calumet College of St. Joseph Can Hotels Really Protect Tourists and Flight #253 on Christmas Day Behavioral Pattern Recognition: Guests from Emerging Threats? A Proactive Approach to Douglas Laird Sr., CPP, President, Laird and The Future of Security: Insider Threat Dr. Randy Atlas, Ph.D., CPP, AIA, Vice-President, Associates, Inc. Homeland Security Atlas Safety and Security Design, Inc.; Patrick and Pre-employment Screening David Harel, Managing Director ASERO Israel, Berndt Rif, CPP, Senior Security Policy Adviser, Murphy, PSP, CPP, Director of Loss Prevention, ASERO Worldwide Bioterrorism: Understanding the De Nederlandsche Bank; Chris M. Wright, CPP, Marriott International, Inc. Threat and Designing Responses President, The Wright Group; Michael D. Moberly, Protecting Your Business: Explosive Threats and Target Hardening: Dr. Jeffrey Simon, President, Political Risk President/Founder, Knowledge Protection Strategies Understanding Islam and Islamofacism Assessment Co., Inc. (PRAC) A Study in Explosives Environment Col. Michael Trapp, CPP, Principal Scientist, Physical Security Response Applied Research Associates 4:30 pm–5:30 pm Jeffrey Slotnick, PSP, President, Setracon Law Enforcement/ Cyber Series: Advanced Persistent Incorporated Military Appreciation Day Behavior Detection and Other Practices Threats and Botnets—Why Your Business for Protecting Retail Facilities from Should Be Concerned Ten Years after 9/11: What’s Changed Terrorism Carlos Villarreal, Senior Vice President, Commercial Thursday, October 14 David Morgan, Associate, ; Real Estate Division, Whelan Security; Glen Michael Rozin, Special Operations Captain, Mall of Rodney Thayer, CTO, Secorix Kitteringham, CPP, Director, Security and Life If you are an active law enforcement America Security Department; Doug Reynolds, Safety, Western Canada, Brookfield Properties or military professional, you are invited Director of Security, Mall of America Security Animal Activism and Ecoterrorism Corp.; Mark Wright, Regional Director of Security, to attend the keynote with President Department; Eric White, Director of Retail Strategy, Olle Fjordgren, CPP, Security Advisor, GRANIT Brookfield Properties; Keith Kambic, CPP, Director Pervez Musharraf, as well as Thursday’s Wren Solutions Sakerhet of Security and Life Safety, U.S. Equities Asset sessions and the Exhibits—at no charge. Management To obtain your complimentary registration Active Shooter and Force-on-Force for this special day, register onsite in Advancements in Simulations 4:30 pm–5:30 pm Military Security Operations in Dallas at ASIS Registration. Government Joseph L. Smith, PSP, Director/Senior Vice Afghanistan/Iraq President, Applied Research Associates Advancing DoD Security Capabilities or military photo ID is required. Joseph Rector, CPP, PSP, PCI, Deputy Chief of through Professionalization and Security Forces, U.S. Air Force 21st Century CPTED and Infrastructure Certification Protection Daniel McGarvey, Director, Information Protection, Where in the World Are You? Device Dr. Randy Atlas, Ph.D., CPP, AIA, Vice-President, U.S. Air Force; Reese Madsen, Jr., DoD Intelligence Tracking at the Enterprise Level Atlas Safety and Security Design, Inc. Chief Learning Officer, DoD Human Capital Office; Critical Infrastructure Protection Undersecretary of Defense (Intelligence); Dr. Joselito Lualhati, Principal and Director – Strategy, Research, Operations and Resources from DHS and Development, The Global Skills Xchange 4:30 pm–5:30 pm Steven G. King, CPP, Division Director, U.S. Department of Homeland Security Electricity Grid Protection during the 2010 Winter Olympic Games Doug Powell, CPP, PSP, Manager, Corporate Security, British Columbia Hydro Indications and Warning of Attack: Three Paths to Effective Identification Lydia Wilson, Program Manager, FBI Chief Security Officer Training, SRA International, Inc. Mass Notification and Rapid Response Denise Chatam Walker, Chief Emergency Management Officer, Lone Star College System; Rudy Wolter, CPP, Senior Vice President, CitiGroup

18 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 19 EDUCATION Sessions Education Sessions LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced Tue NEW

Tuesday, October 12 • Schedule-at-Glance All sessions will be held at the Dallas Convention Center. LEVEL Arch/Eng/Design Crime/ Loss Prevention Crisis Management Critical Infrastructure Global Government/ Military Homeland Security Info/IT Security Information Protection Investigations Legal Management Physical Security Privacy Professional Development Terrorism Young Professionals en Español 11:00 am–12:00 noon ASIS Standards: Preparing for the World’s Largest Sporting Event ● X X War Driving: Drive, Detection, and Defense for Wireless Networks ● X X X Financial Institutions Counter Terrorism: A Public/Private Partnership ■ X X X Outsource This: Getting the Cloud to Work for Your Physical Security Operation ▲ X X The Convergence of Organizational Resilience Management, Crisis Management, and Business Continuity Management ■ X X X Managing the Media in Crisis Situations ■ X X X X Food Contamination: A Cross Agency Investigation ▲ X X X X Understanding Islam: A Candid Look ● X X X X The Implications of Northwest Flight #253 on Christmas Day ● X X X X Streamlined Security Solutions: CSO and CIO Working in Tandem ■ X X X The “No Dark Corners” Approach to Insider Threats ■ X X X Security Excellence: Tools to Enhance Security’s Mission ■ X X X Proactive Approaches, Tools, and Equipment that Can Increase Safety and Security in Parking Structures ■ X X X The Utility Security Manager’s Handbook ■ X X X X Taking Governance Forward: Key Concepts of Governance and Management ● X X X Bioterrorism: Understanding the Threat and Designing Responses ■ X X X X High Risk Operations: Mexico, a Case Study for Security Supporting Business ● X X X X 1:45 pm–3:00 pm What’s New on the Floor? ● X X X ASIS Standards: Protecting Your Assets—How Mature Are You? ● X X Securing Soft Targets ▲ X X X X Making the Decision: Transitioning from Proprietary Security to Contract Security ■ X X X An A–Z Approach to Protect the Food Protection Stream that Meets Regulation and Customer Expectation ▲ X X X X X Layoffs and Terminations: When Hostility or Violence Are a Concern ■ X X X X Technology in Public/Private Partnerships: Blending Technology for Crisis Management ● X X X X Keeping Your Mobile Electronic Assets and Data Safe While Traveling ■ X X X X X X Workplace Violence: Issues in Lethality, Intimate Partner Violence, and Stalking ■ X X X X X Caution Advised! The Use of Social Networking Sites and Search Engines to Screen Applicants ● X X X X Close-in Protection: Mexico City ■ X X Getting Your Boss to Listen to You: The Seven Disciplines of the Trusted, Strategic Advisor ▲ X X X X Protecting Intelligence: Technology, Friend or Foe? ■ X X “Do You Hear What I Hear?” An Examination of Forensic Content Analysis of Verbal Statements ● X X The Future of Security: Insider Threat and Pre-employment Screening ■ X X X X X So You Want to Be a CSO? ● X X X Managing Remote and Third Party Access to Networks ■ X X X 4:30 pm–5:30 pm Beyond Borders: Practicing Role-Based Security in a Brave New World ■ X X X Social Networking, Media, and Your Personal Development ● X X X Payroll Manipulation: Neither an Officer nor a Gentleman ■ X X X Behavior Detection and Other Practices for Protecting Retail Facilities from Terrorism ■ X X X X Active Shooter and Force-on-Force Advancements in Simulations ■ X X X X X Speaking Bean ▲ X X X Breaking the Bank: The Latest Cyber Attacks against Financial Institutions and Their Customers ▲ X X X X 21st Century CPTED and Infrastructure Protection ■ X X X X X X X Integrating Security and Business Continuity ■ X X X Creating a Security Conscious Corporate Culture ■ X X X Gaining the Competitive Edge with AHA First Aid, CPR, and AED Training ● X X Disasters in Haiti and Chile—Lessons in Organizational Resilience ■ X X X Changing Times in Forensic Science and the Impact of Advanced Scientific Technologies ● X X Practical Measures to Protect Your Security Systems from Insider and Outsider Attacks ■ X X Critical Infrastructure Protection Operations and Resources from DHS ■ X X X X Aplicación del modelo de ASIS International para proteger a las organizaciones frente al terrorismo ■ X X X (Application of ASIS International Model to Protect Organizations against Terrorism)

20 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 21 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced Tue Tuesday, October 12 • 11:00 am–12:00 noon Tuesday, October 12 • 11:00 am–12:00 noon

11:00 am–12:00 noon ▲▲Outsource This: Getting the ■■ Managing the Media in ●● The Implications of Northwest Cloud to Work for Your Physical Crisis Situations Flight #253 on Christmas Day ●● ASIS Standards: Preparing for Security Operation When a “newsworthy” incident occurs, it can Passenger screening for international flights is the World’s Largest Sporting Event Does a cloud-based security solution follow a become a crisis even if handled correctly. Training complex and security measures evolve continu- simple “price-times-quantity” model that allows can help you craft an effective message to protect ously to meet ever-changing threats. Use of The 2010 FIFA World Cup in South posed you to pay only for what you use? What happens your brand during these situations. This session technologies and profiling are debated in relation a significant risk management challenge, both in when expected volumes change? Can you afford will review basic assumptions when dealing with to privacy in a free society. In order to prevent a terms of security and continuity of operations. to not use the cloud for your security practice? reporters. Actual news footage of incidents will successful attack against a commercial , The Tsogo Sun Group, Africa’s largest hotel This session will examine total cost of ownership, be shown and participants will get a “behind the there must be “buy-in” from the public. What has chain, met the challenge at their properties by technical support, connectivity, bandwidth usage, scenes” look at the preparation and planning that been done following the Christmas Day attack, implementing the ASIS/ANSI Organizational and integration opportunities. It also will explore went into handling the media in each incident. and is it effective? What additional changes can Resilience Standard. The world’s first pilot test of a typical security service provider that could end we expect to see in the near future? Join us as the new Standard demonstrated a cost-effective, William Alford, President, International up being the lower-cost option over time. Lighthouse Group we explore these important issues. combined approach to security and continuity management. Learn how your organization can Steve Surfaro, Channel Manager, Axis Sponsored by the ASIS Retail Loss Prevention Council Douglas Laird Sr., CPP, President, Laird and Associates, Inc. do this as well. Communications; Douglas Curtiss, CEO, Sonitrol Systems; James P. Litchko, CEO, Sponsored by the ASIS Transportation Security Council Gert Cruywagen, Director of Risk, Tsogo Sun Group; ▲▲Food Contamination: A Cross Cyber Security Professionals Colin Ackroyd, Risk Manager, Tsogo Sun Group; Agency Investigation Johan Du Plooy, CPP, Senior Partner, TEMI Group Sponsored by the ASIS Physical Security Council ■■ Streamlined Security Solutions: The food stream can become contaminated in Sponsored by the ASIS Standards and Guidelines a variety of ways. Sorting out threats to naturally CSO and CIO Working in Tandem ■■ Commission The Convergence of Organizational occurring or intentional actions is the initial step As organizations attempt to address cybersecu- Resilience Management, Crisis in responding to and investigating such an rity threats, many of them are unwittingly wasting ●● War Driving: Drive, Detection, Management, and Business incident. This session will review how those money and increasing operating costs by and Defense for Wireless Networks Continuity Management agencies responsible for regulation and enforce- duplicating security functions. Security directors As the use of wireless networks and systems Much of the discussion regarding security ment work together with the private sector to are being sidelined as IT leaders develop using handheld devices increases, so does the convergence revolves around physical and IT determine the cause, intent, and criminality of investigative procedures, cyber security policy, risk that their exposures and vulnerabilities will security. However, the convergence of organiza- food contamination. sanctions, and briefings independently. Hear be exploited. Even as these technologies change tional resilience (OR) management, crisis William Ramsey, Security Director, McCormick and how one organization accomplished their ultimate constantly, the opportunities for penetration of management, and business continuity manage- Company, Inc.; George Hughes, Senior Advisor goal of effective IT security through collaboration these systems also increase. This session will ment is often overlooked. This session addresses Counter Terrorism and Intelligence, Office of Criminal and streamlining, and discuss techniques for explore the basics of wireless networks, existing this convergence and the inherent involvement Investigations Headquarters, Food and Drug maximizing effectiveness, capitalizing on existing controls, techniques used by perpetrators, and of both physical and IT security. It will also show Administration practices, and multiplying the efficiencies of your enhancements that can be implemented to how to integrate them into an existing physical Sponsored by the ASIS Agriculture and Food Security cyber security program. provide a more secure environment. security and IT security program. Council Shawn S. Daley, Chief Security Officer, MIT Lincoln Laboratory; Joseph Flynn, Chief Information Officer, Alan Nutes, CPP, Security Manager, James Leflar, Jr., CPP, Security Administrator, Johns ●● MIT Lincoln Laboratory City of Atlanta Hopkins Bloomberg School of Public Health; Donald Understanding Islam: Knox, CPP, Security and Crisis Management Analyst, A Candid Look Sponsored by the ASIS Defense and Intelligence Council Caterpillar; Sam Stahl, Manager, EMC Corporation; ■■ For a decade, these sessions have helped Financial Institutions Counter Bruce T. Blythe, CEO, Crisis Management demystify and explain Islam, Arabs, and the Terrorism: A Public/Private International, Inc. surrounding cultures. The session will begin with Partnership Sponsored by the ASIS Crisis Management and Business a pop quiz used in FBI, DOJ, and DHS training, Continuity Council The USSS Electronic Crimes Task Force contin- followed by an interactive dialogue to address ues to take a leading role in stemming terrorist misconceptions and perceptions about the “My experience was great, I not financing. In a true collaboration of public law Muslim and Arab communities. Topics include enforcement and private industry leaders, terrorist social and behavioral norms and mores, basic only network with other security funding pipelines have been stymied. Learn the history and geography, jihad, terror in the name professionals, visit the exhibits latest techniques and gain insight to relative of Islam, and other related subjects of interest. cases from the USSS. Additionally, hear from a and see what’s new but also have major financial institution’s security manager on Nawar Shora, CEO, Shams Training and Development the opportunity to attend great programs in place and the team work that has made it increasingly difficult for terrorist groups sessions with top presenters. to acquire illicit funds. There is no other program out Steven Bullitt, Assistant to Special Agent in Charge there that can provide this and Supervisor of the North Texas Electronic Crimes Task Force, USSS Dallas Field Office; Leland Dean, experience at this top level.” CPP, CFFSP, CFSVP, Global Corporate Security/ Dennis Quiles, Director Corporate Security Southwest U.S. Regional Manager, The Bank of New York Mellon McDonald’s Corporation Sponsored by the ASIS Banking and Financial Services Security Council

22 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 23 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced Tue Tuesday, October 12 • 11:00 am–12:00 noon Tuesday, October 12 • 11:00 am–12:00 noon • 1:45 pm–3:00 pm

