JULY/AUGUST 2015 Dynamics

INSIDE 3 Member News ASIS Security Education 8 ASIS in the 1980s Three Conferences in Three World Regions 9 In Brief T’S HIGH SUMMER in the Northern Exhibition, held at the Messe Frankfurt, 12 Women in Security Hemisphere, but things were already in Frankfurt am Main, Germany. Finally, Ihot last spring as ASIS International the ASIS 25th City Security 14 NYC Conference staged two major educational conferences Conference and Expo took place April 22 16 Foundation in Europe and the , as well and 23 at the Jacob K. Javits Center in New 17 Lessons from as cosponsoring an impressive certificate York City. All three events attracted a full the Levant program in Israel. complement of security professionals who 19 CSO Roundtable The first of the events, held in late were eager to increase their understanding 21 Certification March, was a seven-day Homeland Secu- of security in today’s complicated world. 22 Preseminar rity Executive Certificate Studies program, And what better organization to turn to in Programs operated by ASERO Worldwide, Tel Aviv that quest than the industry’s predominant 24 European University International, and ASIS. The educational association? Conference second, March 29 to April 1, was the ASIS Full coverage of all three ASIS events 32 Chapter News 14th European Security Conference and can be found inside. N

In Frankfurt, during a panel discussion, Volker Wagner (left) and ASIS President Dave N. Tyson, CPP (center) listen to German Federal Minister of the Interior Dr. Thomas de Maizière. Upcoming Education Programs

Increase your effectiveness and effi ciency by OCTOBER

participating in ASIS’ high quality, peer-led education. 19-20 Corporate Investigations New Orleans, LA Our development programs address a full spectrum of topics in security 19-20 Physical Systems management. No matter where you are in your career or what your professional Master Planning goals are, ASIS has an education program suited to meet your needs, including: New Orleans, LA 21 Retail Data Security: The • Classroom Programs Intersection of the Physical • Webinars and Digital Worlds • Annual Seminar and Exhibits (Best value—offers 200+ education sessions) Webinar 21-22 The Investigative Interviewing Method Take a closer look at our upcoming programs… New Orleans, LA 21-22 Risk, Threat, and Vulnerability Assessment Certifi cate Program JULY SEPTEMBER New Orleans, LA 23 Intelligent Command Center 20-21 Developing and Implementing 16 Bullying, Harassment, New Orleans, LA an Insider Threat Program Hazing, and Domestic School 28 Soft Targets: Hardening and Certifi cate Program Violence Protecting People from Attacks Alexandria, VA Webinar Webinar 22 Risk Assessment—The First Step 23 Ready, Steady, Engage! to Effective Security Measures Affordable and Effective Tips for Webinar Reducing Turnover and Improving NOVEMBER Employee Satisfaction Webinar 15-20 Wharton/ASIS Program AUGUST 26-27 CPP, PCI, and PSP Reviews for Security Executives Anaheim, CA Philadelphia, PA 19 Emergency 26-27 Pre-Seminar Programs and 16-17 Executive Protection Management Professional Tours Certifi cate Program Interface with Public Anaheim, CA Providence, RI Safety Responders Webinar 28-10/1 61st Annual Seminar 16–19 ASIS Assets Protection & Exhibits CourseTM: Principles of Anaheim, CA Security (APC I) Certifi cate Program Providence, RI 29-10/2 Education Sessions at G2E Sponsored by ASIS Gaming 18 Using your Guard Force to Create Each and Wagering Protection Organizational-Wide Value 50-minutes Council Webinar of instruction Las Vegas, NV is eligible for one CPE. DECEMBER 7-10 Crisis Management: Introduction to Program Planning Long Beach, CA 9-10 Structured Analytic Thinking for Security Decision Making Long Beach, CA

www.asisonline.org/calendar +1.703.519.6200 MemberNEWS

ALTO Systems promoted serves as ASIS regional vice presi- team, new regional territories have Jeff Roberts to regional sales dent for the Texas chapters. been created and personnel have Smanager for the South Cen- , was named a new responsibilities. Leading the Brian Harrell, CPP tral Region. He was previously director in Navigant’s energy con- Enterprise Accounts initiative is sales manager for the North West sulting practice, where he will pro- Mark Perkins, who will support Region and has expanded his terri- vide energy companies with expert the establishment of new national advice on and international enterprise ac- risk mitiga- counts, while cooperating with re- tion, protec- gional business development man- tive meas- agers to ensure superior service. ures, and Five ASIS members were elected compliance to the board of directors of PSA guidance for Security Network. Ron Oetjen, NERC CIP, CPP, senior vice president of Secu- CFATS, and radyne Systems, was named chair- MTSA proj- man of the board. Paul Thomas, ects. He was president of Northland Control Krumme Harrell Andrews previously Systems, will serve as vice chair. tory to include the new geographic director of the NERC Electricity Christine Lanning, president of area. Before joining the company, Sector Information Sharing and Integrated Security Technologies, is he worked for a business partner Analysis Center at the North the new western regional director. as sales lead for the SALTO prod- American Electric Reliability Cor- Darryl Keeler, president of Tech uct line and later took on the role poration, where he led efforts to Systems, Inc., is the new southern of regional sales director. His focus provide threat and security risk regional director. Terry Rivet, pres- was on educational applications. information to electricity utility ident and CEO of Securitronics, Cam-Dex Security Corporation owners and operators. He was a was appointed the northeast re- announced that Dan Krumme has subject matter expert and Standard gional director. The incumbents moved into the position of vice Drafting Team member for the re- on the board are Midwest Regional president and branch manager for cently approved CIP-014 physical Director Tom Hagen, president of the company’s St. Louis, Missouri, security standard and helped posi- Pro-Tec Design; Central Regional office. He will be responsible for tion NERC as a leader in substa- Director Eric Yunag, CEO of Da - managing a new business develop- tion security. kota Security Systems; and Past ment team and enhancing the As part of Boon Edam’s expan- Chair Dan Budinoff, president of company’s IT tools to support sion and reorganization of its sales Security Specialists. more efficient operations in the service and estimating departments. Paul Donahue, CPP, Krumme joined the company as president and CEO of branch operations manager and Centerra Group, LLC, was responsible for service and was honored at the installation personnel, managing 13th Annual “For the installation projects, and increasing Love of Sight” Vision- sales in the region. ary Awards Dinner, Charles E. Andrews, CPP, has which raises funds for joined Butchko, Inc., to lead its research into preven- new line of services focused on tion, treatment, and chief security officers. Andrews cures for retinal dis- and his team of consultants will eases. He was given provide professional services for the Foundation Fight- CSOs, including outsourcing the ing Blindness Visionary Award for his work with the organization, which he began 13 CSO function. Andrews brings years ago. Also honored at the event was Madeleine Albright, former U.S. secretary of more than 30 years of experience state and chair of Albright Stonebridge Group. In this photo, author Rebecca Alexander in law enforcement and global cor- (left) joins Donahue and Albright. porate security to the firm. He also

JULY/AUGUST 2015 3 MemberNews ASIS Board of Directors Steve Johnston is managing sentative for Pelco, Exacq, Speco Boon Edam enterprise accounts in Paxton, and Vigilant Video. He will the eastern United States and Ca - be based in Valencia California. nada from his office in the Detroit, Don Knox, CPP, has been elected Michigan, area. He previously president of the International Or- served as a business development ganization of Black Security Execu-

manager for the company’s Mid- tives, which promotes diversity and President west North Region and the eastern inclusion and encourages education, Dave N. Tyson, CPP provinces of Canada. mentoring, and networking. He is a S. C. Johnson & Son, Inc. global secu- Racine, Wisconsin

rity and risk President-Elect analysis David C. Davis, CPP manager Northrop Grumman with Cater- Fairfax, Virginia pillar Inc., Treasurer where he Thomas J. Langer, CPP provides BAE Systems, Inc. support for Arlington, Virginia the enter- Secretary prise crisis Richard E. Chase, CPP, PCI, PSP Johnston VandeGuchte Knox management General Atomics Kevin VandeGuchte has been program, international travel secu- San Diego, California hired to cover the region vacated rity, and global risk intelligence Chairman of the Board by Johnston and will work from program. Additionally, Knox serves Richard E. Widup, Jr., CPP Kansas City, Missouri. A 25-year as director of security for St. Paul Mead Johnson Nutrition veteran of the security industry, he Baptist Church. He manages all as- Evansville, Indiana has experience in the design, con- pects of security, including access sulting, sales, project management, control, intrusion detection, pas- DIRECTORS and service of access control, Darryl R. Branham, CPP CCTV, fire alarm, and intru- Avnet, Inc. sion alarm systems. He has Phoenix, Arizona worked for both integrators and manufacturers. Christina Duffey, CPP The new business develop- Anderson Security Agency ment manager for Boon Phoenix, Arizona Edam’s South Texas Region is Godfried Hendriks, CPP Linda Hardwick. She has 20 GOING Consultancy B.V. years of sales experience, in- Zeist, The Netherlands cluding five in the security Richard F. Lisko, CPP Hardwick Lewis industry. She worked for an AlliedBarton Security Services integrator, providing solutions for toral protection, security awareness Dallas, Texas video, access control, and mass training, parking, and traffic, as notification. She also worked for a well as emergency management and Joseph H. McDonald, CPP, PSP manufacturing rep firm, represent- life safety. Knox is also a council Switch Communications Group Las Vegas, Nevada ing product lines for Pelco, NVT, vice president for ASIS. KBC Networks, Promise Technolo- William Nesbitt, CPP, president Jaime P. Owens, CPP gies, and Winsted. Hardwick is of Security Management Services Panama Canal Authority based in Houston. International and director of Secu- Panama City, Panama Ted Lewis was selected as busi- rity Source Online, was chosen as John A. Petruzzi, Jr., CPP ness development manager for the Most Popular Voice in Hospital Time Warner Cable Boon Edam’s Southwestern Region. Security by Guardian 8. The dis- New York, NY He brings 24 years of security expe- tinction was based on his visibility rience gained working for compa- in the media and influence on the nies including EMI, Stantron, Nice hospital security community. Nes- Systems, and Vicon, as well as bitt serves on the ASIS Healthcare serving as an independent repre- Security Council.

4 ASIS DYNAMICS MemberNews

Inc., before STANLEY acquired the of the National Training School Dynamics organization. and the state chapter program of has become a the ESA. JULY/AUGUST 2015, NO. 237 Michael Sulick senior partner at Threat Pattern, a Mike Buckel, vice president of Chief Executive Officer company that draws on intelligence operations for Sonitrol Tri-County, Michael J. Stack and counterintelligence analysis has been appointed to the Flint

Vice President, Publishing techniques to protect corporate Police Foundation’s board of direc- Michael Gips brands and assets. Sulick was direc- tors. He will help lead the foun-

Editor-in-Chief tor of the CIA’s National Clandes- dation’s public-private partnership Ann Longmore-Etheridge tine Service. For more than 30 initiatives to better equip Flint years, he coordinated espionage Police officers in their fight against Art Director Elizabeth Lankes activities for the U.S. intelligence crime. Buckel has been with Soni- community and managed global trol since 1992 in a variety of posi- Contributing Editors Mark Tarallo covert operations on terrorism, tions. He also serves as treasurer of Holly Gilbert Stowell weapons proliferation, and regional the Boys and Girls Club of Greater Lilly Chapa issues while serving in various po- Flint’s board of directors and is a Megan Gates sitions at the CIA. member of the advisory board of , presi- Crime Stoppers of Flint and Gene- Editorial Assistant/Staff Writer Stanley Oppenheim, CPP Flora Szatkowski dent of DGA Security Systems, see County. was named to Security Sales & Inte- , pub- Publisher John C. Cholewa III, CPP Sandra Wade gration’s Industry Hall of Fame. He lished the new book Developing and has more than 50 years of experi- Managing Physical Security Programs: A Associate Publisher Nello Caramat ence in the alarm industry. His Guide for Facilities and Human Resources work with various trade associa- Managers. The book is designed to Production & Creative Services Manager tions has also contributed to the help nonsecurity personnel imple- Keith Schilling industry, including development ment and manage effective physical Publishing Production Coordinator/ Circulation Matthew Kreider IN MEMORIAM

Copyright © 2015 ASIS International, Inc. This ASIS INTERNATIONAL is saddened to report the death of Alan M. Nutes, CPP, senior information is protected by copyright and trade manager of security and incident management for Newell Rubbermaid, who passed mark laws under U.S. and International law. No part of this work may be reproduced without away on April 13. Nutes was a well-known volunteer leader who joined the Society in the written permission of ASIS International. 2000 and was for some time a member of the Chapter. Nutes was an ASIS Note: Statements of fact and opinion are made council vice president from 2006 to 2008 after having been an active on the responsibility of authors alone and do not imply an opinion on the part of the edi- member of the ASIS Telecommunications Security Council. tors, officers, or members of ASIS. The editors A native of New York City, Nutes attained his bachelor’s degree at of ASIS Dynamics reserve the right to accept or William Patterson College in Wayne, New Jersey, while also serving in reject any article or advertisement submitted for publication. the U.S. Army. After entering into a security career, Nutes was man- ager of security services for Gulfstream Aerospace and later security manager for the City of Atlanta. “Alan was instrumental in providing Martin Guay is president of the security to the City of Atlanta’s utilities and waterworks…. He also new STANLEY Healthcare, which Nutes moved Gulfstream and Newell’s programs forward in high-risk areas combines the divisions and expert- around U.S. borders,” recalls Steve Surfaro, industry liaison for Axis ise of STANLEY Healthcare and Communications, who was a longtime colleague. the STANLEY Security Healthcare It is with deep regret that ASIS must announce the passing of Vertical Team. The new group James W. Reed. Reed joined the Society in 2005 and was an active will help safeguard hospitals, member of the Long Island Chapter, winning the Chapter Service health systems, and senior living Award in 2012. He was deputy commissioner of Nassau County, New communities with a comprehen- York, from 2001 to 2009, and most recently ran his own consulting sive suite of solutions. Guay has agency. Reed worked in the security industry Lastly, the Society must report that Andrés P. Ciappesoni, CPP, former assistant for 26 years. Prior to joining the regional vice president for ASIS Region 8C, has also passed away. Ciappesoni was a co- company, he served as vice presi- founder and a former chair of the Montevideo, Uruguay Chapter. He is remembered by dent, electronic security services for his ASIS colleagues as a volunteer leader who showed great dedication and worked hard First Security Service Corporation, to further the professionalization of security in Uruguay. and later as president of Niscayah,

JULY/AUGUST 2015 5 MemberNEWS Books by Members, security programs. It provides tips, key points, and information neces- Reviewed by Members sary for avoiding common pitfalls. Port Security Management, hood that a particular hazardous Cho l ewa is owner and principal Second Edition. By Kenneth event or occurrence might compro- consultant of Mentor Associates, Chris topher. CRC Press; available mise the security of the maritime LLC. from ASIS; item #2196; 376 pages; transport or port facility’s assets. Terry Lee Wettig, CPP, has be- $90 (ASIS members); $99 (non- Such risk assessment, Christopher come director, security risk man- members). writes, can be quantified agement for Brink’s Global Security. his authoritative against identified assets Based at the global headquarters in and comprehen- as: R (risk) = C (critical- Richmond, Virginia, he is responsi- Tsive work looks ity) x V (vulnerability) x ble for assessing, developing, and at the significant compo- P (probability). deploying security-based risk man- nents involved in man- Once an asset’s over- agement programs to operations aging the security of all level of risk is quanti- around the world. These include maritime transport and fied, he concludes, the standardizing training and aware- port facilities. It offers an allocation of a security ness programs, developing risk- over view of international manager’s resources to based audit and inspection pro- conventions on maritime mitigate such risk will cesses, and communicating best security and delves into be based on the antici- practices to global field operations. the spectrum of threats facing the pated outcomes of the possibility Wettig previously served as the maritime sector, such as terrorism, of harm or loss produced by the Brink’s director, international secu- weapons of mass destruction, haz- particular threats against it. Once rity audits. He is a retired Air Force ardous materials, criminality, work- these risk assessment steps are chief master sergeant and a Ph.D. place violence, economic espionage, completed, “port management can student of organizational psychology. and the new threat of cyber sabo- objectively quantify and prioritize Vincent Bove, CPP, wrote an tage. It also explains how to man- the risks to the port and begin to article titled “The Principles of age port-related threat intelligence conceptualize and initiate the [facil- American Policing” that was pub- and apply risk management ity security plan].” lished in The Epoch Times. methodologies. Each chapter concludes with a Paul Timm, PSP, president of The author outlines the respon- summary, key points, and reference RETA Security, has published sibilities of security managers, such resources. The volume also includes several articles on school security. as coordinating port security with a glossary of terms and organiza- “Addressing Mistakes in Three local and federal security agencies tional resources, plus an extensive School Security Trends” ran in Secu- and managing and training security bibliography. The author is associ- rity magazine; “Unregulated Security personnel. Modern technology is ate professor of criminal justice at Solutions Pose Danger to Schools” covered, including components of Park University, Parkville, Missouri, was published on Churchexecutive. access control, sonar, and CCTV. and has previously worked with com; “Securing Social: Five Ways All the book’s chapters are the U.S. Maritime Administration to Mitigate Cyber Risk” was pub- useful, but this reviewer found in curriculum development and lished in UPDATE magazine; and Chapter 4, “Port Security as a instruction. All those involved in “How Safe is Your School From Risk Management Activity,” espe- maritime transport and port secu- Cyber Threats?” was posted on cially valuable. It discusses a variety rity will benefit from this informa- ELSEVIER SciTech Connect. of risk assessments of maritime tive, authoritative reference and will Timm also participated in the transport assets and port facilities. find it useful in their daily work. judg ing panel for Campus Safety Following a discussion of three Dr. Joshua Sinai is director of analytics magazine’s Security Director of different risk assessment method- and business intelligence at Resilient the Year Award. ologies—design-basis threat, catas- Corporation, in Alexandria, Virginia. Thomas Cseh, Mexico deputy trophe modeling, and levels of He is the author of Active Shooter–A director of Andrews International, probability—author Kenneth Chris - Handbook on Prevention, published led a roundtable discussion at the to pher presents the components of by ASIS International. Annual Intellenet Conference. He a security survey. These include was the lead presenter for the identifying one’s assets, establishing The Handbook of Security, Sec- “Transnational Security Details and the criticality of those assets, and ond Edition. Edited by Martin Investigations and the Use of Sub- determining their vulnerability to Gill. Palgrave Macmillan; Pal- Contractors” session. N determine the probability or likeli- grave.com; 1,080 pages; $260.

6 ASIS DYNAMICS ditor Martin Gill has col- though the flow of the text suffi- allows the reader to clearly under- lected essays from more than ciently covers the information. stand and appreciate the practical- E50 well-credentialed and re- This book has significant value ity of this process. Pertinent obser- spected authors to create a superb to security professionals at all levels vations the author has gathered holistic catalog of security. The as well as being a valuable research from his years of experience add Handbook of Security, Second Edition, tool for the academic world of se- depth to the writing. builds upon the first edition with a curity management. It will soon White has created an excellent wider array of subject matter and a be dog-eared and filled with book- book with material drawn from the greater diversity of topics, resulting marks as are the invaluable re- well of his experience. Although in a more exciting study of the sources in any professional’s library. the first several chapters are a bit field and profession of security. Reviewer: Terry L. Wettig, CPP, is director long on the advantages of using a Beginning with a comprehensive of security risk management for Brink’s consultant, this book is clearly a historical look at the security in- Incorporated and is based in Richmond must-read for the inexperienced dustry, the book goes on to answer Virginia. A retired U.S. Air Force chief or nonsecurity professional who is fundamental questions about the master sergeant, he is studying for a Ph.D. faced with the task of conducting range of threats facing today’s in organizational psychology. a security assessment. The book world. It looks at how current eco- applies to most facilities, especially nomic conditions—far different Security Risk Assessment, healthcare-related facilities. from when the previous edition Managing Physical and Opera- Reviewer: R. William Leap, CPP, is was first published—have affected tional Security. By John M. White, vice president of security services for the profession and agencies re- CPP. Butterworth-Heinemann; el- Chicago-based Titan Security Group. He sponsible for predicting and react- sevier.com; 230 pages; $49.95. is responsible for the design and imple- ing to crime, and to what degree isk assessments, security as- mentation of manned and remote security technological advances have im- sessments, threat assessments, services, including security assessments, pacted our world. The overall re- R and security surveys are ex- project management, planning, and qual- sult is that security has become a plored by numerous publications. ity control. He is a member of the ASIS dominant feature in our lives, Many of these focus on defining Security Services Council. N the differences between the types of assessments and surveys. Author John M. White avoids this academic approach; instead, he defines, Protection describes, and provides prac- tical information from a of Assets bottom-up, rather than top- down, perspective. Protection of Assets (POA) A longtime security con- is the premier reference for the sultant, White shares his ex- security professional. pertise and years of practical POA is available as an online whether we know it or not. experience in performing security subscription, an eight-volume Although, at more than 1,000 assessments. His hands-on book set, as individual books, and on Kindle. Individual titles and the pages, The Handbook of Security can practically and clearly guides the set are also available in Spanish. appear daunting, this is indeed es- new security manager (or other sential reading for all those involved professional tasked with the secu- For details or to order, visit www.protectionofassets.com. with the security world. Both the rity function) through the stages of student of security and the security successfully completing a security professional will become engaged assessment. His position as a con- in the content, from the historical sultant is easily recognized in the study of security as a discipline to beginning chapters, as he empha- the long-range issues impacting the sizes the advantage of using an out- profession. Among other things, it side expert. His argument is well- addresses crimes by offense and by founded and persuasive. He industry, risk management, security proceeds to walk the first-time as- processes, research in the field, and sessment provider through organiz- ethical issues. One shortcoming of ing the team, developing the scope the book is that it does not pro- of work, conducting the assess- vide many charts or graphs to illus- ment, and reporting the findings. trate and support the material, He accomplishes this at a level that

JULY/AUGUST 2015 7 60 Years: ASIS in the 1980s HIS EDITION of a look The range of chapter pro- sociation back at ASIS Interna- gramming also became more and Johns tional’s history on the sophisticated as members Hopkins occasion of its 60th an- gained access to a broad range University. of local resources and other In 1981, niversaryT takes us to the 1980s, member associations. In the interna- when membership was soar- Middle East, for instance, tional chap- ing, chapters were spreading more than 90 people attended ters began internationally, and finances a 1983 seminar held jointly competing were strong. with the American Society of to the earn Safety Engineers. The Caracas the Patricia WHEN THE SOCIETY celebrated Chapter contributed speakers C. Manion its 25th anniversary at the start of to a 1987 seminar on public Interna- the decade, 122 chapters existed safety held with the National tional Chapter of the Year Award, around the globe in 16 regions—13 Chamber of Private Guards, and, so named because of Manion’s in the United States and three in- in the late 1980s, the Baltimore work on the International Affairs ternationally. ASIS membership Chapter held a joint event with Committee of the ASIS Board of had topped 13,000—four times the the Maryland Chiefs of Police As- Directors. number recorded in 1970. Addi- tionally, ASIS was sponsoring more than a dozen yearly work- shops, an average of 2,000 security professionals were attending the Annual Seminar and Exhibits, and the Certified Protection Profes- sional® (CPP) designation was taking flight. As the Society approached its 30th anniversary in 1984, member- ship had increased by about 5,000 per year, with an average renewal rate of 85 percent. The number of CPPs hit 2,845. The number of chapters had increased to 144. In all, 57 new chapters—including 12 outside the United States—would be chartered during the decade. To keep the size of chapters manageable and to improve acces- sibility for members, new chapters were also spun off from existing ones. The Washington, D.C., Chapter (now the National Capital Chapter), for example, spawned the Fredericksburg/ Quan tico Chapter in 1982.

Top: Security Management’s August 1981 cover gives fashion advice for security managers. Right: The first Foundation Dinner in 1983. The late Louis Tyska, CPP, presides (above), and Frederick Hauck, NASA astronaut, speaks (below).

8 ASIS DYNAMICS Foundation Rising In 1983, the ASIS Foundation be- In Brief gan what would become a long- standing tradition by holding a black-tie dinner fundraiser in con- junction with the 1983 ASIS 29th Quarter Century Club LIFE MEMBERS Annual Seminar and Exhibits in ongratulations to the fol- The following individuals have the nation’s capital. More than 110 lowing ASIS International been granted Life Membership people attended, each paying $100, Cmembers who achieved by the Board of Directors of ASIS to enjoy fine dining and hear Quarter Century Club status in International: speaker Captain Frederick Hauck, April, May, and June. Timothy D. Giles, CPP, PSP commander of the space shuttle Gary D. Alton Robert F. Littlejohn, CPP Challenger, which had launched Diane Axt from Ken nedy Space Center in Thomas L. Baer Florida earlier that year. Over the Timothy P. Baker, CPP Kevin M. Moore, CPP decade, the Annual Foundation Charles S. Barr, CPP Juan Muñoz, CPP Dinner featured such entertain- Leon S. Baugh Jude T. Murphy ment as the Amazing Kreskin and Mark S. Bennett, CPP Daniel T. Myers, CPP occurred in venues as unique as Kevin V. Bluml, CPP David G. Patterson, CPP, PSP the General Jackson, a showboat on Ronald D. Brevard, CPP, PSP Patrick K. Quinn, CPP the Mississippi River. Richard R. Buhrmann, CPP Ian Ross-Harding The Foundation initiated proj- Gary R. Chubb Raymond W. Rugen ects such as videotaping the Soci- Arjo J. DeJong Timothy J. Schwalm ety’s past presidents, including Maria G. Dominguez, CPP Timothy J. Scott, CPP founding father Paul Hansen, as John H. Donaldson Robert R. Smith, CPP they discussed the history and Donald W. Foster, CPP Mark J. Sullivan, CPP growth of ASIS. In 1982-1983, the Timothy D. Giles, CPP, PSP Norman B. Taylor, CPP Foundation funded the cataloging Barry F. Haesly II Michael S. Truppner of the books and materials that be- Fredric W. Hirchert Richard C. Tulowitzky came the O. P. Norton Informa- John L. Hunepohl, PSP tion Resource Center at ASIS Thomas C. Jones headquarters. The Foundation also Jeffrey A. Karpovich, CPP International published several books, including Robert B. Koverman Dynamics Seek Career Opportunities in Security and Walter W. Long Loss Prevention: A Directory of Aca- Robert J. Louden Submissions demic Offerings. Antonio V. Maniwang SIS International invites mem- In 1986, the Foundation part- Ronald S. Milsk bers to submit articles to be nered with Central Michigan Uni- Gordon L. Mitchell, CPP A published in future editions versity to develop a prototype Master of Science degree with a concentration on security manage- Global Asset Protection White Paper ment. Three chapters—Washing- he ASIS International Leadership and Management Practices Council has released ton, D.C.; Philadelphia; and Dallas, a white paper by Thomas A. Engel, PSP, titled “Global Security Strategic Planning.” participated in the first iteration, TThe document is aimed at assisting senior management of international organiza- with 30 students in each group tions in managing risk for their people and assets around the world. who met with instructors on The white paper examines the importance of a strategic plan as a foundation upon weekends. which to build an effective security program. Guidelines for a SWOT analysis, one of the That same year, the Foundation most important components of a strategic plan, are featured. Other sections of the paper joined forces with Butterworth address issues for consideration such as laws and regulations; customer requirements; Publishers to put out Security Jour- internal audit and compliance requirements; and infrastructure concerns. nal, which was envisioned as a The author is security administrator, physical security, at Aetna, and a previous secu- showcase for original research and rity analyst for Westinghouse Electric Company, regional security manager for BNY Mel- findings related to the security in- lon Financial Corporation, and director of security for Mellon Financial Corporation. He dustry. Security Journal debuted at holds an MBA from Robert Morris University. the ASIS 35th Annual Seminar ASIS members can download the new white paper at www.asisonline.org/Member- and Exhibits as the decade drew ship/ Member-Center/Councils/leadership/Pages/default.aspx. to a close. N