■■ The “No Dark Corners” Approach ■■ Proactive Approaches, Tools, and ■■ Bioterrorism: Understanding the ●● ASIS Standards: Protecting Your to Insider Threats Equipment that Can Increase Safety Threat and Designing Responses Assets—How Mature Are You? While an adversary who makes a frontal attack and Security in Parking Structures For decades, the threat of bioterrorists has been In today’s economic climate, how do you can be anticipated, one who attacks from within Discover proactive techniques, training, tools, widely discussed. However, as there has yet to combine security, crisis, and continuity manage- poses a different challenge. Adapted from the and equipment for increasing the perception of be a major bioterrorist attack, there is a growing ment cost effectively into one comprehensive 2009 winner of the Outstanding Thesis Award by safety and security in parking structures, reducing sense of skepticism and complacency regarding resilience strategy? ASIS pioneered and pilot- the Center for Homeland Defense and Security, incidents, and increasing ROI. Review cases that this threat. The history of terrorism, however, tested the world’s first phased implementation Naval postgraduate School, this session distills examine foreseeability, notice of prior criminal teaches us to never underestimate the intentions of the ASIS/ANSI Organizational Resilience insights of experts from mature security disci- incidents, and security that have an impact on and capabilities of terrorists. This session focuses Standard to help your company be better plines such as counterespionage and workplace litigation. The role of security leaders in equipping on why, despite the lack of a major attack so far, prepared for disruptions without breaking the violence to uncover flaws in traditional defenses. and training, standards of care, best practices, the bioterrorist threat is actually growing and what bank. Get management buy-in, build momentum Recommendations run counter to accepted and the role of CPTED in parking structures will we should be doing to prepare for this contingency. to achieve your goals, and become “mature.” wisdom, shaping the contours of a “No Dark also be addressed. Dr. Jeffrey Simon, President, Political Risk Marc Siegel, Commissioner, ASIS Global Corners” approach that applies and extends Anthony DiSalvatore, CPP, PCI, PSP, Director of Assessment Co., Inc. (PRAC) Standards Initiative Newman’s and Kelling’s seminal theories. Security, The Cosmopolitan Resort Casino Sponsored by the ASIS Standards and Guidelines Nick Catrantzos, CPP, Security Unit Manager, ●● High Risk Operations: Mexico, a Commission Metropolitan Water District ■■ The Utility Security Manager’s Case Study for Security Supporting Handbook Business ▲▲Securing Soft Targets ■■ Security Excellence: Tools to In an age of shrinking security budgets, enterprise Operating a major retail company with operations The Hospitality, Entertainment, and Tourism Enhance Security’s Mission risk management becomes an overwhelming in every city that has high risk areas throughout (HEaT) Council, consisting of industry and Threat and risk responses demand proactive task. Assure your senior management that your Mexico—where extortions or firefights between government protection leaders, shares insight strategies that address a range of security and organization’s security plan and design are armed forces and drug gangs, or kidnappings and into the challenges of securing soft targets in business program elements that must be correctly aligned with your industry’s current security armed robberies, are daily routine—and develop- today’s ever-changing environment. What makes selected, implemented, maintained, and more. paradigm by learning how to meld a solid security ing your security program in order to support a target soft, and what makes it unique and The contribution of security to green initiatives plan with AGA, EEI, and best practices/bench- business and sustain a profitable operation, challenging when evaluating risk assessments also needs to be considered. Existing and newly marking, while achieving FERC, NERC, CFATS, present real and complex challenges to the and/or in deploying security measures? Whether emerging security standards facilitate these and MTSA regulations as covered in the Utility security professional. you are a soft target or are responsible for one, objectives. This session will discuss what this this panel session will provide a clearer under- Managers Handbook. Antonio Gaona, DSE, Head of Security and Loss process might look like and presents tools that standing of this security phenomenon. Mark DeVoti, CPP, Security Manager, Special Prevention, SORIANA may assist in your organization’s journey to Services, Public Service Electric and Gas James C. Reynolds, CPP, Director of Safety and security excellence. Sponsored by the ASIS Utilities Security Council Security, Hilton Hotels Corp.; David Bareño, CPP, Phillip Banks, CPP, Director, The Banks Group, Inc.; 1:45 pm–3:00 pm Detective Tourist Crimes, Orange County Sheriff’s Dennis Shepp, CPP, PCI, President, Dennis Shepp Office; Sheldon Lightfoot, CPP, Security Manager, ●● Security Management Consultant, Inc. Taking Governance Forward: Six Flags Great Adventure; Andrea Schultz, Department of Homeland Security Sponsored by the ASIS Physical Security Council Key Concepts of Governance ●● What’s New on the Floor? Sponsored by the ASIS Hospitality, Entertainment and and Management Use your time efficiently by discovering where Tourism Security Council Organizations exist to deliver value to their new and innovative products can be found stakeholders. This value is achieved by imple- throughout the expansive exhibit floor. This menting a system of governance that facilitates subject was presented for 11 years by the late ■■ Making the Decision: the achievement of organization goals. Unfortu- Roy Bordes and has become one of the most Transitioning from Proprietary nately many different views exist and it is not popular presentations. Again this year, the Security to Contract Security always clear what the difference is between presenters take the challenge to continue the This session will explore one company’s governance and management. This session “I have never been disappointed tradition and have expanded the focus to include migration from a proprietary security staff to a will explore concepts of enterprise governance, physical and information technology security. contract staff. Learn about the decision-making by the ASIS Annual Seminar & the governance of enterprise information Ronald Lander, CPP, Chief Specialist, Ultrasafe process that addressed financial, organizational, technology, and security governance. It will Exhibits. By far, the best overall Security Solutions; Howard Belfor, CPP, SST, and operational effectiveness. Learn how the relate governance and management, drawing conference of the year.” Regional President, First Service Security implementation plan ensured a smooth transition the distinction between these two, and will Sponsored by the ASIS Physical Security Council and the through communications, training, and ensuring point to an IT Governance Initiative to pull the Joseph L. Smith, Senior Vice President ASIS Information Technology Security Council that emergency response protocols remained in various concepts together. Applied Research Associates place. Finally, the company’s positive reaction to John Lainhart, CGEIT, CISM, CISA, Partner with the change will be reviewed. IBM Global Business Services Public Sector Harold Grimsley, CPP, Director, Corporate Safety Sponsored by ISACA and Security, Blue Cross Blue Shield of Florida

24 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 25 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced Tue Tuesday, October 12 • 1:45 pm–3:00 pm Tuesday, October 12 • 1:45 pm–3:00 pm

▲▲An A-Z Approach to Protect ●● Technology in Public/Private ●● Caution Advised! The Use of ■■ Protecting Intelligence: the Food Protection Stream that Partnerships: Blending Technology Social Networking Sites and Search Technology, Friend or Foe? Meets Regulation and Customer for Crisis Management Engines to Screen Applicants This session examines a case study review to Expectation With the economic downturn, security organiza- Employers and security professionals have see how easily an undercover police officer’s The breadth and scope of government food tions have been asked to provide better services discovered that social networking sites and identity was compromised through his use of regulations and guidelines are increasing rapidly. with fewer resources. Technology offers new search engines contain a treasure trove of social networking sites. Increase your awareness Learn about new and pending legislation in the data-gathering models that help organizations information on potential job applicants. This of the ways adversaries collect intelligence using food and agricultural industries and learn how to efficiently retrieve, record, and evaluate data. By session will examine the pros and cons of open-source methods and learn a simple OPSEC implement a comprehensive, organized approach using a single Internet resource, we can record, using such tools, including issues related to risk management methodology that can be used to existing regulations and guidelines that will analyze, and predict incidents, provide critical discrimination, privacy, use of legal off-duty to counter the adversary’s collection methods. help drive effective and compliant policies as property information to first responders, and even conduct, and authenticity. Review case studies You will receive support tools including access to part of a responsive food defense plan. Gain use sophisticated learning management systems and web sites to see how these sites work and a secure portal to work in a secure environment insight into the solutions-driven approach to to improve performance. discover the potential legal landmines and free-of-charge. dealing with these complex requirements Michael Crane, CPP, Executive Vice President and practical risks involved. Victor “Top” Watson, Law Enforcement Program including the Enhanced Food Safety Act General Counsel, IPC International Corporation; Lester Rosen, Attorney at Law, Employment Specialist, Department of Homeland Security, and Safe Quality Foods. Russell Collett, Chief Operating Officer, IPC Screening Resources Federal Law Enforcement Training Center William Ramsey, Security Director, McCormick and International Corporation; Jade Hirt, CPP, Director, Special Operation Training Academy, IPC Company, Inc.; Frank Pisciotta, CSC, President, ■■ Close-in Protection: Mexico City ●● “Do You Hear What I Hear?” Business Protection Specialists, Inc.; Dr. James International Corporation; Dr. Bennett Fierman, President, Lauren Innovations Follow a film crew as it documents an An Examination of Forensic Content Pastor, President, SecureLaw Ltd. and Associate Analysis of Verbal Statements Professor, Calumet College of St. Joseph executive protection detail and the principal as he researches his next bestseller about the Sponsored by the ASIS Agriculture and Food ■■ Keeping Your Mobile Electronic Using actual interview excerpts, explore how Security Council Assets and Data Safe While Traveling kidnapping and drug cartel epidemic in Mexico to conduct an interview to elicit indicators of City. The principal conducts an interview and truth and deception. Learn interviewing “rules” Domestic and international travelers need to seeks to experience firsthand the terror and and indicators of deceptions, inadvertent truth ■■ Layoffs and Terminations: When be aware of the dangers that surround them. crime wave that has swept the area. From the revelations, and “Othello’s Error.” Learn what to Hostility or Violence Are a Concern Criminals use a wide range of technologies planning stage to the close-in protective mission, listen for by comparing and contrasting truthful Even usually calm individuals can become against businesses and their competitive this film will help you understand the art of and deceptive behaviors. Ideal for those whose combative when they learn they are losing their intelligence. Daily, thousands of travelers have executive protection in Mexico City. duties require some interviewing skills, who are their computers stolen or electronic information jobs. Security managers, HR, and supervisors Robert Oatman, CPP, President, R.L. Oatman and responsible for preliminary interviews, or who compromised by even simple methods. This should consider specific guidelines and prepara- Associates, Inc. are fairly new to the investigative and interview- tions prior to termination meetings. Learn popular session will cite case studies, show ing process. field-tested methods ranging from the time, examples of tools used by thieves, and give tips and pointers to lower the risk to travelers ▲▲Getting Your Boss to Listen to Tim Reddick, CPP, PCI, Director, Fraud and place, and room setting, to verbal effectiveness, Special Investigation, City of Philadelphia, Office and their data. You: The Seven Disciplines of the emergency communications, and actions. of the Controller Anticipating and planning for contingencies is Ronald Lander, CPP, Chief Specialist, Ultrasafe Trusted, Strategic Advisor the best method to ensure layoff and termination Security Solutions; J. Keith Flannigan, Ph.D., Being heard and trusted as a strategic advisor meetings are conducted without incident. Executive Director, International Dynamics Research and getting the boss to listen are professional Corporation; Roy Wilkinson, Ph.D., President, goals sought after by most security managers Bruce T. Blythe, CEO, Crisis Management SPI Services International, Inc. and staff. Review dramatic examples, dilemmas, Sponsored by the ASIS Information Technology and sensible approaches to corporate problems, Sponsored by the ASIS Crisis Management and Security Council Business Continuity Council learn to focus on what matters, and understand what bosses expect of trusted advisors regarding ■■ Workplace Violence: Issues strategy, management perspective, advice, and in Lethality, Intimate Partner hands-on problem-solving using situations Violence, and Stalking presented by the audience. “The ASIS 2009 Seminar This session explores intimate partner violence James E. Lukaszewski, Chairman and CEO, and Exhibits held a wonderful and stalking, type 4 workplace violence, and The Lukaszewski Group, Inc. their impact on the workplace. Behaviors that Sponsored by the ASIS Crisis Management and Business display of security technologies suggest the potential for violence in these very Continuity Council and discussed insights personal cases, and ways to assess, manage, regarding the newest threats and mitigate these threats, will be discussed. Review case studies that illustrate behaviors of and security topics that we concern, and understand the use of restraining encounter here daily.” orders. Threat assessment and threat manage- ment will be emphasized. Dehigh Tarrer, Special Security Officer Pam Paziotopoulos, JD, CEO, The Paziotopoulos 82nd Airborne Division Ft. Bragg Group

26 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 27 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced Tue Tuesday, October 12 • 1:45 pm–3:00 pm • 4:30 pm–5:30 pm Tuesday, October 12 • 4:30 pm–5:30 pm

■■ The Future of Security: 4:30 pm–5:30 pm ●● Social Networking, Media, ■■ Active Shooter and Force-on-Force Insider Threat and and Your Personal Development Advancements in Simulations Pre-employment Screening ■■ Beyond Borders: Practicing Social networking tools are essential to physical The Mumbai terror attacks and the Virginia Tech Criminals and terrorists use the “three gates” Role-Based Security in a Brave security professionals as sources of identity massacre highlight the need to understand verification and tools of communication. Learn and train for active shooter and force-on-force approach to gain automatic access to company New World assets and information: attacking physical how to choose and use these services to develop engagements. Terror organizations are known security measures (physical gate) and IT security The reach of the Internet and the realities of a business or stay current with security trends. to possess the intent and capability to attack measures (logical gate), and infiltrating organiza- global economy mean that challenges faced by Learn about Internet branding and marketing, highly secure critical facilities as well as public tions as employees or vendors (human gate). A information security professionals have become blogging, and search engine optimization. gathering places. Advanced agent-based shared threat perception is the basis for security even more large-scale. Security professionals are Discover how to communicate safely without modeling and simulation allows for cost-effective measures at all three gates. This presentation increasingly required to possess a strong being “social engineered.” virtual investigation of such scenarios that cannot will explain the “three gates” approach and focus foundation of knowledge and understanding of Steve Surfaro, Channel Manager, Axis be realistically played out in real-world exercises. on insider threat and pre-employment screening the global implications and evolving nature of Communications; Shawn Flaugher, Security Joseph L. Smith, PSP, Director/Senior Vice as an effective response. security operations that cut across jurisdictional Consulting and Design, Duke University and Health President, Applied Research Associates lines. Information on laws, regulations and issues Berndt Rif, CPP, Senior Security Policy Adviser, System; James P. Litchko, CEO, Litchko and Sponsored by the ASIS Utilities Security Council De Nederlandsche Bank; Chris M. Wright, CPP, governing security within other countries must be Associates, Inc.; Ksenia Coffman, Marketing learned. Managerial and communication skills are Manager, Firetide President, The Wright Group; Michael D. Moberly, ▲▲Speaking Bean President/Founder, Knowledge Protection Strategies needed to act as an effective manager of and Sponsored by the ASIS Physical Security Council Sponsored by the ASIS Information Assets Protection liaison between security personnel. Learn why In the best of times, passing a budget request Council and the ASIS Privacy and Personnel Information information security professionals need a global ■■ Payroll Manipulation: Neither for increased visual, electronic, access, or manual Management Council. perspective and how to ensure that education an Officer nor a Gentleman security can be a tedious process, especially and certification credentials effectively reflect when dealing with the corporate bean-counters. that knowledge and expertise. With high unemployment rates and the current ●● So You Want to Be a CSO? This session will review in detail the processes Sponsored by (ISC)2 recession, the potential for fraud in payroll and information required to create and promote Listen as CSOs representing varying backgrounds systems increases. This session walks you a proper ROI document to accompany every and industries trace their rise to their organiza- through a case study involving an employee budget request. Learn how to demonstrate the tion’s top security position and explain what who takes advantage of economic hard times. ultimate profitability of properly designed and separated them from other professionals who Deltrinae Hodges, Senior Corporate Fraud implemented security. sought the same position. Presenters will discuss Examiner, Wal-Mart Stores, Inc.; Mike Finley, Charlie R. A. Pierce, President, LeapFrog Training the importance of higher education and degrees, Special Investigator, Wal-Mart Stores, Inc. and Consulting the role of certifications and continuing education, Sponsored by the ASIS Retail Loss Prevention Council Sponsored by the ASIS Physical Security Council the art of developing and cultivating relationships, and more. The session will devote significant time ■■ Behavior Detection and Other to questions from the audience and attendees ▲▲Breaking the Bank: The Latest will take away actionable career strategies. Practices for Protecting Retail Cyber Attacks against Financial Facilities from Terrorism Stephen Scharf, SVP and Global CISO, Experian Institutions and Their Customers Sponsored by the ASIS CSO Roundtable As terrorist threats loom large in the United Financial institutions and their customers States, retailers are increasingly aware of their ALL INFORMATION ABOUT ALL INFORMATION ABOUT ALL INFORMATION ABOUT face new cyber threats and attacks that have involvement as a target as well as a potential resulted in significant losses. This session enabler. Yet many retailers feel ill-prepared to discusses recent account takeover, spear identify and react to potential threats. This phishing, denial-of-service, and other attacks sessionASIS will introduce 2010 a Behavioral Detection against institutions and customers, as well as ■■ASIS 2010 ASIS 2010 Managing Remote and Third Party techniqueSEMINAR that allows trained professionals& to the recommendations that resulted from the AccessEXHIBITORS to Networks detect people who might intend to execute February 2010 simulated Cyber Attack against SESSIONS a terrorist attack. You will learn the method, WhetherAT YOUR via telecommuters, FINGERTIPS third party contrac- Payment Processes (CAPP) Exercise. AT YOUR FINGERTIPS benefits,EXHIBITS and applications of Behavioral Detection tors, temporary employees, or meeting guests, William Nelson, President and CEO, FS-ISAC as usedAT YOUR by the Mall FINGERTIPS of America. The session network security professionals must balance two will address the benefits of implementing Sponsored by the ASIS Banking and Financial Services seemingly incompatible goals: securing corporate counter-terrorism strategies, ways to leverage Security Council networks whileVISIT providing access to those VISIT VISIT www.asis2010mobile.org www.asis2010mobile.org existingwww.asis2010mobile.org resources, and the development of networks to entrusted individuals. Even with FROM YOUR SMARTPHONE FROM YOUR SMARTPHONE protocolsFROM for YOUR addressing SMARTPHO threatsNE once identified. trusted employees, negative computer behavior can present remote access security threats. Michael Rozin, Special Operations Captain, Mall of In this facilitated session, members of the America Security Department; Doug Reynolds, IT-ISAC will use case studies to detail these Director of Security, Mall of America Security challenges and share effective practices used Department; Eric White, Director of Retail Strategy, Wren Solutions to mitigate them. Sponsored by IT-ISAC