JULY/AUGUST 2015 9 In Brief

a facility, an analysis of new national I If you would like to submit Upcoming Webinars legislation, an article about mitigating longer articles, please send a 500- For more information or to register, visit threats in the region, a look at fresh word summary that will be pub- the Education tab of www.asisonline.org. opportunities for the security pro- lished in the newsletter and on the fession, or other items that spread ASIS European website with a link August 19 practitioner knowledge and best to the full article. Emergency Management Interface with practices with other ASIS members I Sales or marketing submissions Public Safety Responders in these areas of the world. will not be accepted. September 16 Board-certified professionals To submit an article, e-mail Bullying, Harassment, Hazing, and holding Certified Protection Profes- [email protected]. Domestic School Violence sional, Physical Security Profes- October 21 sional, and Professional Certified Proposals Sought for Retail Data Security: The Intersection of Investigator designations are entitled the Physical and Digital Worlds to claim up to 9 CPE credits per ASIS Europe 2016 published article. SIS International will organ- General writing guidelines: ize its 15th European Secu- of ASIS EuroDynamics, ASIS Asia-Pa- I Articles must be in English A rity Conference & Exhibi- cific Dynamics, and ASIS Middle East only. tion (ASIS Europe 2016) April 6 to Dynamics. Some examples of poten- I Articles should not exceed 500 8, 2016, in London, United King- tial articles are: a case study about words. dom. Conference participants will

ASIS STANDARDS AND GUIDELINES UPDATE ASIS INTERNATIONAL regularly provides the standard expands on the scope of the ASIS taking into account identifiable risk assess- status of standards and guidelines so mem- Organizational Resilience Standard to in- ment and requirements, intelligence, and bers and others can be apprised of pro gress. clude resili ence in the supply chain by pro- assumptions. Visit www.asisonline.org/standards to access viding a framework for evaluating the inter- Conformity Assessment and Auditing and learn the latest status of each standard nal and external context of the organization Management Systems for Quality of or guideline. with regard to its supply chain. Private Security Company Operations Risk Assessment: This standard pro- (2012): This standard provides requirements STANDARDS UNDER DEVELOPMENT vides a basis for a generic pro cess for risk and guidance for conducting conformity as- Community Resilience: Guidance on assessment, enabling objective analysis of sessments of the management system for Capacity Building and Public-Private the efficacy of risk management controls quality of the Private Security Company Oper- Partnerships Standard: Provides guidance that protect an organization’s assets. ations (PSC) Standard. This standard sets out to address the interfaces between individual, requirements for bodies providing auditing organizational, and community resilience to PUBLISHED ANSI/ASIS STANDARDS and third-party certification of private security enhance public-private partnerships and Auditing Management Systems for company operations (private security resil i ence planning. Using the PDCA model, Risk, Resilience, Security, and Continu- providers working for any client). it addresses risk and capacity identification, ity—Guidance for Application (2014): Management Systems for Quality assessment, control, and sharing to better This standard refers to the systematic, ob- of Private Security Company Opera- prevent, prepare for, respond to, and recover jective activities undertaken to evaluate or tions—Requirements with Guidance from disruptions to help communities and audit management system performance for (2012): This standard provides requirements public-private partnering. security, preparedness, and continuity man- and guidance for a management system Managing the Investigative Pro- agement. with auditable criteria for the Quality of PSC cess—Guidance: This standard provides Business Continuity Management Standard, building on the Montreux Docu- guidance for internal and external investiga- (2010): This standard includes auditable cri- ment on pertinent legal and security compa- tors to maintain the quality and consistency teria for preparedness, crisis management, nies in conditions where the rule of law has of investigations and investigative reports. business and operational continuity, and dis- been undermined by conflict or disaster. This It will help investigators conduct inquiries aster management. standard provides audit able requirements using a systematic approach, in an organ- Chief Security Officer (CSO)—An based on the plan-do-check-act model for ized and well-documented manner. The Organizational Model (2014—replaces third-party certification of PSC operations. standard will discuss managing an investi- 2008 edition): This standard provides a Now being developed as an ISO Standard. gation program, as well as conducting indi- high-level approach to help organizations Maturity Model for the Phased Im- vidual investigations. develop a comprehensive, integrated, and plementation of a Quality Assurance Resilience in the Supply Chain: This consistent security/risk leadership function, Management System for Private Secu-

10 ASIS DYNAMICS In Brief

sought including: supply chain se- London, United Kingdom, will be the setting curity, loss prevention, hotel secu- for the 2016 ASIS European Conference. rity, intellectual property, maritime piracy, terrorism, executive protec- tion, internal theft and fraud, competitive intelligence, brand protection, physical security, cyber- security and convergence, investi- gations, due diligence, and global business issues. The deadline for submissions September 15. For further informa- tion, contact [email protected] com . or visit ASIS Online, www.asison- line.org. share and learn effective strategies Subject matter experts are in- and solutions for securing their or- vited to participate in the confer- Kalinin/Thinkstock

Reach Out Winners ganizations’ people, property, and ence program by submitting a pro- ongratulations to Michael Iakov by

information in today’s challenging posal for a presentation. Proposals Edgerton, CPP; Julieta global security environment. on all security-related topics are CMuñoz-Cornejo; and Chris Photo

rity Service Providers (2013): This stan- physical security measures to safeguard an tation of a Workplace Violence Prevention dard will benefit private security service organization’s facilities-based assets. and Intervention Program. providers (PSCs) in improving their quality of Quality Assurance and Security services consistent with respect for human Management for Private Security Com- GUIDELINES UNDER DEVELOPMENT rights and legal and contractual obligations panies Operating at Sea—Guidance Preemployment Background Screening based on the core elements of the ANSI/ (2013): This standard provides guidance for Supplement (PBSS) Guideline: This draft ASIS PSC.1-2012. The model outlines six implementing the ANSI/ASIS PSC.1-2012 supplement to the PBS Guideline is intended phases ranging from no process in place for and related ISO security management sys- to aid U.S. employers in understanding and quality assurance management to going be- tem standards in the maritime environment considering the fundamental concepts, yond the requirements of the standard. consistent with respect for human rights, methodologies, and related legal issues as- Maturity Model for the Phased Im- contractual, and legal obligations. sociated with utilizing trusted information plementation of the Organizational Supply Chain Risk Management: A providers as part of the preemployment Resilience Management System Compilation of Best Practices (2014): screening of job applicants. It also aims to (2012): This standard describes a phased This standard provides a framework for col- align industry practices to conform with U.S. implementation of the Organizational Re- lecting, developing, and implementing best Government Federal Investigations stan- silience Standard as a series of steps de- practices for supply chain risk management dards so the U.S. Government may accept signed to help organizations evaluate where (SCRM). It is a practitioner’s guide to SCRM specific information provided by TIP as part they stand in regard to resilience manage- and associated processes. It provides some of its background investigation process for ment and prepared ness, to set goals, to guidelines and possible approaches for an national security purposes. benchmark where they are relative to those organization to consider, including examples goals, and to plot a business-sensible path of tools other organizations have used. It can PUBLISHED ASIS GUIDELINES to get there. serve as a baseline for helping enterprises I Business Continuity (2005) Organizational Resilience: Security assess and address supply chain risks and for I Facilities Physical Security Measures Preparedness and Continuity Manage- documenting evolving practices. (2009) ment Systems—Requirements with Workplace Violence Prevention and I General Security Risk Assessment Guidance for Use (2009): This standard Intervention (2011): This standard pro- (2003) is based on the ISO PDCA model. The model vides an overview of policies, pro cesses, and I Information Asset Protection (2007) provides steps to prevent, prepare for, and protocols that organizations can adopt to I Preemployment Background respond to a disruptive incident; to manage help identify and prevent threatening behav- Screening (2009) and survive the event; and to take actions to ior and violence affecting the workplace I Private Security Officer Selection ensure the organization’s resilience. and to better address and resolve threats and Training (2010) Physical Asset Protection (2012): This and violence that have actually occurred. I Workplace Violence Prevention and standard identifies, applies, and manages The standard also describes the implemen- Response (2005)

JULY/AUGUST 2015 11 In Brief

White, who each won a $500 VISA ASIS Women in gift card for recruiting new ASIS International members as part of the Reach Out: Member-Get-a- Security Spotlight Member Campaign currently under way. The winners were drawn ICKI LUONGO is the di- from a pool of those who had brought new members to the Soci- rector of protective serv- ety during the previous quarter. ices at the Museum of NFine Arts in Bos ton. With Every time campaign partici- pants recruit a new member, they more than 15 years’ experience in se- help strengthen ASIS. A vital and curity, she is known for crafting in- growing membership means greater novative, state-of-the-art technology recognition of the security profes- solutions. Luongo is responsible for sion, improved educational and security at one of the most compre- networking opportunities for mem- hensive art museums in the world, bers, and the advancement of our profession worldwide. For more which houses a collection of nearly information on the campaign, visit 500,000 works of art and receives www.asisonline.org. N more than one million visitors annu- ally. She is also responsible for the Nicki Luongo safety and security of staff, volunteers, facilities, and the School of 6 for 60 Campaign the Museum of Fine Arts and its students. SIS International would like to re- Luongo was previously with the Middlesex County Sheriff’s cruit 2,500 new members in the Office and Billerica, Massachusetts, Police Department. She is certi- Western United States. Mem- A fied in Search and Rescue and was a member of the National Police bers there are invited to take part in 6 for 60, a special membership recruit- Bloodhound Association. Luongo has a bachelor’s degree from the ment campaign that runs through Sep- University of New Hampshire where she played ice hockey and tember 15. A member must recruit a was inducted into the Hall of Fame. After graduation she contin- minimum of six new members to be eli- ued her ice hockey career, competing internationally as a member gible for prizes. The first prize is one full of the U.S. Women’s National Team. registration to the ASIS Annual Seminar In her free time, Luongo leads the Freedom Bridge Foundation, and Exhibits in Anaheim, California, and a not-for-profit organization she created to bridge the gap and two additional tickets to the President’s pave the way for individuals and their families to find help, sup- Reception that will be held there. The port, and freedom from addiction. She resides in Tyngsboro, Mas- second prize is a $500 coupon for the ASIS Store. The third prize is a $250 sachusetts, with her partner and has two sons and two daughters. coupon to the ASIS Store. The 6 for 60 Campaign is open to any Q: Are there any key threads or themes A: When I started working at the ASIS member within the following chap- running through your career and the roles museum. Up until that point all ters: Alaskan; California Central Valley; you’ve had? things security followed a fairly California Inland Empire; Columbia Basin; A: My perseverance and willing- similar path with standards and Columbia River; Denver Mile-Hi; Fresno ness to fight hard for what I believe best practices existing in a Utopia. Valley; Golden Gate; Greater Los Angeles; in has helped me develop into the The museum changed the way I Hawaii; Idaho; Las Vegas; Monterey Bay; leader I am today. I have always approached how to provide pro- New Mexico; Northern Nevada; North- been drawn toward finding new tective services. Everything from ern Colorado/South Wy om ing; Orange solutions and blazing a new path. I operating procedures to standard County; Olympic Mountain; Phoenix; am very competitive and thrive on technology was different. Ironi- Pikes Peak; Puget Sound; Salt Lake; San being challenged with things that cally, it awakened a creative side Diego; San Fernando Valley; Sacramento, don’t seem possible, and I get right of me I had never known before; San Francisco Bay Area, Santa Barbara; back up if I get knocked down. it gave a whole new meaning to Spokane; and Willamette Valley. thinking outside the box. I have More information is available in the Q: Is there anything, anyone, any place, learned the fine art of how to Member section of www. asisonline.org. or any one event that changed the course adapt and create protective dy- of your career? namic solutions in a constantly