28 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 29 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced Tue Tuesday, October 12 • 4:30 pm–5:30 pm Tuesday, October 12 • 4:30 pm–5:30 pm

■■ 21st Century CPTED and ●● Gaining the Competitive Edge with ■■ Practical Measures to Protect ■■ Aplicación del modelo de ASIS Infrastructure Protection AHA First Aid, CPR, and AED Training Your Security Systems from Insider International para proteger a las Threats to our cities and critical infrastructure When emergencies such as sudden cardiac and Outsider Attacks organizaciones frente al terrorismo are increasing as attacks around the world arrest, non-fatal injuries, and illnesses occur in a This session provides you with a hacker’s view (Application of ASIS International Model to proliferate. CPTED is a comprehensive holistic public place, security officers could be the first of your networked physical security systems, Protect Organizations against Terrorism) approach to designing security into the built on the scene. Would they know what to do? and best practices for strengthening your systems Esta ponencia presenta, sobre la base de las environment. Security standards and guidelines With the proper training from the American Heart from a network researcher, a design consultant, a teorías de la seguridad y las referencias de ASIS are now available in the U.S. and Europe to Association, your security officers could learn systems manufacturer, and a university IT director. International, los errores que suelen permitir el provide the design and security communities how to effectively administer cardiopulmonary Learn how tools and information freely available ingreso de ladrones y que hacen posible que direction to protect critical assets and the key resuscitation (CPR) and first aid. The actions on the Internet can be used to compromise your las amenazas dirigidas a las compañías se elements of our cities. This presentation highlights taken during the first minutes of an emergency systems. See technical vulnerability assessments materialicen. La ponencia, dirigida a gerentes y CPTED’s evolution from public housing to can be critical and may help the victim recover demonstrated for networked access control, otros responsables de la seguridad, aumenta la anti-terrorism protection and designing out more quickly. video, alarm monitoring, and communications sensibilización sobre el problema y presenta la crime in the 21st century. systems. Both vulnerabilities and their remedies John Mouw, Instructor/Volunteer, American Heart opción de establecer un programa de seguridad will be presented visually in detail on-screen Dr. Randy Atlas, Ph.D., CPP, AIA, Vice-President, Association con eficacia de costos. Atlas Safety and Security Design, Inc. using plain English explanations. For practitioners Design, implementation, and evaluation of a Sponsored by the ASIS Security Architecture and ■■ Disasters in Haiti and Chile— responsible for security systems and their cost-effective security program that will prevent Engineering Council Lessons in Organizational Resilience operations, as well as their product and service providers. your organization from becoming a victim of Examining the contrast between organizational terrorism. Based on security theories and ■■ Integrating Security and William Badertscher, CPP, Senior Engineer resilience plans and actual experience during ASIS International references, this presentation Business Continuity for Facility and Security Control Systems, and after the Haitian earthquake of January 2010 Georgetown University; Ray Bernard, PSP, President introduces the mistakes that frequently allow This session addresses how to integrate and and the Chilean earthquake of February 2010 and Principal Consultant, Ray Bernard Consulting burglaries to happen and threats to companies leverage security and business continuity as provides security professionals with insight into Servcies; Rodney Thayer, CTO, Secorix to materialize. The presentation, targeted to an integrated security and business continuity the differences between traditional planning managers and other security personnel, raises team that mitigates risk during a disaster. The and reality during two of the largest disasters in ■■ Critical Infrastructure Protection awareness about the problem and introduces modern history. Explore how an important security team safely and effectively evacuates Operations and Resources from DHS the option of building a cost-effective security or shelters-in-place employees during a disaster, multilateral lending institution was able to respond program. The U.S. Department of Homeland Security while the business continuity team plans to to and recover from the earthquake as well as Javier Rojas, CPP, Gerente de Seguridad Física, ensure that business services critical to the lessons learned. provides tools, techniques, and exclusive Alimentos Polar Colombia S.A. resources available at no cost to first responders operation of the organization continue after a Richard Wright, CPP, Project Manager, VDI, Inc. and security professionals to protect the nation’s major event. Sponsored by the ASIS Crisis Management and Business most critical infrastructure. Learn how you can Scott Shaw, CPP, Aflac Continuity Council receive free training, access the latest industry- specific vulnerability assessment tools, protect ■■ Creating a Security Conscious ●● Changing Times in Forensic sensitive government information, receive Corporate Culture Science and the Impact of geospatial intelligence, learn how to access ASIS Onsite Bookstore CSOs are most concerned with employee Advanced Scientific Techniques incident management information during a Monday, October 11, 12:00 noon–8:00 pm problems from violence, fraud, theft, unethical disaster, and more. If you’re interested in critical Crime scene work has changed dramatically Tuesday, October 12– conduct, and drugs and alcohol in the workplace. from the 1980s to what should be practiced infrastructure protection, this is for you! Thursday, October 14, 7:00 am–5:30 pm Often these problems are caused by a failure today. Scientific methodology has evolved, Steven G. King, CPP, Division Director, U.S. Friday, October 15, 7:00 am–2:30 pm to implement clear policies and procedures; the and equipment is more portable, reliable, and Department of Homeland Security resulting behavior undermines authority, jeopar- sensitive. For the criminal justice professional, Sponsored by the ASIS Oil, Gas, and Chemical Industry This is your once-a-year opportunity dizes efficiency, and often results in lawsuits. these changes pose unique challenges. To what Security Council to see and purchase the latest security Organizations need a robust security program level should the CSI be trained? What quality with strong policies and procedures to channel equipment should be utilized in the field? publications and training materials— employee behavior, create an honest employee Monetary constraints for employee hiring and “This remains the quintessential up close and personal. You’ll find new culture, and provide legal structure. equipment purchases dictate many of the international event to attend for and best-selling titles and classic David G. Patterson, CPP, PSP, Senior Consultant, decisions which ultimately impact the outcome security, crisis management, references on every area of security of the investigation and whether or not the case The Steele Foundation management, as well as knowledgeable Sponsored by the ASIS Physical Security Council results in an arrest of a suspect or he goes to enterprise risk management, trial. Learn where forensic science was a decade and related disciplines.” staff to answer questions. Plus, the ago and where the forensic science community most popular ASIS merchandise will needs to be in the near future. Murray D. Mills, CPP, Emergency be available for sale too. You may also David Pauly, MFS, VSM, Professor of Applied Management Advisor view and order resources from the online Forensic Science, Methodist University Ministry of Health, New Zealand store year round at www.asisonline.org.

30 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 31 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced WED NEW Wednesday, October 13 • Schedule-at-Glance All sessions will be held at the Dallas Convention Center. LEVEL Arch/Eng/Design Crime/ Loss Prevention Management Crisis Critical Infrastructure Global Government/ Military Security Homeland Info/IT Security Information Protection Investigations Legal Management Physical Security Privacy Professional Development Terrorism Young Professionals en Español 8:00 am–9:00 am: KEYNOTE: Chesley B. Sullenberger III 11:00 am–12:00 noon Water: The Next Battleground ● X X X X Enterprise Security Risk Management ■ X X Innovation or Confusion 2010? We Debate Technologies’ Real Usefulness in Physical Security ■ X X The Dongfan “Greg” Chung Economic Espionage Case ■ X X X X How to Create Your Security Manual ■ X X X Security Architecture and Engineering, Part 1: The Process and Basis of Design ● X X Security Criteria Implementation Challenges ● X X Video Quality in Public Safety: From Research to Reality ■ X X Recovery and Restoring Confidence after Workplace Violence ■ X X X CFATS Implementing and Maintaining a Compliant Program ● X X X Cross Sector Liaison: Mitigating Shortfalls in Public/Private Sector Disaster Planning Relationships ▲ X X Cyber Series: Cyber Risks in Critical Infrastructure ■ X X X Best Methods for Using Internet Search and Analysis in Intelligence and Investigations ■ X X X X Lessons Learned from a Kidnapping ● X X X X Security Profiling: Overcoming the Controversy ■ X X X X Cómo prevenir los secuestros en México—Mitos, hechos y contramedidas idóneas ● X X X X (Preventing Kidnappings in Mexico—Myths, Facts, and Sound Countermeasures) 1:45 pm–3:00 pm ASIS Standards: Business Continuity Management 101 ■ X X Security Architecture and Engineering, Part 2: Systems Design and Engineering ● X X Behavioral Pattern Recognition: A Proactive Approach to Homeland Security ■ X X X X Protecting Your Business: Understanding Islam and Islamofacism ■ X X X A Cartel Hemisphere: Protecting International Interests in Today’s Most Enticing Emerging Markets ■ X X X X Child Predators and the Threat to Your Company ■ X X X Cyber Series: Advanced Persistent Threats and Botnets—Why Your Business Should Be Concerned ● X X X X X Security as a Business: Leveraging Video Content Analysis ■ X Premises Liability: A Trial Lawyer’s Hints for the Security Professional ▲ X X Excellence in High Impact Security Education Training ■ X X X Non-confrontational Interrogation ▲ X X Managing Aggression in the Healthcare Setting ▲ X Risk Management in a Coalition Environment: Challenges and Solutions ■ X X X X Securing the Irreplaceable—Mitigating Threats to Invaluable Treasures ● X X Animal Activism and Ecoterrorism ■ X X Next Generation Risk Management and Information Security ● X X X X X Los secuestros y las extorsiones en México y América Latina: Un gran desafío para las empresas en la actualidad ■ X X X X (Kidnapping and Extortion in Mexico and Latin America: A Big Challenge for Businesses Today) 4:30 pm–5:30 pm Cloud Computing for Electronic and Physical Security Professionals ■ X X Where Is the Value in Security? ▲ X X Security Architecture and Engineering, Part 3: System Implementation ▲ X X Comprehensive Visitor Management Driving Bottom-line Results ■ X X Cyber Series: Case Studies from the Front Lines—Computer Forensics ■ X X X Current Cargo Theft Trends and Methods ■ X X How the Great Recession Has Changed Security ■ X X X X Advancing DoD Security Capabilities through Professionalization and Certification ■ X X X X Evacuation Issues in a Non Fire-Related Emergency, a Case Study ■ X X X Cyber-vetting: The On-line Persona of You and Others ■ X X X X X Microsoft Global Security: Converting the Dream into an Integrated Global Program ■ X X X X Contemporary Research Findings on Workplace Violence and Aggression: Common Myths Exposed ▲ X X X X Chief Security Evangelist: Selling Security to the Workforce ● X X X Healthcare Security Best Practices ■ X X X International Due Diligence Investigations: Providing Vital Intelligence to Mitigate Business Risks in Foreign Markets ■ X X X X X Black Leaders in the Security Industry ● X X Security and Crisis Management Academic Programs: The Evolution of a Professional Development Strategy ● X X

32 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 33 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced WED Wednesday, October 13 • 8:00 am–9:00 am • 11:00 am–12:00 noon Wednesday, October 13 • 11:00 am–12:00 noon

8:00 am–9:00 am ■■ Innovation or Confusion 2010? ●● Security Architecture and ■■ Recovery and Restoring We Debate Technologies’ Real Engineering, Part 1: The Process Confidence after Workplace Violence Usefulness in Physical Security and Basis of Design KEYNOTE Review an actual case study of workplace Chesley B. Rapid advances in technology can positively This session covers major phases of the security violence including a death and a stabbing to learn about its effect on the security plan, the Sullenberger III or negatively influence physical security system design process including milestones, professionals every day. This session examines team member responsibilities, and major workforce, customers, and the organization’s See page 6 for keynote 10 of the most promising security technologies deliverables. Learn how designers approach reputation. Learn how to handle media nimbly, session description. including HDTV, SaaS, POE, dashboarding, security projects and how they develop functional restore confidence in a safe workforce, and data visualization, GIS, and video analytics security requirements and design objectives. augment services, technology, and training and outlines their impact on physical security. Threat assessments, initial site surveys, vulner- in a meaningful but not over-reactive way. Panelists offer evaluation and decision-making ability analysis, and risk assessments are all Learn strategies for using an unfortunate event 11:00 am–12:00 noon processes for deploying new technologies in discussed. See how the key design analysis to strengthen your program and reputation. your electronic security system and discuss steps lead to the identification of design func- Bonnie Michelman, CPP, Director of Police, why, given two functionally equivalent security tional requirements and eventually to the basis Security and Outside Services, Massachusetts ●● Water: The Next Battleground systems, the simplest one to manage should of design. General Hospital Water, essential to quality of life, is going to be be chosen. Richard Grassie, CPP, Managing Principal, Good the next oil crisis and wars will be fought over Fredrik Nilsson, General Manager, Axis Harbor Consulting, LLC, Techmark Division; Philip ●● CFATS Implementing and its control and distribution. Supply and delivery Communications; Charlie R. A. Pierce, President, Stearns, CPP, Program Manager, Conti Federal Maintaining a Compliant Program systems may not be able to meet growing needs, LeapFrog Training and Consulting; Severin Services The Department of Homeland Security continues while critical environmental resources are in Sorenson, CPP, President and CEO, Sikyur Sponsored by the ASIS Security Architecture and to implement its strategy of a risk-based peril. Aging infrastructure, population growth, Engineering Council approach to securing the nation’s highest risk and climate change represent a complex set of ■■ The Dongfan “Greg” Chung chemical facilities. The Chemical Facility problems that threaten the world’s population, ●● Economic Espionage Case Security Criteria Implementation Anti-Terrorism Standards (CFATS) requires all economy, and environment. As demand for water Dongfan “Greg” Chung had been a Boeing/ Challenges high-risk chemical facilities to perform security hits the limits of finite supply, potential conflicts Rockwell engineer for 30 years when an investi- Federal, state, local, NGO, and private entities vulnerability assessments and develop and are brewing between nations that share trans- gation revealed he had been providing information are incorporating security design criteria into their implement site security plans that meet 18 risk- boundary freshwater reserves. to China since 1979. Chung was arrested in 2008, building projects and implementation can be a based performance standards established by Alan Nutes, CPP, Security Manager, City of Atlanta and information recovered included trade secret challenging process. Prior to implementation, you DHS. This presentation will provide an updated Sponsored by the ASIS Utilities Security Council documents relating to several programs. In a must understand the intent behind the criteria overview of the CFATS regulatory regime, a brief precedent-setting trial, Chung was convicted in and have the necessary tools for application. synapses of the new Ammonium Nitrate Rule, ■■ Enterprise Security Risk July 2009 for conspiracy to commit economic This presentation will address some of the most and provide you with valuable information to use Management espionage and six counts of economic espionage sweeping federal government security criteria in your own security compliance efforts. to benefit a foreign country, among others. including the recently revised Interagency Security Enterprise security risk management (ESRM) Dan Walters, CPP, Manager Security & Committee Physical Security Criteria for Federal Environment Risk, Terra Industries; Sue is an integrated approach to identifying and Kevin Moberly, Special Agent, Federal Bureau of Investigation Facilities including risk assessments, physical Armstrong, Director, Infrastructure Security mitigating an organization’s risks. ESRM’s holistic Sponsored by the ASIS Defense and Intelligence Council security and structural hardening. The presenta- Compliance Division, U.S. Department of Homeland approach incorporates many issues not tradition- tion will also discuss challenges faced by non- Security; Dennis Deziel, Acting Director, U.S. ally associated with security such as audit, federal entities attempting to implement federal Department of Homeland Security ■■ How to Create Your Security Manual compliance, and brand reputation. This session guidelines. Sponsored by ASIS Agriculture and Food Security Council will look at the recent ESRM research by the CSO This fast-paced, interactive presentation will get Roundtable and will discuss the lessons learned Nancy Renfroe, PSP, Vice President and Division right into the “nuts and bolts” of writing a security ▲▲ from ESRM implementation with CSOs who Manager, Applied Research Associates (ARA); Cross Sector Liaison: Mitigating manual. Starting with a format, an outline, and Hollice Stone, MS, PE, President, Stone Security Shortfalls in Public/Private Sector have hand-on experience. how to delegate the written material, you will Engineering, PC Disaster Planning Relationships Richard Widup, Jr., CPP, Senior Director, Security leave the session with written material that you Operations, Purdue Pharma L.P.; Joseph This session examines a methodology for can turn into your own manual for your organiza- ■■ Video Quality in Public Safety: McDonald, CPP, PSP, Chief Security Officer, Switch tion. A necessity for every security professional initiating a positive liaison between the private From Research to Reality Communications Group; John A. Petruzzi, Jr., CPP, who needs to create or update a security manual. sector and public emergency service agencies. Senior Vice President, Andrews International Security The U.S. Department of Homeland Security’s Discuss communications, logistics and resource Darrell Clifton, CPP, Director of Security, Circus Sponsored by the ASIS CSO Roundtable Circus Hotel Casino Office for Interoperability and Compatibility, in allocation, and explore evolutionary aspects of partnership with the Public Safety Communica- disaster management in terms of lessons learned Sponsored by the ASIS Hospitality, Entertainment and Tourism Security Council tions Research program, hosted the first Video from full-scale, mass-casualty simulations. “The ASIS Seminar and Exhibits Quality in Public Safety (VQiPS) conference in Discuss ways to mitigate the inherent shortfalls were great. I truly enjoyed my day early February 2009. Attendees from each public of joint multi-agency operations. safety discipline volunteered to participate in Forrest P. Franklin, CPP, Director of Security, and look forward to attending the VQiPS Working Group. This session reviews Transamerica Pyramid, Cushman and Wakefield; again. This was my first time at the working group’s efforts—a design reference Geoffrey Craighead, CPP, Vice President, Universal that will allow you to make better decisions Protection Service an ASIS convention and I was about video technology investments. Sponsored by the ASIS Fire and Life Safety Council very impressed.” Dr. Carolyn Ford, ITS.P Project Leader, Video Quality, U.S. Department of Commerce – Boulder George P. Donovan, Security Supervisor Laboratories; Monica Vago, Director of Technical Canon U.S.A., Inc. Standards, Security Industry Association; Steve Surfaro, Channel Manager, Axis Communications Sponsored by the ASIS Physical Security Council

34 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 35 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced WED Wednesday, October 13 • 11:00 am–12:00 noon Wednesday, October 13 • 1:45 pm–3:00 pm ■■ Cyber Series: Cyber Risks in ■■ Security Profiling: Overcoming 1:45 pm–3:00 pm ■■ Protecting Your Business: Critical Infrastructure the Controversy Understanding Islam and Islamofacism Massive denial-of-service attacks and stealthy The Christmas Day attack on Northwest Airlines ■■ ASIS Standards: Business infiltration of networks are becoming common- Flight 253 resuscitated the debate on “security Continuity Management 101 From a “lone actor” at a major Army base place in the critical infrastructure sectors. With profiling.” Despite its successful track record, to coordinated attacks on American-owned the continued integration of business and control misconceptions and incorrect implementations Many emerging laws, regulations, and standards businesses abroad, Islamic-based terror attacks networks and the widespread adoption of smart have sidelined this invaluable tool. Gain an impact business continuity programs. Learn how continue to cost countless lives and billions grids, the risk of compromise increases dramati- understanding of the fundamentals and how the upcoming ASIS/ANSI Business Continuity of dollars to companies at home and abroad. cally. Discuss the risks facing industrial automa- they do not interfere with civil rights, privacy, Management Standard integrates business Understanding the founding, evolution, and tion and control systems (IACS) and supervisory and racial concerns; learn how it improves continuity in your security management portfolio. current state of Islam, the re-emergence of control and data acquisition (SCADA) networks allocation of security resources and drastically This session will offer a comprehensive business jihad, the influx of Muslim immigrants to the and the tools and methods available for identify- increases their effectiveness; and learn how to continuity management approach in a practical West, and the exploitation of western technology ing and minimizing them. apply this approach. and easy-to-understand manner. is critical to every member of the security law Don Fergus, Vice President and CSO, Intekras, Zvi Kremer, Managing Director, EstablishNet John Turey, CPP, Director of Security, ITT; Brian enforcement communities. Inc.; Sunil Kumar, Senior Solutions Consultant, International, LLC Zawada, Director, Business Continuity Solutions, Col. Michael Trapp, CPP, Principal Scientist, Alert Enterprise General Electric Company; Michael Keating, Applied Research Associates Managing Director, Doulos Business Consulting; Sponsored by the ASIS Information Technology ●● Cómo prevenir los secuestros Michael Thomson, Security Manager, New Security Council en México—Mitos, hechos y Balance Athletic Shoes ■■ A Cartel Hemisphere: Protecting contramedidas idóneas Sponsored by the ASIS Standards and Guidelines International Interests in Today’s ■■ Best Methods for Using Internet Commission Most Enticing Emerging Markets Search and Analysis in Intelligence (Preventing Kidnappings in Mexico—Myths, Facts, and Sound Countermeasures) As Mexico’s economy weakens and businesses and Investigations ●● Security Architecture and Los esfuerzos para reducir la amenaza de fail, organized crime fills the void left by the Today’s intelligence and investigative process secuestros en México consumen recursos Engineering, Part 2: Systems weakened government, impacting all of Latin increasingly relies on Internet resources, and valiosos, y dicha amenaza puede afectar Design and Engineering America. Yet, the ‘near abroad’ cannot be ignored the ever-changing online environment requires by organizations looking to expand globally. negativamente el estado de ánimo de empleados You’ve established your security system security professionals to update their search Hear from experts how the cartels up and down e inversionistas. Aun cuando se tomen impor- requirements. Now they must be met in the strategies continuously. Learn how to go beyond the supply chain have entrenched their positions tantes precauciones en materia de seguridad, design of your system. Learn how a security search engines and find sites and databases across the hemisphere, and what this means for se siguen produciendo secuestros, lo cual system design is developed and how bid and for necessary information in a legal, ethically your interests. Gain an understanding of what deprime aún más el estado de ánimo. Aprenda a construction documents are prepared. Discover sound manner. Discover key sources, hints for your organization can do to ensure the safety enmarcar esta “industria” criminal en la perspec- how to achieve a good design and establish time-saving approaches, and guidelines for of your people, assets, and brand, before and tiva adecuada, mediante el estudio de ejemplos requirements for hardware and software, analyzing and verifying results. during a crisis. recientes. Analice entrevistas a secuestradores operation and technical procedures, and facility Edward Appel, Sr., Proprietor, iNameCheck mexicanos capturados y entérese de cómo los support and construction. Review design Raymond T. O’Hara, CPP, Executive Vice President, Sponsored by the ASIS Law Enforcement Liaison Council mismos perciben las tácticas de seguridad. documentation, cost estimates, and more. Consulting and Investigations, Andrews International; Elabore medidas sólidas para contrarrestar las Bruce McIndoe, President, iJET Intelligent Risk Frank M. Carpency, CPP, PSP, Principal and Chief Systems; Samuel Logan, Regional Analyst, Latin ●● amenazas de secuestros y disminuir el temor Lessons Learned from a Engineer, Carpency and Associates, LLC; Robert America, iJET Intelligent Risk Systems Kidnapping de sus empleados y sus familias. Pearson, BSEE, Manager Electronic Security, The threat of kidnappings is a serious concern Raytheon Company Sun Life Financial is a leading international ■■ Child Predators and the Threat financial services company with operations in in Mexico. Learn why the basic principles of Sponsored by the ASIS Security Architecture and Engineering Council to Your Company 22 countries. In April 2009, one of its financial prevention are still the ones to apply. Efforts advisors was kidnapped and held for ransom to mitigate the threat of kidnappings in Mexico Every day, employees are using company for 14 days before being safely released. Hear consume valuable resources, and the threat itself ■■ Behavioral Pattern Recognition: resources (Internet, vehicles, corporate property) a self-critique of the firm’s crisis management can have a negative impact on employees and A Proactive Approach to to lure children and sexually exploit them. In response written with the intent of identifying best investors alike. Even with significant security Homeland Security this session, you will examine the facts on the precautions, kidnappings still take place—further growing threats of child abduction and exploita- practice improvements, shared with ASIS in the Many security deployments are characterized hope that others may benefit from it as well. damaging morale. Learn how to put this criminal tion. You will become better equipped to “industry” into proper perspective through the by rigidity and the inability to adapt to evolving formulate effective countermeasures to protect Tom Robertson, CPP, Director, Sun Life Financial study of recent examples. Analyze interviews threats. BPR is a proactive approach to protective your organization from liability and learn how with captured Mexican kidnappers and learn security that improves security effectiveness by to mitigate and respond to these incidents. You how they perceive security tactics. Develop changing the security mindset and increasing will never be the same after hearing the facts. sound measures to counter kidnapping threats the flexibility of the system when irregularities are detected. This session covers correct Brian Reich, CPP, Criminal Investigator/Former and to allay the fears of your employees and Deputy Chief, Chairman, Executive Committee, ASIS deployment, reading body language, identifying “I have attended many different their families. Law Enforcement Liaison Council; Robert Lowery, suspicious behavior, and questioning, drawing conferences in the past and Andrew Potts, Jr., Director, Cuspis S.A. de C.V. Jr., Executive Director Missing Children’s Division, on experience accumulated during many years National Center for Missing and Exploited Children; although many of them are of successful BPR deployments worldwide. Oksana Farber, President and CEO, Chairperson interesting and well-organized, David Harel, Managing Director ASERO Israel, LELC, Trident Master Executive Development and ASERO Worldwide Law Enforcement Liaison Council none of them compare to ASIS.” Patrick Huard, Protective Security Government of Canada

36 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 37 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced WED Wednesday, October 13 • 1:45 pm–3:00 pm Wednesday, October 13 • 1:45 pm–3:00 pm

●● Cyber Series: Advanced Persistent ■■ Excellence in High Impact ■■ Risk Management in a ●● Next Generation Risk Management Threats and Botnets—Why Your Security Education Training Coalition Environment: and Information Security Business Should Be Concerned This panel discussion, led by representatives Challenges and Solutions Public and private sector information systems Advanced Persistent Threats (APT) and Botnets from industry and government, covers a wide Risk management is a critical skill for every continue to be subjected to increasingly sophisti- are highly organized, sophisticated, and targeted variety of cutting-edge, cost-effective tools security professional. This session presents an cated and dangerous cyber attacks. NIST, in hacking campaigns through which state-spon- and ideas for developing high impact security overview of the Analytical Risk Management partnership with the Department of Defense and sored groups and criminal enterprises attempt awareness programs that are essential for any model and a case study of its application in a the intelligence community, is developing a unified to steal proprietary information and intelligence. security professional’s toolkit. Best practices coalition environment where information sharing information security framework for the federal This session will give you an appreciation of these will be identified for various delivery methods, is paramount, yet some categories of information government that will establish standards and best serious and growing threats, review tools and measuring effectiveness, communicating the need to remain protected. Threat, vulnerability, practices. Based on a standard risk management techniques to help prevent your organization from threat, and influencing management and risk analysis, and mitigation strategies for this framework, it will help agencies and contractors becoming a victim, and introduce industry groups employees. A question and answer period new and unusual security environment will develop effective information security programs. that help organizations share information about will follow. be discussed. Dr. Ron Ross, Project Leader, FISMA this type of threat. Robert Rogalski, Director, Corporate Security and Pam Truchon, CPP, Senior Security Manager, Implementation Project, National Institute of David Morgan, Associate, Booz Allen Hamilton; Safety, RAND Corporation; Deborah (Deedee) Office of the Director of National Intelligence; Standards and Technology Rodney Thayer, CTO, Secorix Collins, Executive Director, National Security Training Stephanie Flannery, Security Specialist, Defense Sponsored by the ASIS Physical Security Council Institute; Karl Glasbrenner, CPP, PCI, Chief, Office Sponsored by the ASIS Information Technology Intelligence Agency of Personnel Security, Defense Intelligence Agency; Security Council ■■ Michael Frazier, CPP, Senior Security Manager, Los secuestros y las extorsiones ●● Booz Allen Hamilton Securing the Irreplaceable— en México y América Latina: ■■ Security as a Business: Sponsored by the ASIS Defense and Intelligence Council Mitigating Threats to Invaluable Un gran desafío para las empresas Leveraging Video Content Analysis Treasures en la actualidad Not just an overview of the video analytic ▲▲Non-confrontational Interrogation Like our great grandmother’s china, cultural (Kidnapping and Extortion in Mexico and technologies, this session focuses on how video heritage ties us to our roots. When thieves pilfer Interrogation, by its very nature, is presumed to Latin America: A Big Challenge for content analysis can work with your physical priceless artifacts from museums, churches, involve conflict and confrontation, but it does not Businesses Today) security program. We’ve listened to comments cultural facilities, and other sites, they steal pieces have to be so. A structured non-confrontational from PhySec management and included the most of our history. Securing these treasures requires La ponencia ilustra este fenómeno en forma approach often enables investigators to obtain requested solutions. Discuss a definitive method the right combination of manpower and technolo- objetiva, mostrando su evolución reciente en confessions without a denial or protestation of to separate high expectations to what current gy—trained security officers patrolling areas and México y la región en general, evolución que innocence, and the resulting confession often VCA technology can do. Learn how to improvise personnel keeping watch from advanced central refleja el patrón de cambios en las actividades includes information not revealed during the profitability and business focus in your market command and control centers. This session delictivas y su efecto en el progreso económico. investigation. The session will use actual videos segments. Understand HDTV and Megapixel will explore the risks facing organizations that Aprenda cómo evitar convertirse en víctima y of the method in practice to illustrate the structure Camera Technology applications in content house and protect cultural property. Learn how cómo responder en forma adecuada, abordar and teaching points. analysis will be discussed. Examine a case study proper staffing and centralized security operations la crisis y permitir a su empresa operar en un of leveraging intelligent surveillance to improve David Zulawski, Chairman, Wicklander-Zulawski and enable risk reduction, consistent threat detection, entorno seguro que fomente su continuidad y customer service. Learn what “sweethearting” Associates, Inc. and faster responses to events across multiple rentabilidad. El delito organizado y los “carteles” is and how a unique video analytic technology sites to protect valuable pieces of our cultural de narcotraficantes son cada día más violentos recognizes it in real time. Discover Video ▲▲Managing Aggression in the identity. y participan en nuevas actividades delictivas dirigidas a objetivos que solían considerarse Synopsis and the summarization method of Healthcare Setting Steven Wrightson, Vice President/Director of inmunes a este tipo de amenaza. surveillance video. Economic recession, continuing war, and deep Security, Americas Christie’s; Jeremy Brecher, Vice Shmuel Peleg, Professor, The Hebrew University of cuts in social services are some of the factors President, Operations and Information Technology, Currently, kidnapping and extortion cases are Diebold, Incorporated; Judith Matheny, CPP, Vice Jerusalem and Co-Founder of BRIEFCAM, Ltd.; leading to increased stress, behavioral, and health increasingly successful in Mexico and other Latin President, Guardsmark LLC Glenn Adair, Senior Systems Engineer, Panasonic issues, driving more individuals to seek medical American countries, targeting businessmen in System Networks Company of America; Malay services. Learn how the increasing aggression different sectors. The presentation illustrates this Founder and CEO, StopLift Checkout Vision Kundu, in communities and businesses affects hospitals ■■ Animal Activism and Ecoterrorism phenomenon in an objective way, showing its Systems; Carolyn Ramsey, Director, Program recent evolution in Mexico and the region, which and other healthcare institutions. Review new As we are seeing the passing of the fourth wave Management, Honeywell reflects the pattern of changes in criminal activity approaches to managing aggressive behavior, of terrorism, we are facing the fifth wave, part of Sponsored by the ASIS Physical Security Council and its impact on economic progress. Learn future trends, and how the lessons learned apply which is animal activism and ecoterrorism. This how to avoid being victimized, as well as how to every industry. session will describe their MOs and the goals that to respond in a proper manner, address the ▲▲Premises Liability: A Trial Lawyer’s they are trying to achieve. Clint Schaefer, CPP, Manager, Loss Prevention crisis, and allow your business to operate in a Hints for the Security Professional Services, Aurora Health Care; Jeff Young, CPP, Olle Fjordgren, CPP, Security Advisor, GRANIT safe environment fostering its continuity and Director, Healthcare, Garda This session will describe the types of premises Sakerhet profitability. Organized crime and drug cartels are that are subject to negligent security cases, the Sponsored by the ASIS Defense and Intelligence Council becoming increasingly violent, engaging in new kinds of injuries that give rise to these cases, and the ASIS Global Terrorism and Political Instability criminal activity aimed at targets that used to be the duty of the commercial property owner, how Council immune to this kind of threat. to assess the crime situation, common security “It was great to have measures discussed in these cases, and the Jorge Septien, CPP, President, MSPV Seguridad proper use of marketing materials. face-to-face time with Privada, S.A. de C.V. Michael Haggard, Esq., The Haggard Law Firm so many manufacturers.” Fred Zagurski, CPP, CDT, Principal Fred Zagurski Consultants