12 ASIS DYNAMICS changing yet “priceless” environ- nize that sometimes less really is continues to change and new ment where replacement is not al- more and it was better to establish threats present themselves, the se- ways an option. efficiency with less versus the curity paradigm is becoming more mediocrity of more. of a presence in the business Q: Do you have a particular philosophy model. The level of awareness or approach to security? Q: Have you ever had a mentor or been around safety and security has A: I am a firm believer that secu- a mentor? Do you think a mentor/protégé changed significantly. As more in- rity has to be reasonable to the relationship is important? dividuals enter into the workforce business or the business won’t A: Yes, I have myself been men- who have grown up with this support it. It is our job as security tored and found it to be very heightened level of safety and se- professionals to find new and dy- helpful in getting off the ground curity awareness, we will start to namic solutions to provide the in my career. I believe it is the see that focus begin to change the appropriate and balanced level of responsibility of leaders in our security culture of organizations. protection and service. industry to guide and train the leaders who will take over when Q: Do you have professional aspirations Q: Do you think a woman can bring a we retire. Wisdom comes from or goals you’re still working on? different view or approach to security? experience and sharing it gives A: Right now my focus is on A: I think women have a keen our future leaders a head start to- transformation and standardization sense of the power of negotiation ward becoming even better than within my own organization. The and possess de-escalation skills. we are. museum industry is dynamic and Most people have the impression of often pushes the boundaries of the “enforcer” type of figure in the Q: How do you see the role of the secu- present-day security challenges. If security industry and women have rity professional changing? and when the time comes for me the advantage of presenting a non- A: I see a more open and collabo- to move on, I have often thought confrontational presence that natu- rative environment developing be- that security in the casino industry rally leads to more open dialogue. I tween the private sector and local would be an interesting change, so think both genders have their ad- law enforcement. As the world who knows? N vantages and striking the right bal- ance for an organization can be game-changing.

Q: So is being a woman in this profession a net positive or a negative? A: I believe it is a positive. It pro- vides the opportunity to reach out to a more diverse group and estab- lish support for practices and principles that would otherwise feel forced. Men often feel a sense of competition when dealing with male security professionals and when a female is introduced they feel more confident and often lend more cooperation. This can pro- Take a leadership role duce positive results through open and collaborative communication. in managing business risk

Is there anything you’d say you learned Q: Wharton/ASIS Program for Security Executives the hard way during the course of your career? New, streamlined A: There are a few hard lessons I November 15-20, 2015 have learned but the one that 6-day program! PHILADELPHIA, PA, USA stands out most happened early in my career. I was eager to change the world and I would often look Visit to implement a vast array of www.asisonline.org for changes into a small window of program details and registration. opportunity. I didn’t quite recog-

JULY/AUGUST 2015 13 result of 9-11. We are a very aware ASIS NYC Security group in terms of security.” Sessions and More Conference Marks Educational sessions offered at the NYC Conference and Expo ranged from topics about terrorism and countering cyberthreats to risk man- 25th Anniversary agement and systems integration. A session on healthcare security BY HOLLY GILBERT STOWELL challenges was presented by former ASIS President Bonnie S. Mi chel- HE ASIS INTERNATIONAL days. It brings together the end man, CPP, director of police, secu- 25TH New York City users as well as the decision mak- rity, and outside services at Massa- Security Conference and ers, the vendors, and all the differ- chusetts General Hospital. She Expo took place April ent components and segments of highlighted the real security prob- this industry.” lems that healthcare faces, including 22T and 23 at the Jacob K. Javits Raymond L. Dean, CPP, the aggression and violence, such as the Center in New York City. The trade show chair and senior vice recent case of a doctor who was show was an opportunity for president of MSA Systems Integra- shot and killed by a former patient attendees to focus on regional tion, expressed his happiness at at Brigham and Women’s Hospital security perspectives, attend the growth of the conference. in Boston. “We are a target because educational sessions, and “This show started 25 years ago. we are soft; we’re open; we’ve got We started with seven booths,” he lots of different people,” she noted. check out the show floor. said, noting that it began in a small Another session presented by NYC hotel. In the two-and-a-half the NYPD’s Counterterrorism Unit CRAIG M. SCHWAB, CPP, New decades since, the event has grown explored some of the recent intelli- York Chapter chair and vice presi- to approximately 130 exposition gence the group has gathered on dent of Deutsche Bank of Floral booths, and was moved to the the Islamic State and other promi- Park, New York, said the annual more commodious Javits Center. nent threats. event is an opportunity for mem- Dean added that New York City Members of many of the ASIS bers to experience a more focused Chapter members bring a unique councils were on hand to explain perspective on security threats in perspective to ASIS. “They come more about their missions. Brian A. large urban areas. “Really, it is a out of law enforcement; they come Jantzen, executive vice president of terrific mix—a conglomeration of out of the U.S. Secret Service, the AS Solutions of Bellevue, Washing- everything that is the best to offer CIA, the FBI, and the upper man- ton, has been an ASIS member in this industry…. If you’re in the agement of the New York Police since 2011 and came to the New business of security, New York Department (NYPD). I think we’re York City show for the first time City really is a place you have to a more security-aware society as a this year. He is part of the Executive go to talk to people and learn from the ground-level what we do here,” he added. Schwab said that this year’s show, which marked a quar ter century of the conference, was extremely well at- tended. “The show has grown every year exponentially,” he noted. “This year we have 3,000 attendees, around 140 exhibi - tors, [and] 18 educa- tional sessions over the course of two

14 ASIS DYNAMICS Left: The New York City Chapter’s Eugene J. Casey Award for Service went to George W. Anderson, vice president of operations for Allied- Barton. Right: John D. Ryan, retired president and CEO of the NCMEC, gives the keynote address. Below: NYPD Police Commissioner William J. Bratton (at the podium) was honored as Person of the Year during the annual luncheon. Protection Ad Hoc Council and “The question is, ‘What can have put together a training pro- attended to help spread awareness you do?’” Ryan asked attendees. gram for you, the professionals, to of the new group. “There are a lot “You literally are professionals who be able to leverage the skills that of people involved with executive are managing other professionals in you have, the experience that you protection in New York…with the venues where much of this activity bring, to detect the various touch high-profile individuals, the cele- has a nexus, whether it be schools, points of this activity,” he stated. brities and the wealthy,” he said, bus stops, malls, transportation In an interview with ASIS Dy- add ing that the council will open hubs—you name it. Wherever there namics, Ryan said the training pro- for membership later this year. are security professionals, this gram is already proving fruitful. ASIS President Dave N. Tyson, type of activity, in some form, is “The training is just rolling out, but CPP, noted that the conference al- occurring.” we’ve seen a success story or two lows attendees a chance to interact In addition to the memorandum already. It’s just amazing, and we’re on a more intimate level. “I think of understanding signed between very optimistic that this will be a the real benefit is that not only do the two organizations in 2013, this very successful program.” you have these incredible experts January ASIS and the NCMEC He adds that the most important who have years of solid experi- announced the release of an online, step in curbing child sex trafficking ence here in New York City, but one-hour, self-paced training pro- is to follow your gut instinct. “If you have some really cutting edge gram to educate private security you see something involving a topics.” For example, he touted a professionals on pinpointing poten- young child who seems to be in dis- session about drones that was par- tial victims of sex trafficking. “We tress [or] with- continued on page 29 ticularly interesting. “It was top- notch…and the great news was they said this wasn’t a one-time deal; they’re going to do the same thing with the latest information at the ASIS 61st Annual Seminar and Exhibits in Anaheim.”

Ryan Speaks Out on Child Trafficking During the Wednesday keynote address, John D. Ryan, retired president and CEO of the National Center for Missing and Exploited Children (NCMEC), emphasized the value of an organization like ASIS in addressing the problem of child sex trafficking.

JULY/AUGUST 2015 15 Foundation

Enterprise security is a distinct Foundation Events and sophisticated profession requir- ing a unique set of competencies in Anaheim and skills. Roles in this industry he ASIS are not a subset or “spin-off” of the Foundation criminal justice system. Nonethe - Twill host less, not all academic and training three fundraising programs with “security” in their events including a title offer an education with consis- golf tournament, tent, current, industry-aligned com- the Foundation petencies and employability skills. Night, and the Foun- This complication in education dation Benefit Ride as contributes to the growing security part of the ASIS Inter- industry skills gap. national 61st Annual five distinct The workforce is also aging, Seminar and Exhibits in tees and panoramic which leads to further shortages Anaheim, California, Sep- views of Los Angeles and of qualified workers and creates tember 28 to October 1. Through Orange County. the need to strengthen the talent the active support of members, as Foundation Night. As the Semi- pipe line. These dynamics, and the well as chapters and other organi- nar and Exhibits come to a close, absence of industry-endorsed solu- zations, these events raise funds the ASIS Foundation Board of tions, contribute to large talent defi- that allow the Foundation to pro- Trustees extends an invitation to cits that may weaken the security vide ongoing educational opportu- join other members and colleagues infrastructures of organizations, for a festive evening of and the larger global economy. delicious food and bev- To respond to workforce devel- erages. Make plans to opment challenges in enterprise dine at House of Blues security, the ASIS Foundation en- located in Downtown gaged in multiple research initia- Disney on Wednesday, tives to identify the security risks September 30, at 7 p.m. that enterprises are most likely to For more informa- face during the next five years, and tion, visit the Founda- the specific professional competen- tion website, founda- cies and skills needed to mitigate Coyote Hills Golf Course tion. asisonline.org. them. The goal of this research was to promote and maintain a com- nities and vital research to enhance mon understanding of the skill sets the security profession. Enterprise Security and competencies that are essential Bike Ride. The Foundation is Competency Model to educating and training a globally introducing a new fundraising competitive security work force. event this year—a scenic motorcycle Published Establishing a broader consensus ride in the greater Anaheim/Los he U.S. Department of Labor on which security competencies Angeles area and a group lunch. has published the ASIS are needed across industries and This fantastic day out will take TFoundation’s Enterprise Secu- subsectors of the security industry place on Saturday, September 26. rity Competency Model. Work on can help to close skills gaps by de - Golf. Arrive early in Anaheim the model began in 2013. fining clearer career pathways for and support the ASIS Foundation “This is not just a testament to tomorrow’s professionals. in the company of friends, clients, our visionary collaboration with In June 2013, the Foundation con- and colleagues for a great day of the University of Phoenix/Apollo vened a national roundtable of senior golf at this year’s tournament. The Education Group, it is also an ac- leaders from the security industry, tee-off will take place on Sunday, complishment for the global secu- higher education, and government September 27, at the award-win- rity industry,” states ASIS Founda- to identify the top security risks ning Coyote Hills Golf Course. tion Board of Trustees President and challenges that the industry The 18-hole, par-70 course features Dr. Linda Florence, CPP. will face in the next five years, and

16 ASIS DYNAMICS Foundation

the key competencies that security practitioners need to manage them effectively. The findings were pub- lished in Enterprise Security Risks and Workforce Competencies, a report re- leased by the ASIS Foundation and University of Phoenix in fall 2013. The Foundation then conducted a national survey of security indus- try professionals to validate the roundtable findings with quantitative data to help verify and prioritize the identified security risks, challenges, and professional competencies. The results of this industry survey were published in August 2014. The enterprise security compe- Before it came under Israeli tency research was formatted into control in 1967, the Western a new Enterprise Security Compe- Wall had been in the hands of tency Model, using the framework mulitple nations and empires. provided by the U.S. Department of Labor’s Employment and Train- ing Administration. This model encompasses the broad baseline Lessons from skills and competencies needed for the entire industry, not just an in-

dustry segment or occupation. The BY MICHAEL GIPS model reflects the competencies the Levant needed for entry-level security pro- Israel’s Ben Gurion Airport, the casual traveler fessionals. It also serves as a career FLYING OUT OF development tool to help ensure might notice four or five layers of security. Seasoned travelers would that security practitioners possess see six or seven. Security professionals would probably detect 10 to foundational competencies, as well 12. On a site visit to the airport, students of the Homeland Security as serving as a resource to identify Executive Certificate Studies program (HSECS), operated by ASERO the training and education needed Worldwide, Tel Aviv University International, and ASIS Interna- to upgrade incumbent workers’ tional, got a close look at more than a dozen layers of personal ability to adapt to new technolo- and baggage screening. These ranged from a visual inspection and gies, emerging industry dynamics, brief interview at the airport’s vehicle entrance to the confiscation and new work processes. of liquids—even liquids acquired in the stores and restaurants after The ASIS Foundation has stew- the mag and x-ray screenings—immediately prior to boarding. And ardship of the model and responsi- those were only the visible layers. bility for regular review to ensure that it remains relevant. his rare behind-the-scenes look with and approach to security. “We look forward to building at Ben Gurion was part of a Classroom sessions, held at Tel upon the model to better define Tpacked seven-day HSECS Aviv University, covered Israeli and career pathways and attract the tal- program held in late March for Middle Eastern history, trends in ent needed by our industry,” notes professionals in security, intelli- “glocal” (global/local) terror and Florence. gence, and law enforcement who analysis of adversary modus oper- The Foundation extends its sin- came from four continents. Profes- andi, the Israeli experience with cere appreciation to the ASIS volun- sors from Tel Aviv University and suicide terrorism, the global threat teer leaders, members, and other in- experts from ASERO—many of from ISIS, an over view of the dustry professionals who supported whom formerly held high positions threat of improvised explosive de- and contributed to this effort. in the Israeli defense or intelligence vices, behavior pattern recognition, To download a PDF of the services—blended theory with and a range of other topics. Each model, visit foundation. asisonline. hands-on learning to impart lessons session had real-world pedagogical org. N on the singular Israeli experience analogues: for example, after pre-