38 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 39 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced WED Wednesday, October 13 • 4:30 pm–5:30 pm Wednesday, October 13 • 4:30 pm–5:30 pm 4:30 pm–5:30 pm ■■ Comprehensive Visitor ■■ How the Great Recession ■■ Cyber-vetting: The On-line Management Driving Has Changed Security Persona of You and Others Bottom-line Results ■■ Cloud Computing for Electronic Although the worst recession since the Great Online social networking sites can be productive and Physical Security Professionals Often, lobby and visitor management—the first Depression has resulted in drastic cuts in sources of information, but they can also disclose level of physical security screening and business security programs, budgets, and jobs, proactive sensitive, embarrassing, and inaccurate informa- Security professionals contribute to their services definition—is an afterthought managed and savvy security managers have found ways tion. Discuss the legality, privacy, effectiveness, organizations’ bottom line by using access, by a temporary badging system, front desk to accomplish their security goals and maintain accuracy, and fairness concerns related to surveillance, and monitoring to solve business, receptionist, and night guard uniformed staff. or even build support for their programs. Learn policies for pre-employment vetting and post- cost, and performance problems. Learn how to Security practitioners need a more comprehen- the coping strategies, insights, and success hiring monitoring, as well as allowing employees gain buy-in from your organization using less sive way to manage identities and related area stories of top security leaders and discover to access and post on social media sites. Learn capital while mitigating risk and project duration access, link visitors to hosts, and provide a how security programs have fundamentally and the latest results of a study of this cutting-edge to ensure a robust and efficient security solution documented and compliant process. Discuss profoundly changed over the past two years. issue and discuss recommended guidelines. for your next project. visitor management solutions that drive opera- Kathy Lavinder, Executive Director, Security and Dr. Howard Timm, Program Manager (Future Shayne Bates, CPP, Vice President, Strategic tional ROI and risk management. Investigative Placement Consultants, LLC Systems and Analyses), Defense Personnel Security Partnerships, Brivo Systems, LLC; Benjamin Laurie Aaron, Vice President, Government and Research Center (PERSEREC); Andrée Rose, Butchko, CPP, President and CEO, Butchko Alliances, Quantum Secure, Inc.; Edward Levy, ■■ Research Analyst, Northrop Grumman/PERSEREC Security Solutions Advancing DoD Security Director of Security, Empire State Building Co.; Capabilities through Sponsored by the ASIS Defense and Intelligence Council Sponsored by the ASIS Information Technology Raymond T. O’Hara, CPP, Executive Vice President, Security Council Professionalization and Certification Andrews International ■■ Microsoft Global Security: Sponsored by the ASIS Physical Security Council Without the right education and training, you Converting the Dream into an ▲▲Where Is the Value in Security? are unprepared to counter the myriad of threats facing your people, facilities, and operations or Integrated Global Program To survive in the corporate environment, ■■ Cyber Series: Case Studies from to acquire the interest and resources needed to Through smart strategic planning, Microsoft security professionals need to be able to show the Front Lines—Computer Forensics combat them. The new DoD Security Professional Security implemented a global converged the quantitative value that their unique set of This session reviews actual cases of computer Education and Certification initiative will enable approach to physical security on a foundation skills brings to the organization. CEOs need to file date manipulation to alter evidence dates and extraordinary capability and performance of information technology using standard, understand how much money we bring to the to copy proprietary information, data theft via improvements across the DoD. Learn about off-the-shelf software and the existing network. organization in terms of reduced costs, increased removable devices, and attempted mass data the initiative’s structure and its educational and Learn how Microsoft monitors its enterprise from revenue, and improved employee performance. destruction to 30 computers. Learn what to certification requirements. centralized Global Security Centers (GSOCs) to Find the sources of value in your organization follow or watch for in examinations, discuss how enable remote monitoring, precision response, and demonstrate methods for measuring and Daniel McGarvey, Director, Information Protection, to monitor the date and time settings in Windows and global interoperability. Discuss the drivers presenting that value. U.S. Air Force; Reese Madsen, Jr., DoD Intelligence systems, and discover hidden “gotchas” relating Chief Learning Officer, DoD Human Capital Office; that led to the approval of the business case Jay C. Beighley, CPP, CFE, Vice President – to the conversion of time between processes Undersecretary of Defense (Intelligence); Dr. Joselito and learn how to map them to your organization. Corporate Security and President NPPS, LLC, and programs. Lualhati, Principal and Director – Strategy, Research, Nationwide Insurance Mike Howard, General Manager, Microsoft Global Kevin Bluml, CPP, President/Chief Examiner, and Development, The Global Skills Xchange Security, Microsoft Corporation; David J. Gibbs, Computer Forensics Consulting LLC Sponsored by the ASIS Defense and Intelligence Council CPP, Senior Vice President, SafirRosetti ▲▲ Security Architecture Sponsored by the ASIS Information Technology and Engineering, Part 3: Security Council ■■ Evacuation Issues in a ▲▲Contemporary Research Findings System Implementation Non-Fire Related Emergency, on Workplace Violence and Learn how dynamic implementation strategies ■■ Current Cargo Theft Trends a Case Study Aggression: Common Myths Exposed are critical to realize the benefits of modern and Methods In August 2009, on one of the hottest days of Little attention is paid to acts of violence between security systems and how avoidable failures This session analyzes cargo theft information the year, the fully-occupied Prudential Tower in employees unless they become media headlines, can cloud a security organization for years. This in the Supply Chain Information Sharing and Boston was evacuated due to a catastrophic yet violent acts in the workplace result in negative interactive discussion will explore critical aspects Analysis Center cargo crime database, including water leak. Learn why the event presented several consequences to the individuals involved as of the implementation process from procurement current information on the most targeted products evacuation issues that were more challenging well as the organization. Discuss the findings of through commissioning and beyond. Learn where and product types along with information about than an actual fire emergency and how security recent research on successful workplace violence and why security system implementations are where organized criminals are currently focusing and public safety agencies worked together to prevention strategies in large U.S. organizations. most likely to fail and identify the most costly their operations. Discuss the latest methods of mitigate and recover from it. See video of the Identify the essential organizational elements security technology implementation mistakes operations by cargo criminals to steal product, event and discuss the lessons learned. and individual competencies that are critical for and how to avoid them. from both in-transit shipments and distribution Alan M. Snow, CPP, Director, Safety and Security, success, and dispel common myths about James R. Black, CPP, PSP, Senior Security warehouses. Boston Properties violence in the workplace. Consultant, TRC; Randall Nason, CPP, Vice J.J. Coughlin, Director, Law Enforcement Services, President, C. H. Guernsey and Company Dr. Linda Florence, CPP, Faculty, Henley-Putnam LoJack Supply Chain Integrity University Sponsored by the ASIS Security Architecture and Sponsored by the ASIS Transportation Security Council Engineering Council

“It is a must for any security practitioner to attend the conference to be informed of the latest technologies, and the educational sessions provided a good barometer of what is happening in the security world.” Johan Joubert, Principal Good Harbor Consulting

40 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 41 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced Wednesday, October 13 • 4:30 pm–5:30 pm Will you succeed

●● Chief Security Evangelist: ●● Black Leaders in the Selling Security to the Workforce Security Industry or fall behind Evangelism is characterized by passionate This panel discussion features black leaders in enthusiasm for a cause; as Chief Security the security industry discussing the industry’s in today’s security environment? Evangelist, your job is to bring a religious zeal to best practices for mentoring and encouraging educating employees about your security plan. other black security professionals to continue Learn how to ‘preach the gospel’ of workplace developing and excelling within the industry. The security in your own organization. Discover discussion will examine issues such as mentoring, how much time is needed to indoctrinate new leadership and career development, continuing employees about security programs and the education, certification, and the glass ceiling. best way to present information to guarantee Donald Knox, CPP, CITRMS, Security and Crisis buy-in, retention, and goodwill. Management Analyst, Caterpillar; Leslie Cole, CPP, David J. Moitzheim, CPP, PCI, PSP, Security Security Management Consultant, Leslie Cole Specialist, Mayo Clinic; Mark Sorensen, CPP, Associates; Basil Steele, CPP, Senior Manager Security Specialist, Mayo Clinic Nuclear Security Program, Sandia National Laboratories; Loretta Veney, CPP, Owner, Superior Training Solutions; Ray Cloud, Vice President of ■■ Healthcare Security Best Practices Loss Prevention, Ross Stores This session addresses best practices Sponsored by the Association of Black Security Executives observed from over 300 healthcare security program reviews, site visits, and direct manage- ●● Security and Crisis ment practices in a number of areas including Management Academic Programs: security models, staffing and deployment, personal equipment, electronic security systems, The Evolution of a Professional policies and procedures, training, and response Development Strategy to terrorism. Crises and emergencies are a major driver for Fredrick Roll, CPP, President and Principal curriculum development in both the college and Consultant, Healthcare Security Consultants, Inc. secondary school settings. Courses and programs are being added which focus more on ■■ International Due Diligence the response to significant loss events than have Investigations: Providing Vital the traditional security management offerings. Homeland security, emergency or crisis manage- Intelligence to Mitigate Business ment courses and programs continue to evolve as Business as usual is no longer the key to career advancement. With the Risks in Foreign Markets well as certification programs which incorporate state of our economy, the security job market is even more competitive—and Companies face increased risk when establishing these components. An understanding of the business operations in foreign markets, and the history, evolution, and current status of these certifi cation of competence even more important. Your ability to differentiate yourself implementation of a systematic due diligence programs enables the practitioner and the from the crowd is critical. Raise your profi le and broaden your exposure in the process can provide vital intelligence about security industry to plan contemporary develop- the market environment and potential business ment strategies more effectively. profession with ASIS board certifi cation. partners. At the convergence of security, business Chris Hertig, CPP, Assistant Professor, York College intelligence, and compliance, due diligence of Pennsylvania; Ernest G. Vendrell, Ph.D., CPP, investigations represent a multi-disciplinary Associate Professor, Saint Leo University; Kevin The three certifi cations administered by ASIS International (ASIS)—Certifi ed approach to mitigating operational risks from Peterson, CPP, Consultant, IPS Consulting Protection Professional (CPP), Professional Certifi ed Investigator (PCI), and white collar and organized crime, fraud, corrup- Sponsored by the ASIS Academic Programs in Colleges tion, and terrorism. and Universities Council Physical Security Professional (PSP)—are recognized as the worldwide Frank Schurgers, Managing Director, Integris standard of professional competency in security management, investigations, International, LLC and physical security, respectively. “The quality of the seminars was excellent and I would recommend Compete and succeed with ASIS board certifi cation. Apply today. this convention and exhibits to anyone that seeks to further their career in the security industry. The overall excellence of the speakers and topics, both the general sessions and the break Learn more. Go to www.asisonline.org. outs, was exceptional.” Pat Salter, CPP, Branch Manager Securitas Security Services USA, Inc.

Accepted as the standard. Worldwide.

42 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced THUr NEW Thursday, October 14 • Schedule-at-Glance All sessions will be held at the Dallas Convention Center. LEVEL Arch/Eng/Design Crime/ Loss Prevention Crisis Management Critical Infrastructure Global Government/ Military Homeland Security Info/IT Security Information Protection Investigations Legal Management Physical Security Privacy Professional Development Terrorism Young Professionals en Español 8:00 am–9:00 am: KEYNOTE: President Pervez Musharraf 11:00 am–12:00 noon A Women’s Leadership Forum: Innovating Strategies for a Changing World ■ X X X ASIS Standards: Department of Homeland Security Private Sector Preparedness Law—Do You Really Have a Choice? ● X X X X Criminal Calendar, Criminal Mind: Can We Predict Violence? ■ X X Law Enforcement and Private Security: LEAPS Training Seminar ■ X X X X Guns in the Workplace ▲ X X Focus on Security Lighting ■ X X X Seek and Ye Shall Be Sued: Using Social Networking Sites to Manage Risk without Risking Litigation ■ X X X X X Gang Culture: From the Streets to the Hospital ■ X X X X Cyber Crime: The Next Generation of Criminal Enterprise ● X X X X Identifying Eavesdropping Devices ■ X X X X The Chemical Facility Anti-terrorism Standard (CFATS): Beyond the SSP ▲ X X X X X Attracting the Next Generation of Security Professionals: Security Operations Baccalaureate Degree ● X X X The Aftermath of Workplace Violence: A Victim’s Perspective ● X X X X Security Response to International Disasters: Challenges and Solutions ■ X X X X Safe and Secure Schools: Trends, Practices, and Funding ● X X X Privacy and IAM: Controlling Access to Sensitive Information in a Secure Environment ■ X X X 1:45 pm–3:00 pm Leading to Ethics: Do the Right Thing ■ X X X Homeland Security Policies: Impact on Business, Immigration, and Privacy ■ X X X X X The Security Metrics Challenge—You Are the CEO: You Decide Which Presenter’s Metrics Would Score for Your Boss ■ X X Military Transitioning 101: Making the Move from Active Duty and the Benefits of ASIS Certification ■ X X Is Your Video Smarter than a Fifth Grader? ■ X X Can Hotels Really Protect Tourists and Guests from Emerging Threats? ■ X X X X X Explosive Threats and Target Hardening: A Study in Explosives Environment Physical Security Response ■ X X X X Ten Years after 9/11: What’s Changed ▲ X X X X X Military Security Operations in Afghanistan/Iraq ■ X X X X Threats along the Texas/Mexican Border ● X X X Workplace Safety and Risk Management “Tune-up”: OSHA Federal Regulatory Compliance Matters for 2010 ■ X X X Planning, Preparation, Response, and Recovery Saves Lives and Your Business: Protecting Your Company from the Bomb Threat ■ X X X Sue Yourself, Before Someone Else Does: Avoiding Civil Tort Liability for Security Companies and Security Professionals ■ X X Security ROI: Proving Cost-effectiveness of Security Programs ■ X X X X Where in the World Are You? Device Tracking at the Enterprise Level ■ X X Contratación y administración eficaz de un sistema integrado de seguridad ■ X X X (Hiring and Effective Administration of an Integrated Security System) 4:30 pm–5:30 pm Women Working Together: Why Conflicts Exist ■ X X X Disaster in the Data Center ● X X X Military Risk Analysis ■ X X Mass Murders in the Workplace ■ X X Corporate Kidnapping: Preparing Management for the Unthinkable ■ X X X X X Electricity Grid Protection during the 2010 Winter Olympic Games ▲ X X X X X X The Electronic Crime Ecosystem: Physical Crimes and Logical Threats ▲ X X X X Indications and Warning of Attack: Three Paths to Effective Identification ■ X X X X Understanding and Preventing Computer Espionage ■ X X X X Communication as a Critical Skill: Personality Type, Temperament, Stress, and the Communication Wheel ● X X Enhancing the Public Private Partnership through Emergency Planning ▲ X X X X X Violence in the Church: Lessons Learned from 2009 Incidents ● X X X X X Mass Notification and Rapid Response ● X X X X A Business Model for Information Security ■ X X Mitigating Risk to Federal Facilities and Their Occupants ■ X X X

44 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 45 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced THUr Thursday, October 14 • 8:00 am–9:00 am • 11:00 am–12:00 noon Thursday, October 14 • 11:00 am–12:00 noon