JULY/AUGUST 2015 17 senting a class on suicide attackers, ISIS member points a small ASERO experts led tours to various knife, suggesting that his cap- suicide attack sites, explaining how tive isn’t worth a sword or assailants approached the scene, other more grandiose weapon, how the target site’s security was Kor explained. He added that deployed (or not), how the attack ISIS’s release of video of the unfolded, and what telltale signs of burning of the Jordanian pilot, an attack were identified or missed. which resulted in retribution In class, students viewed footage by Jordan, was a tactical error, showing the 1995 assassination of revealing that ISIS is under Yitzhak Rabin, then walked the site stress from the coalition that is itself to isolate breakdowns in secu- fighting it. rity and determine why the attack Kor also discussed inter- succeeded. A fascinating side note views he has conducted with to the incident is that the footage assailants whose bomb vest or of the attack comes from a video- other device failed to explode. grapher who was intending to film “The majority of them are in the dignitar ies on hand. But the the margins,” Kor said. “Some- video shows that he lingered on thing happened to them—they the assassin before and up to the met a charismatic teacher, had a Students received in-class and on-site edu- assassination because the assassin’s family member killed by the IDF,” cation on suicide attack methodologies. movements were so odd. Yet no or some other life-changing event, the Rutenberg Power Plant, which security personnel noticed those he said. Instructor David Harel is situated only a few kilometers movements. (The vid e ographer spoke of the radicalization of Saa- from the Gaza Strip. The plant’s was cleared of any involvement in jid Badat, who along with Richard head of security pointed out actual the attack.) Reid was supposed to use a shoe and potential vectors of attack from On-site analyses of suicide at- bomb to take down a transatlantic Gaza, including tunnels, the Medi- tacks enlightened course attendee airliner. (Badat didn’t go through terranean Sea, and rocket fire. To Jim Lopey, a terrorism liaison offi- with it.) Badat was likely radical- get a close up view of the omni - cer coordinator for the Nevada ized in a U.K. mosque by char - present threat of rocket bombard- Department of Public Safety. For ismatic imams who moved him ment, the class visited Sderot, a city Lopey, it was sobering to see how with descriptions of the horrific of about 25,000 that sits a mere unexceptional the suicide attack treatment of Muslims in Bosnia. kilometer from Gaza. The head of targets were—restaurants, cafes, The course also featured behind- security of Sderot explained how nightclubs—including a pub called the-scenes looks at elements of the the city deals with the fusillade of Mike’s Place next to the U.S. Em- Israeli infrastructure. Besides Ben missiles sent its way by the likes bassy in Tel Aviv where he ate Gurion Airport, students visited a of Hamas and Islamic Jihad, about dinner one night. The visits also Swissport airport cargo center, the 8,000 since 2001. drove home the criticality of border Knesset (Israel’s parliament), an Air The intensive week instilled a security—once terrorists enter, they Force base near Be’er Sheva, and strong understanding of the existen- are very difficult to track. tial threat that underlies the Israeli Instructor Zori Kor ex- approach to security, and students plained how attackers become returned to their home countries radicalized, showing slick videos with abundant takeaways. One stu- created by terrorist recruiters. dent from Southeast Asia, whose For example, one video shows sensitive duties prevent him from an ISIS member standing, all in identifying himself publicly, ob- black with his face covered, served that the course incorporates next to Western-looking victim a valuable “hidden curriculum.” on his knees, hair shorn, dressed That curriculum, he says, “seeks to in orange prison clothes. Orange download invaluable experiential is an “infidel color” for radical knowledge through discussions with Muslims, Kor pointed out. The instructors who possess a wealth of operational experience and notable A U.N. peacekeeper from New Zealand credentials. Coupled with site vis- mans an outpost in the Golan Heights, its, such lessons were priceless.” N looking for flareups at the Syrian bor- der. During the visit, gunfire was heard Michael Gips is vice president of publish- routinely from across the border. ing for ASIS International.

18 ASIS DYNAMICS CSO Roundtable

strategy—by hijacking four planes All the Strategy Under the Sun and flying them into strategic tar- BY MARK TARALLO broad operational plans as strategy. gets, the enemy created a makeshift “ trategy in the World of the He gave a real-life example of an air force with minimal resources CSO” was the theme of the unnamed think tank that issued a that caused enormous damage. S8th Annual CSO Roundtable report containing three pillars of And the attack changed the FBI’s Summit, held in Miami, Florida, strategy to degrade ISIS. However, antiterrorism strategy, as the May 18 and 19. Attendees discussed the pillars were actually plans and agency went from focusing on how strategy factors into a range of goals, not strategies to achieve those solving crimes to preventing them. topics from security and startups goals. A strategy would require in- Burn it. After the opening ses- to global conflicts, and from hiring sights on the capabilities and moti- sion, several CSOs participated as to career development. vations of the enemy, ISIS, in order speakers in an Ignite! Session, a Fittingly, the opening session of to defeat them. “There’s nothing type of condensed seminar where the conference featured the man here that gets into the mind of the each speaker has a time limit of who literally wrote the book on opponent,” he said of the example. five minutes and uses 20 slides, strategy—Ross Harrison, author of While many different definitions each of which automatically ad- Strategic Thinking in 3D and a profes- of strategy exist, one that Harrison vances every 15 seconds, forcing the sor in the Georgetown University said he particularly liked was put speakers to make succinct points. School of Foreign Service. Harrison forth by John Gaddis, the military They did so in entertaining argued that the concept of strategy and naval history scholar. Gaddis ways. Hart Brown, vice president has been so often mentioned that defined strategy as “the calculated of organizational resilience at HUB it has become cliché, and that relationship of means to dispropor- International, displayed a slide of people often think they are talking tionally large ends.” This implies Albert Einstein and said the brilli- about strategy when they aren’t. that through strategy, an organiza- ant’s scientist’s attitude of “the “Strategy is one of the most tion can overcome its rate of di- more knowledge you have, the widely used but least understood minishing resources. more humble you become” was a words in the English language,” In the end, strategy is a creative good motto for CSOs. Clint Hil- Harrison told attendees at the act, and it requires imagination bert, CSO of Beta fence, used a se- Roundtable, but contradictions sur- and insight, like all creative acts. ries of cartoon images to illustrate round the concept. While the de- The price of failure can be steep. how CSOs can be stereotyped: the mand for strategy has increased in Harrison noted that the federal 9/11 wolf crier (bad), the on-the-job both the private and public sectors, Commission, in its report on the sleeper (bad), the mechanic (a good the supply of actionable strategy has 9-11 terror attacks, criticized the problem fixer, but often a short- decreased. Although business oper- U.S. government for “a failure of timer in the organization), and the ating environments are increasingly imagination.” Government officials wizardly Gandalf (best). “foggy and fraught with risk,” he could not imagine the opponent’s The Ignite! Session also served said, more and more organiza- tions are citing budget and re- source shortfalls and saying, “‘We don’t have the luxury of doing strategy.’” Ignoring the need for strat- egy is a mistake. But strategy takes time and effort to for- mulate. “Strategy will never seek you out. It will never beckon you,” Harrison said. Even prominent organiza- tions like multinational firms and large government agencies Axel Petri, senior vice president, group security governance, Deutsche Telekom AG, speaks at confuse strategy with other the podium at a session on regional threats. Listening are (from left): OSAC Executive Director concepts. These organizations Steve Brunette; Zurich Insurance Company’s Adriano Guima raes and Louis Malin; and moderator sometimes label their goals and Michael Gips, vice president, publishing, ASIS International.

JULY/AUGUST 2015 19 CSO Roundtable

as an informal competition, with “Security Strategy: From Evolution should ensure that they have the the winners gauged by the amount to Revolution.” skills to be business leaders, such as of applause he or she received. Petri said that the three pillars of general management and leadership Brown won the contest and re- strategic security are protect, enable, capabilities, Petri said. With these ceived designer luggage as his prize. and monetize. Thus, the protection capabilities, the CSO could be “the Security strategy. Later in the function is crucial, but not enough. corporate rock star of the future,” roundtable, Axel Petri, senior vice The CSO should also think of se- as the exceptional possess a combi- president of group security gover- curity as a business enabler. Fur- nation of technical, management, nance at Deutsche Telekom AG, thermore, security can provide and leadership skills that are rarely returned to the event’s theme with business offerings if some security found in one person. However, on his well-received presentation, products can be monetized. CSOs the whole, the profession has not yet advanced to that level. “We are not yet where we have to be,” he admitted. The day ended with a poolside, under-the-palms Welcome Recep- How has ASIS tion. Day two. Highlights of the supported your career? event’s second day included “Build- ing a Security Organization in a Start-up: Strategies and Rebrand- ing.” At this session, panelists dis- cussed how managing security at a start-up presented its own unique set of challenges and rewards. The three speakers were George Mc- Closkey, CPP, director of trust and safety at Square Inc.; Alan Born- trager, CPP, head of global security and safety at Red Hat; and Mike Ginty, CSO at AltSchool. Of note, Ginty spoke of the challenges of managing security at Altschool, a network of alternative schools, which features experiential activities outside the classroom. Half-price dues. “Parents love that—until something Full benefi ts. happens,” Ginty noted. The chal- lenge, he said, is to layer in security so that youth are always protected without resorting to serious patrols Your personal story is a powerful one worth sharing. Tell your or heavy-handed oversight. peers what membership in ASIS has done for you. Then invite Finally, before leaving the Miami them to join the leading organization for security management event, attendees were given word professionals. on the venue for the 2016 CSO Roundtable—George Lucas’ Sky- With our special, half-year dues offer, now is the ideal time to test-drive membership in ASIS. Your friends will thank you for it. walker Ranch, located in Marin County, California. The ranch Go online for details on our Member-Get-a-Member program. contains a winery, a barnyard, gardens, a lake, as well as several cinema screening rooms and a postproduction sound studio for Lucas’s film company. N Mark Tarallo is senior editor of Security Management and a contributing editor to ASIS Dynamics.

20 ASIS DYNAMICS LIFETIME CERTIFICANTS The following individuals have been granted Lifetime Certificant Certification status by the ASIS International Professional Certification Board: Michael W. Francis, CPP Viktorija Graham Steven R. Harback, CPP Heimo Grasser Best in Show Richard C. Leswick, CPP SIS International wishes to Sean W. Haglund Steven S. Minniear, CPP congratulate the following Robert Hastings Roger D. Piper, CPP A individuals who passed Donald R. Jones Michael K. Offley, CPP the Certified Protection Profes- Aabid Khan sional® (CPP), Physical Security Brent Mahoney Professional® (PSP), and Profes- Matthew Norris Randall Francis sional Certified Investigator® Bedros Ohanian Anthony Gledhill (PCI) examinations in March and Scott Paterson Jason Goodloe April. Teri Poth Thomas E. Gorab Matthew W. Roman Robert J. Gosnell CPPs Timothy N. Strunk Mark Holm Graeme Adams Simon Jones Richard Austin PSPs Mushtaq Khan Patrick Bellantoni Anjene T. Abston James Lavender Kenneth W. Bennett Kurt D. Anderson Jim Low Jeremy Buckels Preston R. Bernardi Thomas McGinn Michael R. Croll Dale Bowman Kevin Mills Gregory M. Cullen Nicholas Breiner Christopher A. Mitchel Sudesh S. Dhanda David Clark Andreas I. Mulianto James R. Fatz Angus Darroch-Warren Michael J. Ollis Michael J. Finklestein Gerald Forstater Carl Pitchford Kenneth W. Pressley Richard Reineke Prepare for Certification in Anaheim Stella Sass ON THE WEEKEND before the ASIS International 61st Annual Seminar and Exhibits in Steven Simpson Anaheim, California, Certification Reviews will be held for the Certified Protection Pro- William M. Sowar fessional® (CPP), Physical Security Professional® (PSP), and Professional Certified Inves- Jonathan Tabler tigator® (PCI) examinations. Attendees can ready themselves to obtain the industry’s Stephen R. Troup premiere certifications and then partake of the more than 200 educational sessions Frank Tupper that will be offered at the Seminar and Exhibits. The reviews will take place Saturday, Mun Chu Wong September 26, and Sunday, September 27, at the Anaheim Convention Center. The robust boot camp-style learning experiences provide a high-level review of se- PCIs curity concepts and practices tested on the CPP, PSP, and PCI exams. The programs are Nina Blemmer designed to strengthen participants’ understanding of key concepts tested on the ex- Robert Carnes aminations and identify areas of strength and weakness to help tailor future study. The Jonathan Costales courses include a practice assessment with immediate feedback. There will also be James Fatz time to network with peers and the board-certified instructors. Lyle Forcum For more information and to register, visit securityexpo.asisonline.org/Education/ Robert Jestic Pages/Certification-Reviews.aspx. Kristopher Johnson Christer Kajsjö Michael Kassa Joseph J. Mato, Jr. George O. Osano Bankole Owoeye Gary Pugsley Charles Sanchez Mohamed K. Talha Luke R. Terry Alan L. Thompson Silas Hao-Wei Wee Brenda Wong N

JULY/AUGUST 2015 21 Anaheim Convention Center will be the venue for the ASIS International 61st Annual Seminar and Exhibits.