8:00 am–9:00 am ■■ Criminal Calendar, Criminal Mind: ■■ Seek and Ye Shall Be Sued: Using ■■ Identifying Eavesdropping Devices Can We Predict Violence? Social Networking Sites to Manage This session describes the threats and practices Risk without Risking Litigation KEYNOTE Can violent criminal behavior be predicted or used by hackers and eavesdroppers in corporate communications intercepts. Learn from subject President Pervez simply forecast? Are different types of crime The social networking revolution has changed (e.g., child abuse, prostitution, or political crime) the modern workplace and the way employees matter experts the varied ways that communica- Musharraf related? Explore the differences between the and customers communicate, but is it lawful tion information is illegally captured, and review See page 6 for keynote clinical anti-social personality and the criminal for employers to use the information they find real-world, real-time, and hands-on examples. session description. psychopath and the patterns that each group on social media sites for business purposes? Clyde Widrig, Senior Managing Director, TSCM uses to commit crime. Examine predictive models This fascinating and fast-paced session will Practice, Risk Control Strategies; Richard Swanson, used to relate previously overlooked data that demonstrate these sites and how to safely and Telecommunications Manager, Federal Bureau of may hold the key to getting ahead of the threat. legally use this information without exposing Investigation; Mark Uker, Senior Instructor TSCM and Computer Forensics, Research Electronics Michael Prodan, Instructor/Consultant, Behavioral you and your organization to unnecessary and 11:00 am–12:00 noon International Science; Steve Surfaro, Channel Manager, Axis costly litigation. Sponsored by the ASIS Information Technology Communications Eugene Ferraro, CPP, PCI, CEO/Founder, Business Security Council ■■ A Women’s Leadership Forum: Controls, Inc.; James Burke, Partner, Wilson Elser Innovating Strategies for a ■■ Law Enforcement and Private Moskowitz Edelman and Dicker; Bruce Brownyard, Changing World Security: LEAPS Training Seminar Principal, Brownyard Programs, Ltd. ▲▲The Chemical Facility Anti-terrorism Standard (CFATS): The future is built one innovation at a time. This session explores how law enforcement and ■■ Beyond the SSP This panel presentation is designed to enable private security can use training seminars to forge Gang Culture: From the Streets this future by bringing together an elite group better partnerships to improve the safety and to the Hospital Although the Site Security Plan (SSP) may be of successful women leaders who encourage security of their respective spheres. The seminar This session provides an inside look at gangs. complete, the pressure on chemical facilities innovation and enhance leadership skills. What has grown and trained over 4,000 people in the Language, signs, symbols, dress, and the continues. This session will help you prepare for strategies have these women used to find this last 10 years. Discuss a step-by-step approach subculture’s growth across generations, race, and DHS inspections that will examine your program level of success and what specific abilities that cities can use to have a successful program. gender will be discussed. Hospitals face liability and the policies, procedures, training, drills, have they honed to successfully lead in this Gain valuable contacts you can call upon during risks when gang members attempt to visit a and exercises supporting your plan. Review non-traditional occupation? You will have an emergency and non-emergency events. hospitalized rival in an attempt to “finish the job.” the relevancy and accuracy of milestones and opportunity to direct your questions and timelines for planned measures and explore the Dennis Hathaway, Vice President, Securitas Security Involved parties cause disruption to other patients comments to our panel members. Services; Cpt. Bill Williams, Captain, Los Angeles or can inflict injury to bystanders, creating liability. operational and legal aspects of this next crucial Moderator: Dr. Marlene Palkovich, President, Police Department Learn how to recognize the signs of gang activity step in achieving plan approval from DHS. Marlene Palkovich Consultants in all hospital areas, how to assess the risk, and Michael Saad, CPP, Senior Director Consulting ▲▲Guns in the Workplace how to implement CPTED countermeasures. Services, Huffmaster Crisis Response, LLC; Wade Pinnell, CPP, Vice President, Huffmaster Companies; ●● ASIS Standards: Department of George Patak, Operations Manager, Detroit Area This dynamic and comprehensive session Evan Wolff, Director, Homeland Security Practice Office, G4S Wackenhut; Bonnie Michelman, CPP, Homeland Security Private Sector provides a practical survey of new gun laws and Resources Regulatory and Environmental Law, Director of Police, Security and Outside Services, Preparedness Law—Do You Really Hunton and Williams offers insight that will help you tailor security Massachusetts General Hospital Have a Choice? policies to comply with potentially contradictory Sponsored by the ASIS Utilities Security Council legislation. Discuss laws covering concealed The highly controversial PS-Prep program is ●● carry, guns in parking lots, and guns in vehicles. Cyber Crime: The Next Generation law. Is it really voluntary? Who are the potential of Criminal Enterprise ●● Attracting the Next Generation winners and losers? Is there a business case Learn the specific provisions within these laws, of Security Professionals: Security and obtain guidance on how to craft policies that for your company to participate in the program? Cyber crime has become a full-fledged theater Operations Baccalaureate Degree Learn how you can use the “new” ASIS/ANSI conform to legal mandates, while simultaneously of malicious activity, and it is becoming more Organizational Resilience Standard and the keeping your facility safe. lucrative every day. From countries to organiza- Learn how the federal government, contractor emerging Business Continuity Management Dr. James Pastor, President, SecureLaw, Ltd. and tions large and small, we are under threat of industry, and academia are teaming to mitigate Standard to help you comply with the law. Associate Professor, Calumet College of St. Joseph assault through the technology we depend on. the exodus of experienced security professionals Does your security practice include cyber over the next five to ten years and “grow their Lisa DuBrock, Managing Partner, Radian own security talent” through the development ■■ Focus on Security Lighting security? This session focuses on individual, Compliance, LLC; Donald Byrne, Consultant, of a comprehensive baccalaureate degree that Resiliency Plus; Robert M. Weronik, CPP, Assistant organizational, and state sponsored attacks This session reviews the role of lighting in covers all aspects of the security discipline Chief Security Officer, General Electric Co. against corporations, nations, and private citizens. securing a facility, the properties of light and as practiced by the U.S. Government and Sponsored by the ASIS Standards and Guidelines Roy Wilkinson, Ph.D., President, SPI Services lighting terminology, and case studies of supporting contractor industry. Discuss method- Commission Sponsored by the ASIS Information Technology applications in loading docks, parking lots, and ologies, obstacles, and steps for turning concept Security Council building and site perimeters. By understanding into reality. the language of the lighting engineer and architect William O’Neill, Deputy Director for Community who specify both internal and external lighting, Services, Office of the Director of National security professionals will be better equipped Intelligence; Teresa Shoup-Stirlen, Security to promote the security agenda. Education and Training Program Manager, Office David Aggleton, CPP, CSC, President/Principal of the Director of National Intelligence; Mitch Consultant, Aggleton and Associates, Inc. Lawrence, Director Government Security, AT&T Government Solutions; Dr. Van Reidhead, Dean, Sponsored by the ASIS Security Architecture and College of Social and Behavioral Sciences, Engineering Council University of Texas – Pan American Sponsored by the ASIS Defense and Intelligence Council

46 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 47 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced THUr Thursday, October 14 • 11:00 am–12:00 noon • 1:45 pm–3:00 pm Thursday, October 14 • 1:45 pm–3:00 pm

●● The Aftermath of Workplace ■■ Privacy and IAM: Controlling ■■ The Security Metrics Challenge— ■■ Military Transitioning 101: Making Violence: A Victim’s Perspective Access to Sensitive Information in a You Are the CEO: You Decide the Move from Active Duty and the Security is often a shared responsibility between Secure Environment Which Presenter’s Metrics Would Benefits of ASIS Certification facility and security management. The IFMA (ISC)2 and the International Association of Privacy Score for Your Boss Leaving active duty is a very exciting time for Foundation funded an extensive study of Professionals (IAPP) have joined together to How do you present senior business and military personnel as they look forward to new workplace violence and published an informative produce this educational session that will explore government leaders with the security risk challenges. It can also be a very intimidating time report dedicated to the memory of David Beverly, the information security and privacy issues that management and performance measures they as many may not have had to write a resume or Linda’s husband. Mrs. Beverly shares her story arise through efforts to authenticate identities and need to assure protection while maintaining be interviewed in a very long time. Learn the keys and, joined by Pat King, presents ideas for manage identity risk. In addition, it will describe ROI? Discover proven methods for developing to a successful transition. This session will focus creating safer workplaces; showing how changes the crucial role that information security and risk-managed proposals that help executives on writing resumes, conducting interviews, in policies and practices can make a difference in privacy professionals play in access and identity make key security budgeting decisions. Learn obtaining federal jobs, and developing your morale, costs, and lives. management. Learn how to incorporate risk- how security leaders measure the effectiveness network for a successful job hunt. See how ASIS Linda Beverly, Vice President of Administration, based decision making into your authentication and efficiency of security measures and demon- board certification uniquely prepares you to be International Facility Management Association; choices so that privacy is appropriately protected strate a meaningful ROI. Compare the best compatible and competitive when you earn the S. Patrick King, Consultant, Risk Management and resources effectively and securely deployed. practices of top security executives. CPP, PCI or PSP. Associates Sponsored by (ISC)2 James Shamess, CPP, Senior Advisor, Security Joseph Rector, CPP, PCI, PSP, Deputy Chief of Policy and Oversight, U.S. Air Force; Edward P. Security Forces, U.S. Government – Air Force; ■■ Security Response to International Halibozek, Vice President Corporate Security, Richard Yamamoto, CPP, Director of Corporate Disasters: Challenges and Solutions Northrop Grumman Corporation; Jeffrey C. Dodson, Security & Resiliency, Fannie Mae Successful security response to international Vice President/Chief Security Officer, BAE Systems; Sponsored by the ASIS Military Liaison Council Timothy McQuiggan, Director, Security and Fire disasters, often involving humanitarian assistance Protection, Boeing Defense, Space and Security; and disaster relief activities, is critical to the ■■ 1:45 pm–3:00 pm Karl Glasbrenner, CPP, PCI, Chief, Office of Is Your Video Smarter than a safety and security of personnel and business/ Personnel Security, Defense Intelligence Agency; Fifth Grader? mission continuity. Security challenges often ■■ Leading to Ethics: Do the Right Ray Musser, CPP, Staff Vice President, Security, The advantages of digital video can be offset include minimal or nonexistent critical infrastruc- General Dynamics Corporation by reliance on a guard force watching monitors ture, nonexistent or little physical security Thing Sponsored by the ASIS Defense and Intelligence Council with limited success. Review independent support, criminal activity, and more. Explore the A panel of distinguished leaders with proven findings, claims, and applications from a security challenges and solutions in response to ethics standards will give insights and ways to cross-section of manufacturers to learn about the 2004 Asian tsunami, the 2009 West Sumatra turn values and ethics into value-added results. available and upcoming functionality and earthquake, and the 2010 Haiti earthquake. By committing to ethics, we can have a positive technology. Various vendors’ applications of and lasting impact on our organizations. The Scott Bernat, Chief of U.S. Military Security, video as a detection and assessment tool will panel members will take questions and comments Resident Agent in Charge, U.S. Naval Criminal be demonstrated on screen; you can visit from the audience. Investigative Service (NCIS)/Force Protection booths in the exhibit hall for detailed information. Detachment Indonesia Moderator: Dr. Marlene Palkovich, President, (The presenter does not represent any manufac- Marlene Palkovich Consultants turer or sell any equipment or software.) ●● Safe and Secure Schools: ALL INFORMATION ABOUT Howard A. Moster, ALLCPP, INFORMATION PSP, Senior Partner, ABOUT ALL INFORMATION ABOUT Trends, Practices, and Funding ■■ Homeland Security Policies: Practical Protection Associates Too often, school security programs are an The Impact on Business, Sponsored by the ASIS Physical Security Council Immigration, and Privacy ASIS 2010 outdated assortment of systems, personnel, and ASIS 2010 ASIS 2010 crisis plans that lack funding for improvement. This session explores the direct impact that ■■ Can Hotels Really Protect Tourists SEMINAR & From the latest technology threats to important homeland security regulations and technologies EXHIBITORS and Guests fromSESSIONS Emerging Threats? security practices, discover the tools you need have on three major areas: business, immigration, AT YOUR FINGERTIPS Recent attacks onAT hotels YOUR around FINGERTIPS the world have EXHIBITS to approach school security collaboratively and and privacy. Homeland security-related regula- changed the face of tourism and altered the role AT YOUR FINGERTIPS holistically, with a focus on practical strategies tions which mandate disaster preparations and of hotels as protective domains. Discuss trends for access control and communications. You continuity plans can increase the cost of doing in hotel design and operation to protect critical will benefit from lessons learned, photographic business. High-tech U.S. businesses need skilled VISIT VISIT VISIT assets using transparent security, CPTED, and “before and after” examples, and helpful funding legal immigrants, while the agriculture, construc- www.asis2010mobile.org www.asis2010mobile.org www.asis2010mobile.org counter-terrorism strategies. Learn new hotel resources. tion, and hospitality sectors use a large number FROM YOUR SMARTPHONE FROM YOUR SMARTPHONE FROM YOUR SMARTPHONE strategies being used to reduce the opportunity Paul Timm, PSP, President, RETA Security, Inc. of unskilled, undocumented workers. Security of crime and terrorism and to screen people, technologies—from CCTVs placed at street vehicles, and packages. corners to the fingerprinting of school children— erode our privacy and also give identity thieves Dr. Randy Atlas, Ph.D., CPP, AIA, Vice-President, access to large personal information databases. Atlas Safety and Security Design, Inc.; Patrick How can we protect U.S. security, but do so Murphy, CPP, PSP, Director of Loss Prevention, Marriott International, Inc. in a way that will not be too burdensome for businesses and individuals alike? Sponsored by the ASIS Security Architecture and Engineering Council Benjamin Frankel, Editor-in-Chief, Homeland Security News Wire

48 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 49 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced THUr Thursday, October 14 • 1:45 pm–3:00 pm Thursday, October 14 • 1:45 pm–3:00 pm

■■ Explosive Threats and ●● Threats along the Texas/ ■■ Planning, Preparation, Response, ■■ Where in the World Are You? Target Hardening: A Study in Mexican Border and Recovery Saves Lives and Your Device Tracking at the Enterprise Explosives Environment Physical Over the past three years and especially since the Business: Protecting Your Company Level Security Response beginning of 2009, violence on the U.S.-Mexico from the Bomb Threat This session will explore the security challenges Bombings and bomb threats occur daily from border has grabbed media headlines around the A bomb threat delivered by a disgruntled posed by sophisticated device tracking capabili- a variety of adversaries, and effective response world. According to the University of San Diego employee or an extortionist can be as disruptive ties being used in the enterprise, and criminals plans can make the difference between a Trans-border Institute, between January 1, 2007 to your staff and profit margin as a terrorist who try to exploit them through publicly available managed emergency and debilitating results. and May 29, 2009 there were 9,903 drug war threat. A panel of subject matter experts collation tools/data. You will hear case studies on Get a detailed introduction to the tools, tech- related deaths. During the month of July 2009, at discusses how to develop a practical security how to implement security best practices to niques, coordination, and best practices for least 244 people were killed in and around the city program using established security techniques. combat this new, unchartered threat territory. creating effective risk-based response plans. of Cuidad Jaurez alone—the highest one month Review practical steps, appropriate responses, Sponsored by (ISC)2 Part 2 of this program focuses on medical total so far. and contingency plans for reducing the threat considerations, incident command, business Luis Morales, CPP, Lead, Physical Security Center response and recovering from of a violent attack continuity, search procedures, use of K9’s, current of Excellence, ConocoPhillips Company on your company. physical security systems, and detection systems. Bob Hayworth, CPP, Senior Project Analyst, A-T ■■ Jeffrey Slotnick, PSP, President, Setracon Workplace Safety and Risk Solutions, Inc.; Larry Lewis, CPP, Senior Project ■■ Contratación y administración Incorporated Analyst, A-T Solutions, Inc.; T. Shelton Little, Jr., Management “Tune-up”: OSHA eficaz de un sistema integrado Sponsored by the ASIS Physical Security Council Federal Regulatory Compliance Senior Vice President, Security Solutions, A-T Solutions, Inc. de seguridad Matters for 2010 ▲▲Ten Years after 9/11: (Hiring and Effective Administration of Learn whether your programs and policies ■■ Sue Yourself, Before Someone Else What’s Changed an Integrated Security System) intended to prevent harm could be in violation Does: Avoiding Civil Tort Liability for of recent OSHA standards. Employers are Esta ponencia muestra las aptitudes que 9/11 changed the world we live in, making the Security Companies and Security responsible for hazard communication, personal debe tener un gerente de seguridad para security programs in place on September 10, Professionals 2001 suddenly obsolete. The subsequent anthrax protective equipment, and electrical safety, poder administrar recursos en forma eficaz. threats and recent attempted terrorist attacks among others, and these should be addressed Security professionals are accustomed to Se proporciona la información necesaria para remind us that we cannot become complacent. in written policies, implementation, and training. assessing security risk, but what about the risk poder llevar a cabo las tareas de contratación We must continue to challenge ourselves to Changes to state laws regarding weapons in posed by liability? Security companies and y administración en forma eficaz utilizando do better. Review how 9/11 changed the way parking lots could make some employers’ directors are faced with ever-growing lawsuits una lista de control para cada paso dentro security professionals create policies and prevention policies suddenly illegal. Is your involving the use of force, negligent security, civil de dichos procesos. procedures, implement new technology, and property at risk? rights violations (including ADA claims), negli- This presentation shows the abilities a security conduct emergency response training to address Dr. Gloria Heatherington, President, Heatherington gence, negligent hiring and supervision, wrongful manager must have in order to manage resources terrorist threats. Consulting Group, Inc.; Dr. Linda Florence, CPP, termination, harassment, and discrimination. effectively. We provide the information required Learn the six key ways to reduce exposure and Carlos Villarreal, Senior Vice President, Commercial Principal, The Florence Group to conduct the hiring and administration activities Real Estate Division, Whelan Security; Glen examine real-life examples to gain practical tips effectively by using a checklist for each step Kitteringham, CPP, Director, Security and Life and methods for minimizing and avoiding your within these processes. exposure to these claims. Hear two security Safety, Western Canada, Brookfield Properties Julián Puentes, CPP, PSP, Director, Proyectos Corp.; Mark Wright, Regional Director of Security, “The educational value, networking litigation attorneys and a security expert present Especiales, Omnitemp U.S. Brookfield Properties; Keith Kambic, CPP, Director these issues as well as practical solutions. opportunities, and display of of Security and Life Safety, U.S. Equities Asset Barry A. Bradley, Esq., Managing Partner, Bradley & Management advanced security technologies are Gmelich; Gary J. Bradley, Esq., Attorney, Bradley & Sponsored by the ASIS Commercial Real Estate Council Gmelich Lawyers; Steve Kaufer, CPP, CSC, second to none. That is why I attend President, Inter/Action Associates, Inc. ■■ Military Security Operations in yearly and if you have not, I can If you’re not an ASIS Afghanistan/Iraq only say that you are missing out on ■■ Security ROI: Proving Cost- member—join now effectiveness of Security Programs Since the military began prosecuting the Global an outstanding opportunity to stay and save up to $335 War on Terrorism (GWOT) in 2001, police/security Fight budget cuts effectively. As organizational forces are in high demand. Many of these forces connected, further your security costs come under increasing scrutiny, security on your registration. perform roles and missions that fall outside their management career, and meet program managers are constantly challenged to See www.asis2010.org/registration core competencies, while other military special- others that face the same security prove their program’s cost effectiveness. Learn ties have been assigned roles and missions to how to use easily available program metrics to for details. cover shortfalls in police/security forces. Review challenges and successes around convince top management of the effectiveness current and future operations conducted by the globe.” of the security program in a verifiable way. Learn military security professionals in the GWOT and how to generate additional budget and focus on discuss the challenges and lessons learned. Mark A. Hammargren, CPP, Associate Manager those countermeasures that provide the most Representatives from the U.S. Marine Corps, U.S. Battelle Memorial Institute results for the least cost. Navy, U.S. Coast Guard, U.S. Air Force, U.S. National Thomas Norman, CPP, PSP, Principal, Protection Guard and Canadian Forces Partners International Sponsored by the ASIS Military Liaison Council Sponsored by the ASIS Oil, Gas, and Chemical Industry Security Council

50 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 51 EDUCATION Sessions

LEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced THUr Thursday, October 14 • 4:30 pm–5:30 pm Thursday, October 14 • 4:30 pm–5:30 pm

4:30 pm–5:30 pm ■■ Mass Murders in the Workplace ▲▲The Electronic Crime Ecosystem: ●● Communication as a Critical Skill: Using 40 cases from 1986–2010, this study Physical Crimes and Logical Threats Personality Type, Temperament, finds that the profile of a workplace mass killer Stress, and the Communication ■■ Women Working Together: Technological advances that have created new is somewhat different from a perpetrator of Wheel Why Conflicts Exist market opportunities in Asia and Eastern Europe mass murder or workplace homicide. Factors have also enabled a new generation of criminals Under stress, people’s communication patterns Join your colleagues and participate in this such as long-term arguments, harassment, and who steal capital and intellectual property, and change, usually in ways that do not enhance highly charged session focusing on the celebra- job termination can be triggering events, while undermine brand integrity. Learn about the major effectiveness. Learn how personality types and tion of our strengths in the workplace and the negligent or inappropriate management practices criminal groups and their techniques, and how the temperaments affect communication styles and discovery of why we, as professionals, must also play an aggravating role. The research economic crime ecosystem functions. Discuss how to communicate more effectively in stressful face honestly and openly the women-to-women suggests that supervisors and senior managers how corporations can maximize their interaction situations. Tools for flexing your natural communi- conflicts that have compromised our individual need to reconsider their handling of employee with law enforcement and vendors regarding cation style to accomplish the mission will be and collective potential. grievances. electronic crime risk. discussed, and the session will include a free Dr. Marlene Palkovich, President, Marlene Palkovich Dr. Seungmug (Zech) Lee, Ph.D., Assistant W. Michael Susong, CPP, VP Global Intelligence, personality type assessment. Consultants Professor, School of Law Enforcement and Justice iSIGHT Partners Pam Truchon, CPP, Senior Security Manager, Office Administration; Robert McCrie, Ph.D., CPP, of the Director of National Intelligence Professor, John Jay College ●● Disaster in the Data Center ■■ Indications and Warning Recent disasters like the heavy snowstorms that of Attack: Three Paths to ▲▲Enhancing the Public/ ■■ Corporate Kidnapping: Preparing paralyzed parts of the United States and the fatal Effective Identification Private Partnership through earthquake in Haiti have shown the unprepared- Management for the Unthinkable The ability of security professionals to identify Emergency Planning ness of both the population and the government Obtain guidance in preparing your company for indicators and prepare their organization for an to deal with such events. Learn how small- to the unthinkable—an executive kidnapping and This session discusses the benefits of coopera- attack impacts the continuity of operations and mid-size enterprises can deal successfully with ransom negotiation. Understand how to effec- tive public- and private-sector partnerships for the potential loss of life. Learn three ways to such events and get back into business rapidly tively integrate a working plan into the company’s enhancing community safety, security, and identify indicators of attack, understand how by considering security, communications, and existing decision making structure. Be aware emergency preparedness. Partnerships serve as to prepare your people based on accurate an easy to establish, no-nonsense approach. of ethical and legal parameters surrounding a a resource to communities for incident command analysis of the indicators, and craft timely and kidnapping, including complex international policy and preparedness, emergency management, and Capt. Werner Preining, CPP, Executive Vice credible warnings. You will also learn ways to issues. Recognize the primary, secondary, and Critical Incident Protocol (CIP) utilization. Discuss President, Interpool Security, Ltd.; Ronald Lander, prevent overlooking threat indicators and discuss mutual goals, resources, and commonalities that CPP, Chief Specialist, Ultrasafe Security Solutions tertiary considerations when dealing with an techniques for avoiding self-deception. assist partnerships in developing joint emergency Sponsored by the ASIS Information Technology Security executive kidnapping as well as what you need Lydia Wilson, Program Manager, FBI Chief Security planning and preparedness. Council and the ASIS Crisis Management and Business to ask of your professional negotiator. Officer Training, SRA International, Inc. Continuity Council Christopher Falkenberg, President, Insite Security, Andrea R. Hollman, Project Manager, United Space Inc.; Chris Voss, Black Swan Group, Ltd. Alliance, LLC; Briane Grey, Executive Director, ■■ Understanding and Preventing Southern California Drug Task Force; Jeffrey Terry, ■■ Military Risk Analysis Computer Espionage Office of Emergency Management, City of Los The Department of Defense (NAVFAC ESC) has ▲▲Electricity Grid Protection during Angeles; Richard Wright, CPP, President, Wright developed a quantitative Risk Analysis and the 2010 Winter Olympic Games Many analysts believe that the number one threat Security, Inc. facing their corporate customers is targeted Vulnerability Assessment (RAVA) process to guide Electricity is critical to the success of any Olympic corporate espionage from within the organization. organizations in locating the greatest risks and Games; protecting the electricity grid during an ●● Violence in the Church: Lessons Hear from a former Microsoft security evangelist determining cost-effective countermeasures. Olympic event requires elevated responsibility. Learned from 2009 Incidents as he shares real-world stories from the trenches The RAVA process focuses on the quantifiable Learn about the risk mitigation plan used by BC that illustrate the risks that this threat poses for Church violence often goes unnoticed unless rather than the qualitative or subjective, thus Hydro as well as security issues encountered you and your customers. Discover the means it becomes a media sensation. However, in offering uniform and repeatable results. during the Games. Review planning approaches, by which these attacks occur and the mindset 2009, U.S. churches experienced 12 homicides mitigation strategies, defined risks, and security James Smith, CPP, SME, Department of Defense of the attackers. and 38 other acts of violence. These are generally (NAVFAC ESC); Victor Vella, Jr., Chief, Antiterrorism considerations associated with protection not classified as “hate crimes”; rather, they are Services Team, Department of Defense (NAVFAC ESC) planning for critical infrastructure and the Kai Axford, Manager, IT Security Services, Accretive Solutions a combination of crimes of opportunity and electricity grid in British Columbia during the the targeting of churches because of their 2010 Winter Olympics. vulnerability. This session reviews actual cases Doug Powell, CPP, PSP, Manager, Corporate of church violence and the lessons learned for Security, British Columbia Hydro preventing further incidents. Sponsored by the ASIS Utilities Security Council Jeffrey Hawkins, Executive Director, Christian Security Network “If you want to strive for the best in your security career, you must go to ASIS Seminar and Exhibits. The value of networking and keeping up to date with new trends cannot be measured.” Roberto Larreal, CEO Favinca

52 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 53 EDUCATION Sessions

THUrLEVEL KEY: ● Fundamental ■ Intermediate ▲ Advanced THUrFRI Thursday, October 14 • 4:30 pm–5:30 pm FRIDAY, October 15 • 8:00 am–2:15 pm ●● Mass Notification and ■■ Mitigating Risk to Federal Facilities 8:00 am–9:20 am 11:10 am–12:30 pm Rapid Response and Their Occupants Effective response to security threats depends Federal Protective Service (FPS) has the GENERAL SESSION GENERAL SESSION on having an automated, two-way mass notifica- responsibility for security and law enforcement at Get Off My Cloud: Opportunities, Security Insights Program: tion and response system that can immediately over 9,000 federal government facilities nation- communicate with all key personnel, wherever wide and has taken a step forward to improve risk Dangers, and Realities of Cloud Connecting the Dots—Security they are, on many modalities (multiple phones, mitigation at federal facilities and enhance the Computing and Corporate Ethics SMS, pager, email, and more). The larger the safety and security of building occupants. FPS Cloud computing and virtualization will Ethics. Compliance. Security. These three highly organization, the more critical this capability has created and implemented the Risk Assess- dramatically affect Information Technology (IT) interwoven issues are a major concern to today’s becomes. Technologies include video surveil- ment and Management Program (RAMP), a in virtually every organization. Many will com- security professionals. This year’s program offers lance, mass notification, fire alarm systems, secure, web-enabled tool developed to improve pletely outsource the IT function. New security an in-depth exploration of the manner in which one card access across a multi-campus, multi- and standardize the way FPS collects and capabilities as well as exposures relating to the corporate ethics, security, and compliance affect building, and globally geographically dispersed manages information throughout the security protection of critical information assets will be the every-day life of the conscientious practitioner. locations managed both centrally and locally planning process. RAMP conforms to the created. Adversaries will benefit as well, capable Panelists include the executive director of the using actual scenarios. Learn the “Three E’s” National Infrastructure Protection Plan baseline of new and more powerful attacks. This session Ethics and Compliance Officers Association of successful deployment, best practices for criteria to mitigate risk by incorporating threat, examines these issues and provides you with as well as security professionals working with implementation, training, testing, and practicing, vulnerability, and consequence considerations in the information you need to deal effectively with these issues. and the importance of having real-time reporting a documented and reproducible manner. this emerging technology that has the potential Panel: Donna C. Boehme, Principal, Compliance of communications during an event. Mark Harvey, Branch Chief, Infrastructure Protection to change IT as dramatically as the Internet did. Strategists LLC, former Group Compliance and Denise Chatam Walker, Chief Emergency Branch, Risk Management Division, Federal Moderator: Raymond T. O’Hara, CPP, Executive Ethics Officer, BP plc.; Keith T. Darcy, Executive Management Officer, Lone Star College System; Protective Service Vice President, Consulting & Investigations, Andrews Director, Ethics & Compliance Officer Association; Rudy Wolter, CPP, Senior Vice President, CitiGroup Sponsored by ISACA International Richard M. Kelly, Corporate Compliance Officer, Director – Global Security & Compliance, Harsco Panel: David Cullinane, Chief Information Security Corporation; Perry A. Minnis, Chief Officer, Minnis ■■ Officer, eBay; Timothy L. Williams, CPP, Director A Business Model for Information and Associates; Security of Global Security, Caterpillar; David Tyson, CPP, CISO, PG&E; Stephen Scharf, SVP & Global CISO, Security managers recognize the need to Experian integrate security activities into the business Co-sponsored by the Information Security Management 12:30 pm–2:15 pm and to align security with organization goals Advisory Commission, Cloud Security Alliance, and CSO and priorities. This is true for all areas of security. Roundtable The Business Model for Information Security is a Closing Luncheon systemic model that describes what information with Dave Barry security contains and how security programs “Any executive responsible Humorist and best-selling work. While developed to address information for physical security systems author, Dave Barry was a security, the concepts are widely applicable to all should consider ASIS time well syndicated columnist for areas of protection. This session provides an 25 years whose work overview of the business model and how it can be spent. Do not settle for your 9:35 am–10:55 am appeared in more than 500 used to better connect security program activities existing products and providers newspapers in the United with the business to achieve better results. States and abroad. In 1988 he won the Pulitzer —see what is happening so GENERAL SESSION Ron Hale, CISM, Director of Information Security Perspectives on Security: Prize for Commentary. He also was the inspiration for the CBS TV sitcom, Dave’s World. Barry has Practices, ISACA you don’t get left behind. What’s Your Weakest Link? Sponsored by ISACA defined a sense of humor as “a measurement of The convergence of physical Today, most products and services are the the extent to which we realize that we are trapped security with IP networks can result of inputs by numerous suppliers outside in a world almost totally devoid of reason. Laugh- either empower you, or leave the fabric of the host company, with raw materials ter is how we express the anxiety we feel at this and services resourced from all points of the knowledge.” you behind.” globe. Many finished products are provided to consumers under familiar name brands, yet are Nate Howe, Information Security Officer we assured that what we receive, ingest, and “The ability to meet with a Western Federal Credit Union operate performs, and is, as advertised? What is multitude of vendors and the weakest link in your supply chain that could adversely affect consumer confidence and the network with other security brand name? A panel of highly qualified experts professionals is worth more to include those representing manufacturers of various types of goods examines this topic. than the price of admission.” Moderator: Steve Chupa, CPP, Director, Security Bill Crews, CPP, Port Security & Emergency Worldwide, Johnson & Johnson Operations Manager Panel: Ken Konigsmark, Senior Manager, Supply Port of Houston Authority Chain & Aviation Security Compliance, The Boeing Company; Dr. Yossi Sheffi, Professor, Massachusetts Institute of Technology, Head of MIT’s Engineering Systems Division (ESD) and Director of the MIT Center for Transportation and Logistics (CTL); Tony Strange, Director, Channel Integrity, Medical Device and Diagnostic Sector, Johnson & Johnson

54 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 55 Networking Events Special Interest networking events