Federal Market.” The dramatic shift under way in Preseminar the federal market affects access con- trol system manufacturers, system integrators, system design engineers, Programs and procurement processes. Today, the U.S. General Services Adminis- HILE THE ASIS International 61st Annual Seminar tration recognizes and requires the and Exhibits boasts some 200 seminar sessions, less CSEIP certification as a prerequisite for procurements of next generation well known is that before the official opening of IT-centric access control systems. the September 28 to October 1 event, a fine roster This information-packed program Wof preseminar programs are also on offer. All of these programs is a derivative of the CSEIP certifi- will take place on Sunday, September 27, from 8 a.m. to 5 p.m., cation course and provides an un- unless otherwise noted. derstanding of public key infra- structure, certificate validation, the Banking and Financial assessment program development; federal bridge, high-assurance iden- Institutions violent crime trends and terrorism tity credentials, identity manage- This program, cosponsored by the threats; building an emergency ment, and cryptology that are es- American Bankers Association and management program founded on sential parts of the rapidly evolving the ASIS Banking and Financial public-private partnerships; and modern security environment. Council, will discuss critical infor- strat e gies for the use of current This program is essential for mation about current financial insti- security technology. companies that are interested in tution risks and cutting-edge inves- establishing a credible presence and tigative techniques. Access Control competitive advantage in the secu- Topics that the highly regarded The Smart Card Alliance will rity systems market. subject matter experts will address present “Certified System Engineer include social media and intelli- ICAM PACS, CSEIP: Require- School Security gence gathering methods; executive ments for Next Generation Physi- “Developing a School Security and

protection and executive-travel risk cal Access Control Systems in the Safety Plan for the Next Five Years” Bureau Convention & Visitor County Anaheim/Orange © Photo

22 ASIS DYNAMICS is sponsored by ASIS School Safety tember 26, and Sunday, September of supportable security incident and Security Council. 27, from 8 a.m. to 5 p.m. data, credible intelligence, or peer School security incidents may As technology moves forward experience. Even with sound infor- range from a school bus accident to exponentially, security professionals mation to work with, what asset is student suicide to sexual assault to are presented with a dizzying array more vulnerable than another and a death in connection with a haz- of tools and technologies. Establish- why is it so? The ability to under- ing. This program offers solutions ing a framework for assessing the stand and work effectively with the to these and other issues and will operational and legal implications of concepts of threat, risk, and impact address best practices for a school technology is a critical function for will significantly assist in the deter- environment and provide guidance security professionals. The power mination of vulnerability and how on how to design a five-year plan. of new surveillance tools and the it can be effectively reduced. This Topics will include risk assessment, enormous amounts of data they program is sponsored by the ASIS addressing violent and aggressive generate can lead to consequences Physical Security Council. behavior, active shooter programs, that are both positive and negative emergency planning, access control, and intended and unintended. Healthcare Security and how technology can help Learn how some of the newest The ASIS Healthcare and ASIS schools create a safe environment. security technologies can be success- Information Technology Security fully integrated into security opera- councils are sponsoring “Securing Terrorism and Social Media tions. Demonstrations of new tech- Healthcare Facilities with Future “Media, Money, and the Anti-Es- nologies and implementation case Expectations, New Programs, and tablishment: Using Social Media studies, as well as legal assessments Security Officer Implementations.” and Open Sources to Locate Assets and guidance for evaluating emer- This one-day program will pro- of Terrorists and Opposition gent technology and managing nega- vide insight to the cybersecurity Groups” will examine the social tive consequences, will be included. risks that are unique to the health- media applications currently used care industry, educate attendees on by terrorists from ISIS to Sovereign Risk and Vulnerability the latest healthcare facility guide- Citi zens. The effectiveness of these Assessment lines, and demonstrate an effective campaigns will be explained, as Vulnerability is not constant. It is approach to integrate a workplace will why understanding the band- variable and can be dependent, in- violence prevention program with width used by terrorists and coun- dependent, or time-dependent. a hospital LMS system. Faculty are terproductive groups in capturing During the program, “Reducing industry leaders who specialize in their audience is so important to Security Vulnerability—Mitigation protecting healthcare facilities across corporate security. Program atten- Strategies,” attendees will learn that North America. dees will learn how these networks the identification of vulnerability is fund their successful social cam- critical to the larger security pro- Utilities Security paigns and market them. Speakers gram. Effectively identifying, classi- Sponsored by the ASIS Utilities Se- will also discuss the Dark Web to fying, and implementing a vulnera- curity Council, “Security Manage- explain how transactions funneled bility reduction program isn’t easy, ment Program Development: A Crit- through online coupon theft and especially in the potential absence ical Infrastructure continued on page 29 other illegal black market sales help pay for it all. This program will be sponsored by the ASIS Economic Crime Council.

Security Technology Sponsored by the ASIS Security Applied Sciences Council, ASIS Physical Security Council, and ASIS Information Tech- nology Security Council, “New Frontiers: Legal and Operational Princi- ples for Evaluating and Managing Emergent Secu- rity Technologies” will take place Saturday, Sep-

JULY/AUGUST 2015 23 European Conference & Exhibition Expo

during large events where patients Bringing Security Education to can be treated for issues such as overheating, accidental lacerations, Frankfurt—Rain or Shine allergic reactions, and any of the T WAS A BLUSTERY EARLY SPRING DAY when nearly 500 at- typical myriad medical emergencies tendees from 46 countries made their way to one of Europe’s that occur during massive confer- most well-known venues, the Messe Frankfurt, which would ences and festivals. Patients who need more intensive care at hospi- Ihost the ASIS International 14th European Security Conference tals can be transferred by ambu- & Exhibition. There they would take part in networking events, lance or by helicopter. hear key industry presentations by exceptional keynote speakers, and Also on Sunday, attendees view an industry exhibition that showcased Europe’s leading sup- toured the downtown Frankfurt, pliers of security technology and solutions. Even the near-hurricane twin-skyscraper headquarters of force winds that blew through Germany during the event could not Deutsche Bank. At the foot of the stop the security education juggernaut. looming buildings, tour participants learned about perimeter protection Sunday “At the last fair, there was a for the headquarters and the car- On Sunday, March 29, the day be- heart attack in the hall and we sent parks. This was followed by a fore the official start of the confer- a paramedic and an emergency briefing on Deutsche Bank’s cut- ence, Messe Frankfurt opened its physician directly to the booth and ting-edge security operations center. doors for a professional tour of the had the victim sent to the [Frank- The various security technologies immense facility, which routinely furt] hospital that specializes in in place in the building were de- sees 1.5 million visitors per year. heart attacks,” Donis said. tailed, including the use of x-ray The eventually footsore participants Tour goers saw the onsite police screening. of the tour walked the length and station, complete with holding cells, Willkommen. After conference- breadth of the massive complex, and the fire and life safety facili- goers had settled into their hotels stopping to explore the around- ties—the latter of which includes a and visited the Messe Frankfurt to the-clock Messe Frankfurt Opera- paramedic rescue service and a pick up their badges, the evening tion and Security Center, which small, staffed hospital in operation came alive with a Welcome Party, opened in August 2014 after two years in creation. The tour was led by Dimitrios Donis of Messe Frankfurt security and safety. In the security opera- tions center, he told tour goers that the complex has “about 200 cameras around the fairgrounds, but not in every hall,” because each event held is different and incorporates varied booths, floor levels, and other constructions. “A standard camera system would only pick up about 10 to 30 per- cent of the hall. We see the booths and the business in the booths, but not what is in the hall,” he explained. However, that did not During “The Future of Security Technology,” ASIS International Past President Eduard J. Emde, CPP (left), led a panel discussion by Roland Y. Billeter, president, continental Europe, stop the cameras from picking up Tyco Integrated Fire & Security, Germany (second from right); Ruben Wegman, CEO, Nedap a heart attack during an event not Security Management, The Netherlands (right); and Dirk Büerhaus, managing director, long before. Koetter Security, Germany (second from left).

24 ASIS DYNAMICS Messe Frankfurt, the Conference’s venue.

powered by Nedap and hosted by [They must] be aware of the need ators of critical infrastructure. ASIS Germany Chapter Chair to fight espionage both online and Shortly thereafter, de Maizière Oliver Fein. The party took place off. They also need to be aware of joined in a panel discussion on at the ALEX Skyline Plaza with its the threat of terrorism. There are stage where the conversation on spectacular views of Frankfurt and people in Germany who could pos- IT security regulations continued. included live music, networking, sibly do harmful things. The Charlie The minister compared these to and great food. Hebdo attack made that clear.” regulations imposed on air or mar- The minister discussed a marked itime traffic. “All these things have Monday increase in crime in Germany in rules. IT security has to have them After Conference Chair Arjo J. biotechnology, fine mechanics, and as well,” he stated. DeJong welcomed attendees, tell - other industries, as well as some Monday sessions. The keynote ing them “I truly believe that this 65,000 business computer crimes and panel discussion were followed conference and this region are a and Denial of Service attacks that by a day of educational sessions on fantastic match,” Federal Minister brought down business networks. topics such as the future of security of the Interior of Germany Dr. There was even a case where a com- technology, protecting soft targets, Thomas de Maizière came to the pany’s own intranet was hacked and security and social media, and podium to give the opening key - used to send fake e-mails between chemical weapons removal from note address—a comprehensive company departments that led to as- Syria by the Organisation for the overview of the security situation set loss. These acts have resulted in Prohibition of Chemical Weapons. in Germany, particularly for indus- damages of billions of euros, he said. Highlights of the day’s sessions try, and a discussion the economic “It is your task to create knowl- included “Crisis Management and security architecture of the nation, edge of threats,” de Maizière told Country Evacuation Planning: Plan- including countermeasures against security practitioners. Networking ning to Go Further than the Park- crime and espionage in cyberspace. with peers is important, but “it is ing Lot,” by Geert Coremans, CPP, “The larger the enterprise, the also important to network within corporate security advisor for Carl- larger is the sensitivity to security,” the business to raise awareness.” son Rezidor Hotel Group, Belgium. de Maizière told the crowd. “But He discussed a European Union The session began with a case according to what we know, small directive being prepared that will study set during the Iraq invasion and middle-sized businesses are just establish minimal levels of network of Kuwait in 1990 and progressed as likely to have security problems. and information security for oper- through the evolution of country

JULY/AUGUST 2015 25 evacuation planning to the present plans’ appropriateness, com- day, covering such issues as threat pleteness, and effectiveness. monitoring, contingency planning, One tactic used during the war sheltering in place, and full-scale games is to continue escalating evacuation of staff from a country. the attacks to identify the fac- “Using War Games to Effect tors and conditions under Change in Organization’s Resilience” which resilience will finally was led by Dan Solomon, director, fail, said Solomon. Thus, the cyber risk and security services, war game not only tests the Optimal Risk Management Ltd., effectiveness of processes and United Kingdom. “There are some procedures, but also examines very hard truths that companies the organization and manage- need to accept, as much as they are ment of those processes. reluctant to do so…. The compro- Dmitry Budanov, CEO of mise and exploitation of your most Elite Security Holding Com- important data invariably happens pany, , gave an overview within minutes, certainly within of the security industry in hours, and the majority within a Russia from 1991, exploring day, and if you look at companies’ large-scale foreign investments abilities to identify, defend, and that led to many changes and remediate, none of this really starts improvements to the Russian until after the event. It takes days, security sector. However, since The President’s Reception took place at Frankfurt’s Gesellschaftshaus Palmengarten. weeks, and sometimes months, and then, Budanov said, centralized in one case, it took two to three corporate structures and localized Christian Muth, who is a partner, years before a company realized financial crises have caused the assurance, fraud investigation, and that it had been breached. Forty suffocation and stagnation of the dispute services, compliance man- percent of companies experienced a Russian security industry. agement services, Ernst & Young, breach last year, so this is a prob- Managing Director Bill Enright, Germany, told session attendees that lem—a big problem,” he said. PCI, of Parkton Risk Management, fraud and corruption are facts of To help develop preparedness Ireland, discussed hotel security business life. Throughout the world, and resilience, the banking sector is and soft target protection. Both the white-collar crime has become a turning to cyber war games—stag- hotel and the guest have responsi- lightning rod for governments, reg- ing a serious of controlled technical bilities when it comes to security, ulators, shareholders and the pub- attacks to mimic the methods used he said, and sometimes these re- lic. During his presentation, titled by advanced hackers. Solomon ex- sponsibilities can be misunder- “Large Scale Fraud and Corruption plained that these cyber war games stood. When this happens, the re- Investigations: A Practitioner’s View probe response and contingency sults can be loss, damage, or injury. on International Trends and Hot Enright provided an overview of Topics,” he said that fraudsters are Left: Keynote speaker German Federal choosing a hotel from the risk finding ever-more complex meth- Minister of the Interior Dr. Thomas de management perspective and spoke ods for illicit activities, and security Maizière kicked off the conference. Right: practitioners need to remain vigi- At the Messe Frankfurt, there were many about how guests can find them- opportunities to network. selves in vulnerable situations. lant and find effective ways to safe-

26 ASIS DYNAMICS guard the security and integrity of the enterprise, as well as its value. The exhibitions at the conference highlighted cutting-edge Muth explored legal requirements, technology. One of the big draws was Audi, which showcased the new, bullet-proof Audi levels of enforcement, the first 48 A8 L protect. This high-security version of Audi’s luxury sedan includes armor plating and hours of an investigation, common an array other high-security features. When developing the A8 car line, Audi included pitfalls, dealing with electronic data, the high-security version in its plans from the outset, resulting in an integral overall and cross-border challenges. concept that is far Evening of elegance. After the superior to retrofit sessions had ended for the day, the solutions. night took a decidedly sophisti- The car has been cated turn when the Annual Presi- officially certified by dent’s Reception was held in the the German Ballistics late classical Festsaal of the historic Testing Center in Gesell schaftshaus Palmengarten. Munich; it complies The event was hosted by ASIS with the require- President Dave N. Tyson, CPP, and ments of the class sponsored by Tyco Integrated Fire VR 7 ballistic protec- & Security. tion standard in ac- The Palmengarten is one of two cordance with the botanical gardens in Frankfurt, Bullet-Resistant Ve- completed in 1871. It survived two hicles 2009 guide- world wars, and was ceded to line. The high-security sedan’s occupant cell, which is integrated into the body as a American occupation authorities af- unitary element, features extremely tough, highly resistant materials that overlap at ter World War II, when it was used transitions for maximum security. The aluminum side sills incorporate ballistic-proof as a club for U.S. soldiers and other profiles that afford increased protection against explosive weapons. For the door win- purposes. Beginning in the 1960s, it dows, windshield and rear window, Audi uses special glass with a splinter-inhibiting was restored and expanded. polycarbonate layer on the inside. Conference attendees enjoyed a The communications box in the trunk houses the control units for the vehicle and gourmet standing dinner in the communications electronics, as well as a supplementary battery. The standard equip- venerable 144-year-old ballroom, ment also includes the intercom system that the passengers can use to communicate which looks out into the palm gar- with the windows shut. It comprises a loudspeaker in the singleframe grille, along with den that gives the venue its name. microphones for the interior and for the vehicle’s surroundings.

Tuesday business skills. on Tuesday was “Value-Based Secu- British criminologist Professor Mar- The characteristics of a corporate rity Procurement.” Malcolm Smith, tin Gill opened the second day of security department most valued by CPP, head of group security and the event with a thought-provoking both groups were identified as un- safety services, Nedbank Group Ltd., keynote presentation “What Are the derstanding threats, having an effec- South Africa, explained to attendees Characteristics of Outstanding Secu- tive security strategy, and having that a degree of liability transfers rity Performance?” Gill is director of objectives aligned with those of the to a vendor when the vendor is Perpetuity Research. He is a mem- company. Only one in three corpo- responsible for security manage- ber of the ASIS Foundation Board, rate security professionals surveyed ment on behalf of corporate secu- former chair of the ASIS Research said that paying the market rate for rity. The liability transfer allows the Council, and an overseas represen- security was a condition of achiev- company to focus on its core busi- tative on the ASIS Academic and ing excellence. Gill said that this ness; however, vendors and clients Training Programs Committee. suggests that clients are not fully have cut corners to come up with During his address, Gill revealed aware that security suppliers are un- the lowest price for services. The that 489 corporate security person- der pressure to keep prices down. ideas of quality and value need to be nel and security suppliers from Gill noted that the research find- introduced in the initial stages of the around the world were asked to ings in their entirety provide evi- security procurement process, and rate various characteristics of out- dence that security is continuing to careful attention needs to be paid to standing performance. Gill explored move further from being seen as a business requirements, evaluation, some interesting differences in protector of assets to an essential fa- adjudication and due diligence, and view points, including that corpo- cilitator of good business. However, vendor performance management. rate security representatives valued it needs to blow its own horn to “Current and Emerging Trends business skills as highly as security gain more recognition of its value. in China” was presented by Neil expertise, but security suppliers Tuesday sessions. Among the Marshall, regional head, North Asia, did not place as high a value on strong educational sessions presented of Hill & Associates (PRC) Ltd.,

JULY/AUGUST 2015 27 China. A U.S.-China Business forum for senior se- Council member survey released curity officers of the Dr. Martin Gill, director of Per- last September revealed that 86 world’s leading organ- petuity Research percent of companies had concerns izations. in the United about China’s competition enforce- Wrapping up. At Kingdom. ment activities. Nearly 30 percent the end of the second were concerned about being targeted day of programming, by future investigations. In the last conference and exhi- 12 months, terrorist incidents in bition attendees filled China and attacks on people of Chi- the auditorium to hear nese decent traveling in Southeast the closing speaker Asia have become a growing con- Axel Petri, senior vice cern to travel risk managers. This president of group exposure is set to increase as supply security governance, chains lengthen and more mainland- Deutsche Telekom based employees take on regional AG, who spoke about roles. Marshall discussed these and the impact of the Ed- additional trends of concern. ward Snowden revelations on the National Security Agency (NSA) Martin Smith of The Security telecom industry and the need to sweeps of American phone records Company, United Kingdom, pro- regain the trust of the consumer. that were acquiesced to by almost vided both comic relief and a lot of Petri asked attendees, “What every U.S. telecom company, of substantially important information does trust mean to you? Who do the NSA breaking encryption and in his session, “Internet Addiction you trust? Why, surely your family undermining Internet security, but Disorder: Cyber Junkies, Social and friends; hopefully also your also by headline grabbing digital Media Obsessives, Online Gam- colleagues and business partners crimes. For companies like Deutsche blers, and Cybersex Nuts.” Smith and even your boss. Think about Telekom, it will be a challenge to discussed the endless stream of all our governments…. Do you trust regain trust that has been lost by types of entertainment that the In- and believe in the political system the entire industry. This will only ternet provides, and the growing you live in? Do you feel secure in be possible through a concerted number of people who are glued that, and if so, what the price you effort by all stakeholders, private to their computers and devices. willing to pay for that?” as well as public, he stated. The compulsions he discussed in- The digital world is growing On the way home. On Wednes- cluded cybersex, online gambling, exponentially and everything that day, April 1, a professional tour was and cyber-relationship addiction, as can be digitized soon will be, Petri given of Frankfurt International Air- well as the dangers that accompany said. The Internet of Things will port, one of the world’s largest air them, including cyberbullying, continue to grow. The telecom in- transportation hubs. The statistics grooming for illicit purposes, fraud, dustry has fostered growth and tell of the facility’s size and scope: and blackmail. employment and is responsible for 58 million travelers go through the Both days of the conference also 21 percent of the growth of GDP airport each year and it is the featured a CSO Roundtable Sum- of developed nations during the largest employer in Germany, with mit. The Roundtable is the ASIS last five years. The industry has more than 78,000 workers. Those created 2.6 new jobs who attended heard a presentation Axel Petri, senior vice for every one termi- on the workings of security in the president of group nated by digitalization. airport and visited Airport Security security governance, But at the same time Control. They also went on a sight- Deutsche Telekom AG. that this incredible seeing tour of the facility that in- expansion is occurring, cluded the A380 maintenance base. there also has been a If this article has offered a tanta- decrease in the secrecy lizing glimpse of a conference that and safety of the pri- should not be missed, all the perti- vate information of nent information on the ASIS 15th customers, he said. European Security Conference & Petri noted that Exhibition, which will be held in user trust of the digital London, United Kingdom, April 6 world has been deeply to 8, 2016, is available at www. strained by revelations asisonline.org/Education/Events/Glo- provided by Edward bal-Conferences/2016-European-Se- Snowden of massive curity-Conference-and-Exhibition. N

28 ASIS DYNAMICS NYC Expo you can get high-impact education, awareness, and great networking A little fun continued from page 15 with folks who come from the entire northeast region.” and a lot of drawn or isolated, then they may be The dates already set for the evidencing signs of physical abuse. ASIS 26th New York City Security networking Don’t walk away,” he requested. Conference and Expo will be an- “Stop, engage with that child…then nounced shortly at the Society’s make for great if it is what it may appear to be—a website, www.asisonline.org. N fundraising… situation where that child is being Holly Gilbert Stowell is an assistant editor abused—call law enforcement.” of Security Management and a con- Register to attend tributing editor to ASIS Dynamics. ASIS Foundation Person of the Year Hundreds gathered for Thursday’s events at ASIS 2015 Person of the Year Award Lunch- Preseminar eon where second-term NYPD continued from page 23 Police Commissioner William J. Bratton was honored. Bratton also Make plans now to arrive served as NYC transit police chief Model” will provide security pro- early and stay late in in the early 1990s, and was previ- gram design information using Anaheim for the ASIS ously commissioner of the Boston practical, real-life examples from police and chief of the Los Angeles the world of diverse and complex Foundation’s three Police Department. utilities. Recognizing the need to fundraising events. Bratton told luncheon attendees protect critical infrastructure, a that during his 25 years in New broad array of security program York City, the crime rate has management concepts will be high- Foundation dropped dramatically and that he lighted, all with sound protection Benefit Ride SAT., SEPT. 26, 2015 is proud to partner with organiza- philosophy and fully integrated, tions like ASIS to continue that end-to-end risk management that Begins at Eagle Rider, Newport Beach, CA trend. “These are extraordinary any industry can apply. Attendees Registration is limited for times and I’m so pleased that I will learn how utilities security this event. Register early! have the opportunity once again to professionals are adapting to the be back working in public safety.” new reality of integrated security Foundation Bratton told ASIS Dynamics that management and will come away Night during his service to New York with valuable resources to assist WED., SEPT. 30, 2015 City, threats to public safety evolved their security program planning. House of Blues in challenging ways. “New York is Anaheim, CA the most significant terrorist target Security Consulting in the world,” he noted. “The In this program, “Successful Security NYPD, unlike many major city po- Consulting,” attendees will learn Annual Golf lice departments, really has to focus from leading technical and manage- Tournament a lot of resources on that issue, and ment security consultants who will SUN., SEPT. 27, 2015

we do it very well.” Bratton said explain how to develop, market, Coyote Hills Golf Course that his predecessor, former Com- and deliver security consultant serv- Fullerton, CA missioner Ray Kelly, helped create a ices while avoiding the costly mis- large NYPD counterterrorism unit takes that can sabotage the success of Support the important and the work done by it remains a security operations. This popular work of the Foundation top priority for the agency. program provides practical informa- ASIS President Tyson told ASIS tion, from establishing a practice to by purchasing tickets to Dynamics that the conference expe- the initial consulting assignment, these events. rience should be had by all the through security assessments, designs Go to Society’s members. “The New and specifications, procurement, www.asisfoundation.org/events York City show is unique in that and implementation. A comprehen- for details and registration. it’s much larger than a traditional sive workbook of sample proposals chapter event but it’s still small and reports is provided to each at- enough that you can get around tendee. The International Associa- and see everything” during the two tion of Professional Security Consult- days of programing. “So in one day ants is sponsoring this program. N

JULY/AUGUST 2015 29 Get your FREE* exhibits pass by August 31. *Restrictions apply; see website for details. ASIS IS THE PLACE TO STEP UP YOUR GAME IN 2015 This is the global stage for the exchange of future-focused ideas and solutions. Discover emerging technologies, compare brands, and meet new partners to fi nd the best solutions for your enterprise. The education program is designed to raise the bar even higher this year so you can advance your skill sets to deal with new challenges, new threats, new opportunities. Come early to take advantage of intensive pre-seminar programs including the CPP, PCI, and PSP certifi cation reviews.

Make plans now to evolve at ASIS 2015, the world’s most infl uential security event. Register today at www.securityexpo.org.