ASIS Foundation Networking Luncheons All events will be held at the Hyatt Regency Dallas. 14th Annual Golf Classic Tuesday, October 12–Friday, October 15, Monday, October 11, 8:00 am–1:30 pm 12:00 noon–1:30 pm Christians in Security Prayer National Association of Security Cowboys Golf Club, Grapevine, TX These hosted luncheons provide great opportuni- Breakfast Companies (NASCO) Breakfast Join your colleagues and ties for networking with peers from diverse Wednesday, October 13, 7:00 am–9:00 am Wednesday, October 13, 7:00 am–8:00 am clients for a great day of golf at backgrounds and interests, sharing experiences, You are invited to the 17th Annual Christians The National Association of Security Companies the prestigious Cowboys Golf and exchanging ideas. Included in Full Registra- in Security Prayer Breakfast for a time of (NASCO), the largest contract security trade Club. Proceeds benefit the tion and Single Day registration. Additional tickets fellowship and prayer. Advance reservations association, is pleased to sponsor NASCO’s 19th ASIS Foundation. This popular available for purchase. are recommended. Please contact Scott Jensen, Annual Breakfast and Awards Program for senior event sells out every year… CPP at +1.860.243.0833 ext. 217 or email executives involved in contract security services. register today! See page 61 President’s Reception [email protected] no later than October 1. For details and reservations, contact NASCO at for complete details. Dallas Heritage Village at Old City Park +1.202.347.3257 or email [email protected]. Space Tuesday, October 12, 7:00 pm–10:00 pm Bureau of Alcohol, Tobacco, is limited; please register by October 1. Young Professionals’ Reception ASIS President Joseph R. (Bob) Granger, CPP, Firearms & Explosives (ATF) Monday, October 11, 5:00 pm–6:00 pm invites you to attend this highly anticipated event Former U.S. Military Breakfast at Dallas Heritage Village. Experience a multi- Breakfast Wednesday, October 13, 7:00 am–8:00 am For full-time security professionals between the Wednesday, October 13, 7:00 am–9:00 am sensory, live portrayal of 19th century life in North All retired/former officers from the U.S. military ages of 21 and 40, ASIS is holding a first-time The ATF Association Texas. Nestled in 13 acres just a few minutes from services (Army, Navy, Air Force, Marines, Coast reception to provide a place to meet, network, (ATFA) and American the convention center, the Village is comprised of Guard) who are members of ASIS and serving and exchange ideas with your peers. This is a Security Programs, Inc. 38 historic structures including a working Civil in security positions throughout the world are great opportunity to connect with like-minded (ASP) invite all former, War era farm, a traditional Jewish household, invited to attend. A senior military officer will individuals who may be facing many of the same current and retired ATF employees who are elegant Victorian homes, and various commercial present a short update on today’s military challenges as you. attending the ASIS Seminar to join together for a buildings. Enjoy authentic BBQ catered by Eddie and identify the challenges of the future. networking breakfast. No admission fee required, Deen’s, networking, and non-stop entertainment. For details and reservations, please contact First-Time Seminar Attendee/ however reservations are required. For details Proceeds from a cigar fundraiser will benefit the Ronald Olsen at +1.760.776.1295 or email and reservations please contact Jeff Roehm at New Member Reception ASIS Foundation and the Wounded Warrier [email protected] no later +1.703.834.8900 or [email protected] Monday, October 11, 6:00 pm–7:00 pm Project. Included in Full Registration package and than October 1. No admission fee required. New to ASIS or the Seminar? Don’t miss this Tuesday’s Single Day Registration. Additional before October 1. opportunity to meet key members, network with tickets available for purchase. Military and Law Enforcement other first-timers, enjoy refreshments, and learn Former FBI Agents Breakfast the ropes on how to get the most from your Wednesday, October 13, 7:00 am–8:00 am Networking Lounge Law Enforcement/ Thursday, October 14, 3:00 pm–4:00 pm Seminar experience. ASIS President, Joseph R. You are invited to join your peers for the Military Appreciation Day Network with fellow military and law enforcement (Bob) Granger, CPP, will welcome you and provide Thursday, October 14 23rd Annual Breakfast. Please RSVP to an overview of what you are about to experience Weldon Kennedy at [email protected] or personnel who are preparing to transition to the If you are an active law enforcement or military at the world’s leading event dedicated to security. +1.901.522.6060. Advance reservations are private sector and others who have successfully professional, you are invited to attend the keynote By invitation. recommended. transitioned. Meet colleagues, share your resume, with President Pervez Musharraf, as well as learn about educational opportunities, and more. Thursday’s sessions and the Exhibits—at no Welcome Reception Former Secret Service Breakfast This follows the session, Military Transitioning charge. To obtain your complimentary registration 101: Making the Move from Active Duty and the Monday, October 11, 7:00 pm–9:00 pm Wednesday, October 13, 6:30 am–8:00 am for this special day, please register onsite in Benefits of ASIS Certification, being held on Kick off your week at this casual evening Dallas at ASIS Registration. Government or Join current and former agents of the U.S. Secret Thursday at 1:45 pm. reception. It’s a fabulous opportunity to connect military photo ID is required. Service. Please confirm your attendance by with peers, renew acquaintances, or plan a get October 1 to [email protected] or together while enjoying drinks and snacks in a by phone at +1.630.571.1055. lively and informal atmosphere. Included in Texas BBQ at Eddie Deen’s “The ASIS Seminar is the definition Full Registration. Additional tickets available Proceeds benefit the ASIS Foundation International Organization Thursday, October 14, 7:00 pm–9:30 pm of networking. I’m surprised each for purchase. of Black Security Executives Grab your boots and head on down to Eddie year at who I meet, and the value Deen’s Ranch for a Texas-style BBQ, live (IOBSE) Mixer Opening Ceremony entertainment, and networking with friends and Wednesday, October 13, 6:00 pm–8:00 pm they add to the work I do.” Tuesday, October 12, 7:45 am–9:00 am peers. Ticketed event, see page 61 for details. The International Organization of Black Security Shawn Reilly, Director, Security This year’s event celebrates Executives (IOBSE) invites you to join them for an the 55th anniversary Greenville Hospital System Closing Luncheon/Closing evening of networking. For details, please contact of the founding of ASIS Chiquita Leak at +1.702.845.3172 or email International. After the inspiring Ceremony with Dave Barry [email protected]. No admission fee required. presentation of 100 flags, Friday, October 15, 12:30 pm–2:15 pm 60 members of the Dallas Unwind at the closing luncheon as you enjoy Symphony Orchestra will take Dave Barry’s offbeat outlook on life, politics, us on a musical tour through the history of the and the American way of life. For 25 years, Society, including the various milestones in the Barry was a syndicated columnist whose work growth and development of the organization. appeared in more than 500 newspapers in the The session will conclude with a few celebratory United States and abroad. In 1988, he won the surprises. Open to all Seminar attendees and Pulitzer Prize for Commentary. Barry also is a exhibitors. best-selling author and the inspiration for the CBS TV sitcom, Dave’s World. Open to all Seminar attendees. Additional tickets available for purchase.

56 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 57 Guest program

Art and History in Dallas Cowboys and Culture: (Choose from two exciting tours) Forth Worth Stockyards Tuesday, October 12, 9:00 am–12:00 noon Thursday, October 14, 9:00 am–4:00 pm Discover the world-class Arts District and two of Experience history and its shining jewels. The stunning Dallas Museum of modern culture all wrapped up Art houses major works of Pre-Columbian, Old into one fabulous city! Step World, and modern art. Highlighting the museum’s back in time in Fort Worth’s permanent collections are The Ten Treasures, magnificent Sundance Square each representing one key area of the museum. and its spectacular turn-of- The Reves Collection is a unique assembly the-century buildings amidst of works by Manet, Renoir, Cézanne, Pissaro, towering skyscrapers and learn the colorful Gauguin, Van Gogh, and Monet, exquisite history of Cowtown. Fort Worth was once home furniture, and decorative arts. Across the street at to legendary figures such as Butch Cassidy and the newly opened Nasher Sculpture Center, this the Sundance Kid, cattle barons, and rugged multi-million dollar museum and sculpture garden cowboys. is dedicated to the understanding, exhibition, and enjoyment of modern and contemporary Enjoy a fun-filled day in the Fort Worth Stockyards sculpture. It is truly one of Dallas’ most unique filled with lively western saloons, quaint shops, and utterly modern venues. and restaurants. Cowtown Coliseum, home to the first indoor rodeo; Stockyards Station, a train This tour begins at the infamous Dealey Plaza, station containing distinctive Texas shops; and DALLAS: where President John F. Kennedy was assassi- Billy Bob’s Texas, the world’s largest honky-tonk, nated. See the actual location of the tragedy are favorite stops. You can also see the only daily and the motorcade route, including where the cattle drive around. A visit to Forth Worth’s Bigger and Better Zapruder film was made. From Dealey Plaza, you National Cowgirl Museum and Hall of Fame will will be escorted inside the Sixth Floor Museum conclude this inspiring tour. If you haven’t been to Dallas for a while, you’re in for a huge located in the former Texas School Book surprise! Dallas is experiencing a renaissance with more than Depository (where Lee Harvey Oswald took the Dallas in Bloom: The Dallas fatal shot). Through the interpretive exhibition $15 billion in new and ongoing development, creating a richly and audio-guided tour, you will be transported Arboretum and Botanical Garden Friday, October 15, 8:30 am–11:30 am back to the 1960s, through JFK’s trip to Dallas, diverse and exciting city offering: his assassination, and the investigations that Discover Dallas’ greatest followed. The exhibition finishes with a commen- natural resource—the Dallas tary on John F. Kennedy’s impact on the nation Arboretum and Botanical and the world and the legacy he left behind. Garden. The Arboretum features 66 acres superbly • Countless luxury accommodations • 200+ golf courses Home on the Range: landscaped with towering • 13 vibrant entertainment districts • Five professional sports teams trees, fragrant gardens, and North Texas Horse Ranches lush lawns. From the more than 2,000 varieties • A thriving culinary scene • World championship rodeo Wednesday, October 13, 9:00 am–3:00 pm of azaleas in the Spring to the countless colors of North Texas or ‘Horse Country USA’ is home to chrysanthemums in the Fall, the splendors of • The best shopping in the Southwest • State Fair of Texas one of the largest concentrations of horse farms these gardens are a must-see when visiting • The nation’s largest urban arts district (ranches) in the United States (over 300). From Dallas. As you explore the grounds you’ll discover quarter horses to thoroughbreds, paints to sparkling fountains, sculptures, two historic appaloosas, a wide range of equestrian breeds, mansions, and much more to delight the eye training facilities, and horse lovers call North and refresh the spirit. Texas home. The historic DeGolyer House, once the magnifi- Dallas is affordable and accessible! Less than a four-hour flight from most Explore a few of these local ranches to learn cent home of petroleum geologist and oilman cities in the U.S., Canada, and Mexico, DFW International Airport is also more about the variety of breeds and disciplines Everett Lee DeGolyer, is the focal point of the the third busiest airport in the world, offering some 1,600 flights daily. produced in this area and gain an understanding arboretum. Guided tours are offered of Mr. of life on the ranch. Receive a behind-the-scenes DeGoyler’s study and other rooms filled with art For information on attractions, dining, discount coupons, and more, go to tour of the ranch facilities and information on their and furniture, as well as the grounds. You can www.visitdallas.com/asis2010. selected breed focus and disciplines, along with also explore seasonal plants, bulbs, gardening a visit to the barn and breeding facilities. As time books, elegant stationary, and other gifts in permits, you may view a short demonstration of the gift shop. the training discipline. Concluding the tour, enjoy a traditional Texas meal at a local restaurant. “The ASIS convention is a real Once everyone has a chance to dine and relax, opportunity to stay abreast with the it’s time to head back to the big city! latest developments in the security industry and at the same time to meet and to network with peers Visit www.asis2010.org/registration for from all over the world.” information on Guest Program fees. Werner Preining, CPP, CMAS, Captain, Interpool Security, Ltd. – European Operations Port Authority of NY and NJ

58 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 59 General Information ASIS Foundation Events

Event Location ASIS Foundation 14th Annual Texas BBQ at Eddie Deen’s Dallas Convention Center Golf Classic Proceeds benefit the ASIS Foundation 650 N. Griffin Street Monday, October 11, 8:00 am–1:30 pm Thursday, October 14, 7:00 pm–9:30 pm Dallas, Texas 75202-5098 Cowboys Golf Club, Grapevine, TX Eddie Deen’s Ranch in downtown Dallas is #1 in the world at creating a true Texas experience, just +1.214.939.2700 Join friends, clients, and colleagues for a great day of minutes from the convention center. From the All sessions, exhibits, registration, and most networking events will be held at the Dallas Convention golf at this year’s Golf Classic Texas-themed facility to Eddie Deen’s famous Center, unless otherwise noted. at the Cowboy’s Golf Club. cooking, wanna-be cowboys and ‘girls will feel This exciting course is the first right at home. Mingle with friends and colleagues Headquarters Hotels* and only NFL-themed course for a casual evening of great live entertainment, and features stone markers real Texas BBQ, face-to-face networking, and Hilton Anatole Hyatt Regency Dallas @ Reunion highlighting the historical achievements of the tons of fun. 2201 Stemmons Freeway 300 Reunion Boulevard Cowboys team. A prestigious display of the The talented and popular Breckenridge Band is Dallas, Texas 75207 Dallas, Texas 75207 team’s coveted Super Bowl trophies and always a crowd pleaser, and their musical styles Pre-Seminar Intensives, Certification Reviews, and some volunteer meetings will be held at the numerous collectibles honoring legendary span Country and Western, pop, bluegrass, and Hilton Anatole. players and their accomplishments are also rock ‘n roll. An evening in Texas wouldn’t be displayed on the grounds. complete without some Texas-style contests to *In addition to the headquarters hotels, the ASIS room block comprises a variety of hotels to fit every budget and test your skill and at least one line dance or accommodation preference. Participants will compete in a four-player, modified scramble format. Breakfast, player gifts, two-step. It’s all here. Sign up today! Casual attire and a buffet lunch are included with your entry welcome—jeans, cowboy hats, and boots Hotel & Travel fee. Proceeds benefit the ASIS Foundation and its optional. Ticketed event, $65 per person. Book your hotel arrangements through the ASIS Housing Bureau with one easy call: mission to advance the security profession. You can bring a four-player team or register as an +1.888.887.8072 (U.S./Canada) individual player. This popular event sells out +1.972.349.7452 (outside U.S./Canada). every year, so register today! Ticketed event, You also may reserve your hotel room online at www.asis2010.org/hotel. The hotel reservations deadline $250 per player. is September 20, but book early to ensure your preferred accommodations.

When you book your hotel through the ASIS Housing Bureau, you also receive a free pass for shuttle services between the Seminar hotels and the convention center (a $50 value). Only those booking through the ASIS Housing Bureau will receive shuttle bus passes. “I highly recommend this seminar for all security AVIS is our official rental car company for the Annual Seminar in Dallas. For special discounted rates, industry professionals. call +1.800.331.1600 or log onto www.avis.com and be sure to provide this number: AWD-D005038. The exhibits, speakers, For information on area airports, ground transportation, taxis and shuttles, TSA travel tips, driving and networking luncheons directions, attractions, and the Dallas Convention Center, go to www.visitdallas.com/asis2010. were all top-notch.” Kimberly King, Physical Security Four Easy Ways to Register Specialist Internal Revenue Service Internet: Register for FREE Register online or download a form at www.asis2010.org/registration. exhibits admission The ASIS Foundation is a 501(c)(3) as designated by the Phone: U.S. Internal Revenue Service and contributions are tax in advance. ASIS Registration deductible to the full extent of the law. The Foundation $75 fee for nonmembers +1.800.941.2128 (U.S./Canada only) or supports a wide range of programs that benefits security through research, training, and scholarship. after October 8 +1.980.233.3813 8:30 am–5:00 pm EDT (Monday–Friday) Fax: Early-bird discounts +1.980.233.3800 are available through Mail: August 27. 10900 Granite Street, Charlotte, NC 28273 USA After 3:00 pm EDT, Friday, October 8, you must register on-site at the Dallas Convention Center.

Find up-to-the-minute information and registration details at: www.asis2010.org

60 Asis 2010 ONE EVENT • ONE DESTINATION • ONE FOCUS • SECURITY October 12–15, 2010 | Dallas Convention Center | Dallas, Texas | www.asis2010.org 61 Non-Profit US Postage PAID ASIS 1625 Prince Street l Alexandria, VA 22314-2818

The NUMBER

One 2010 Headliners Security event.

Chesley B. Sullenberger III Exhibits-only registration is FREE when you register in advance!

President Pervez Musharraf

Early bird registration is open— Dave Barry Sign up today! Visit us at www.asis2010.org Supplement to Security Management

Who You’ll Meet Here 2010 Headliners • Security directors and managers • Homeland security professionals • CEOs, presidents, and VPs of critical infrastructure businesses Chesley B. Sullenberger III • Government/military personnel with security responsibilities • Security consultants • Law enforcement professionals • Facility/plant/operations managers President Pervez Musharraf • Architects/engineers • Human resource professionals • Other professionals with an interest in security

Dave Barry

“ASIS Seminar and Exhibits is the one event every The NUMBER security practitioner should attend for new One ideas, workable solutions, Security and networking.” event. Mark Theisen, CPP, Director, Corporate Safety & Security Thrivent Financial

Exhibits-only registration is FREE when you register in advance!

Early bird registration is open— Sign up today! Visit us at www.asis2010.org