KEYNOTES

TUESDAY KEYNOTE SPEAKER WEDNESDAY KEYNOTE SPEAKER THURSDAY LUNCHEON SPEAKER Commissioner General Michael Hayden General James Mattis Raymond W. Kelly Former Director of the Central Retired Marine Corp General and Former Commissioner of the Intelligence Agency and the Former Commander of the United New York Police Department National Security Agency States Joint Forces Command

COLOCATED EVENT

www.securityexpo.org ChapterNEWS

Group 1 gave a talk on the subject. Another the local area for the Fox Valley meeting featured a look back at Chapter. he Washington State Organ- the Superbowl’s security arrange- Brian Isle of Adventium Labs ized Retail Crime Alliance ments by Sergeant Patrick Kotecki gave a talk on “red teaming” at a Twas the topic of a meeting of the Phoenix Police Department meeting of the . Minnesota Chapter of the Olympic Mountain Chapter. and Captain Mike Duran of the Another meeting featured a presen- Commander Chris Norman of the Phoenix Fire Department. tation by former ASIS President Federal Way Police Department Geoff Craighead, CPP, about what discussed the origins of the alliance, Group 2 he has learned from the security which sponsors a data-sharing industry and volunteer leadership. web site designed to identify, track, t a meeting of the Eastern The Milwaukee Chapter wel- and prosecute retail criminals Iowa Chapter, Michael Mc - comed Chris Magnus and Michelle throughout the state. A Elmeel of Per Mar Security Caudill from AlliedBarton Security Deputy Chief Casey de Groof Services gave a talk on the ALICE Services to a meeting to explain of the Hanford Patrol gave a talk method for responding to active how to create a successful request on Hanford Site security and the shooters. The acronym stands for for proposal for contract security challenges facing the Hanford Pro- Alert, Lockdown, Inform, Counter, purposes. tective Force at a meeting of the and Evacuate. Deb Pyznarski, senior general Columbia Basin Chapter. Special Agent Jeremiah Win- manager for Lincoln Property Consultant Pam Graham gave a scher of the Wisconsin Division of Company, spoke to the Central Illi- presentation on measuring em- Criminal Investigation discussed nois Chapter about preparing for ployee risk for the San Fernando drug problems in Wisconsin and civil unrest. Valley Chapter. Another meeting focused on evidence forensics. Doug Carner of Forensic Protec- CHAPTER HIGHLIGHT tion, Inc., described how to tell if a picture, video, or audio file has been altered and the various soft- ware tools used to detect it. He discussed the tools available to au- tomate the process as well as emerging science. Government ethics was the topic for the San Diego Chapter when Gil Cabrera of the Cabrera Firm addressed the members. At another meeting, City Council Member Chris Cate gave a talk on emer- gency preparedness in San Diego. Jimmy Graham of Close Quar- ters Defense—Denver attended a meeting of the Denver Mile-Hi Chapter, where he discussed active shooter preparedness. he Montevideo, Uruguay Chapter held a conference designed to bring private The Salt Lake Chapter invited security together with Uruguayan law enforcement leadership and promote ASIS as Chuck Rackham, employment Ta conduit for public-private security cooperation in the country. Sub-Secretariat of transition coordinator at Hero 2 the Interior Ministry Jorge Vazquez discussed the domestic security situation and law en- Hired, to speak about managing a forcement’s efforts to maintain security in the region. He explored issues in public safety professional social profile from a and new approaches to force organization and equipment. Among those at the meeting recruiter’s point of view. (from left) were Chapter Vice Chair Antonio Romanelli, CPP; Guillermo Expócito, director Body cameras were the topic of the National Registry of Private Security Companies; Vazquez; ASIS Assistant Regional for a Phoenix Chapter meeting. Vice President Carlos Flores, CPP; Chapter Chair Oscar Baladán, CPP; and Chapter Secre- Steve Tuttle of Taser International tary Alfredo Carlos Moreira.

32 ASIS DYNAMICS ChapterNews

Retail assets protection was the topic for the Indianapolis Chapter HAPPY ANNIVERSARY! when Kyle Bitterling of Target was SIS International is proud to highlight the following chapter anniversaries. To all of the guest speaker. Another meeting A these chapters, the Society wishes many more years of professional camaraderie, featured a talk by Cassie Sparks, education, and service. senior crisis and continuity advisor In May, the Miami Chapter celebrated a remarkable 55 years as an ASIS chapter. at MESH, about her organization, a In June, the Costa Rica Chapter celebrated its first five years together. The Mexico public-private coalition that enables Northwest, France, and Dubai chapters marked their 10th anniversaries, while the healthcare providers to respond ef- Taiwan and Lima, Peru chapters had much to be proud of as they celebrated 20 fectively to emergency events. years of chapterhood. The Montreal and Sweden chapters were ahead of them by Rick Eaton, senior researcher at five years—reaching 25 years since obtaining their charters. But even farther down the Simon Wiesenthal Center, ad- path were the Hong Kong, Greater Charleston, and Austin chapters, which dressed the Chicago Chapter. He reached their 30th anniversaries. And finally, no less than four chapters reached the age of shared findings of the organization’s 35: New Mexico, Schuylkill Valley, Central Arkansas, and San Fernando Valley. latest report on digital terrorism and hate. for Tropicana Evansville, explained cal infrastructure business. The Western Michigan Chapter how to create an audit and assess- Ty Shriver and Will Pollard of learned about mailroom threats ment program. 3SI Security Systems spoke to the when the guest speaker was Cecil Central Arkansas Chapter about A. Frink, U.S. Postal Inspection Group 3 technologies for asset tracking in Service team leader. the financial and retail industries. Marvin Cross, director of secu- oger Palmer, CPP, who is Javier Peña and Steve Murphy rity for the Cleveland Cavaliers, manager of corporate investi- of the Drug Enforcement Adminis- gave a presentation on the Cava- R gations at BlueCross Blue- tration spoke to the San Antonio liers’ security program at a meeting Shield Kansas, discussed the An- Chapter about their part in the of the Cleveland Chapter. them data breach at a meeting of investigation into and dismantling At a gathering of the Evansville, the Topeka Chapter. of the Medellin Cartel of cocaine Indiana Chapter, Joe Cole, security Energy security was the topic smugglers and the death of its director for Eastland Mall, shared for the Ozarks Chapter when Ryan leader Pablo Escobar. his knowledge about security plan- Walker, security systems adminis- Mario Salinas, security specialist ning and operations for a regional trator at Sho-Me Power Electric with United Technologies Corpora- mall and shopping center. The Cooperative, was the guest speaker. tion, talked about global investiga- presentation included discussions of The Kansas City Chapter wel- tions and corporate security in day-to-day operations, terrorism comed Stephen Baker, CPP, vice Mexico and Central and South awareness, and special events. president and deputy CSO of State America at a meeting of the Aus tin Another meeting focused on Street Corporation, to a meeting Chapter. He focused on using secu- managing risk through assessments. where he talked about managing rity consortiums to effectively plan Chris Freeman, director of security security in a highly regulated criti- and execute security in Mexico.

Captain Sanjeev Mishra, CPP, vice president of corporate security for Reliance Industries, hosted a meeting of the Mumbai Chapter at his company’s facility. Jeremy Hunter, president of the Henkel Group–India, spoke about what business leaders expect from corporate secu- rity. Avanti Bhati, senior manager of Deloitte India, briefed the gathering on ISIS and its geopolitical impact, especially on India.

JULY/AUGUST 2015 33 ChapterNews

Due to violence along the Mexico- U.S. border, companies must in- crease security awareness to protect private-sector employees. He en- couraged companies to participate in organizations like the Overseas Security Advisory Council. Security professionals from the Austin and San Antonio chapters participated in a hands-on profes- sional education experience at SeaWorld San Antonio. Ken Glide- well, director of security, provided an overview of security pertinent to SeaWorld’s operations. The training included crisis and emer- Twenty members of the Spain Chapter attended an introductory course on the ANSI/ gency management procedures, ASIS SPC-1.2009 Organizational Resilience: Security, Preparedness, and Continuity Man- physical and personnel security, agement standard. The course was delivered by AENOR, Spain’s certification body, which and the security facets unique to worked with ASIS International to translate five ANSI/ASIS standards into Spanish. this facility. dealing with it when Felix Nater member and president of the Group 4 of Nater Associates was the guest North Carolina Gang Investigator’s speaker. The chapter also intro- Association, was the guest speaker t a meeting of the Mid-Ten- duced a mentoring program for of the North Carolina Research nessee Chapter, David L. members. Triangle Chapter. He talked about A Jennings, vice president of Additionally, the chapter’s gangs and related crime. security for the Tennessee Lottery, Young Professionals and Mentor- The chapter’s Women in Secu- discussed the unique problems in ship Program chairs organized a rity group held a quarterly break- security presented by the state’s ed- panel discussion on career devel- fast meeting, which featured a talk ucation lottery program, including opment. They enlisted the support by Chris Cromer, director of secu- cybersecurity, fraud, and ticket of four senior security industry rity and special projects for ODS theft, in addition to related chal- leaders to present the program. Security Solutions. He described lenges to disbursements to verified Another meeting featured a talk the Rape Aggression Defense lottery winners. by Joseph Clouatre on selecting (RAD), providing insight into this Members of the Greater Char- electronic security provid ers and education, and demonstrated lotte Chapter learned about work- how to negotiate with them. some techniques with a colleague. place violence and strategies for Mark Bridgeman, founding Barb Phillips, CPP, manager of campus security for RTI Interna- tional, discussed and demonstrated software that helps security officers manage permanent and temporary schedules, messages, and personnel reports. The Palm Beaches, Florida Chapter heard a talk by Com- mander Rick Morris of the Palm Beach County School Police on de- terring crime in the school system. At another meeting, Chief Bryan Kummerlen of the West Palm Beach Police Department described The State of Carabobo’s Chamber of Industry, the University of Carabobo State, and the the use of body cameras by police. Caracas, Venezuela Chapter organized the First Annual Update on Physical Security Human trafficking was the topic and Asset Protection Conference. More than 150 professionals and organizations involved when U.S. Immigrations and Cus- with the security industry attended the event. Eight educational sessions were presented, toms Enforcement Special Agent each by a different speaker, and six of the speakers were ASIS members. Heather Aemisegger visited the

34 ASIS DYNAMICS ChapterNews

Florida West Coast Chapter. At Public Schools, was the guest chief information security officer another meeting, Scott Etheridge of speaker. He outlined the history of for Pennsylvania, spoke about the the U.S. Bureau of Alcohol, Tobacco, school security and described the current threat landscape and best Firearms, and Explosives (ATF) best practices in use today. practices for protection. At another gave a talk on the ATF and its role The Fredericksburg/Quantico meeting, Ronald Reinhart, senior on the front lines of violent crime. Chapter celebrated the events of intelligence analyst from Informa- Tim Armstrong, regional sales D-Day at a recent meeting. Andy tion Network Associates, gave a manager for G4S Technology, was Normand, CPP, program manager presentation on environmental ac- the guest speaker at a Southwest at Lockheed Martin, related the tivism. He discussed tactics used by Florida Chapter meeting. He dis- history of the invasion of France activist groups to protest compa- cussed trends in technology for the in June 1944. nies and disrupt their operations. security sector. Brian McDonough, CPP, re- Currently the most active disrupt - gional emergency manager for ers in Pennsylvania are targeting Group 5 Amtrak, spoke to the South Jer- pipelines and drilling operations. sey Chapter about rail security. The New York City Chapter in- d Labonte, director of secu- The Greater Philadelphia vited Diego G. Rodriguez, assistant rity at Monumental Sports Chapter hosted its 17th Annual director in charge of the FBI’s New Eand Entertainment, gave a Law Enforcement Appreciation York Field Office, to a meeting. He talk on security for large events Night, where the group bestowed discussed public-private partner- when the National Capital Chapter 37 awards to law enforcement per- ships and how the FBI cooperates met at the Verizon Center. The sonnel. The keynote speaker for with the private sector and public chapter has also launched a new the event was U.S. Attorney Zane agencies. He encouraged attendees website at www.asis-capital.org. David Memeger of the Eastern to join InfraGard, an FBI collabora- School security was the topic for District of Pennsylvania. tion with the public sector dedi- the Richmond Chapter when Don- Cybersecurity was the topic for cated to sharing information and ald Green, CPP, director of safety the Central Pennsylvania Chapter intelligence to prevent hostile acts and security, Chesterfield County at a recent meeting. Erik Avakian, against the United States. Todd McGhee, managing part- ner of Protect the Homeland Inno- CHAPTER HIGHLIGHT vations, was the guest speaker for a meeting of the Boston Chapter. He updated the group on ISIS, its capabilities, strengths, and goals.

Groups 6-8 enoit Suire and Pierre-Phil- ippe Desmeules, both from BCBC/Radio-Canada, were the guest speakers for the Montreal Chapter. They discussed risk man- agement at radio stations, especially those in conflict zones. At another s part of a professional education meeting, Eric Buchlin of Garda- session, members of the Austin World gave a talk on explosives A Chapter toured Water Treat- and mail bombs. ment Plant 4, Austin Water’s newest The Manitoba Chapter heard a water treatment facility. Scott Stephens, talk by Sergeant Doug Lukawy of CPP, a security design specialist for the the Federal Policing and Public utility, provided an overview of utility and Engagement Unit on radicalization energy infrastructure security. The training and violent extremism. At another included vulnerability assessment and meeting, Jacqueline Bilodeau and threat countermeasures, physical security Mel Holley from the Manitoba and facility systems management, and a Om budsman gave a presentation discussion of security issues unique to on the legal issues with respect to supporting energy infrastructure. recorded video and audio.

JULY/AUGUST 2015 35 ChapterNews

Cybersecurity was the topic for the Southwestern Ontario Chap- The Hong Kong Chapter held a briefing on ter when James Phillips was the conducting a crisis management exercise for featured speaker. senior management. The speaker was Jeremy Terry Shorten, CPP, of Commis- Haworth, crisis and BCM director, Asia-Pacific, sionaires Saskatchewan, explained Europe, Middle East, and America for ANZ of threat and risk assessments at a Hong Kong. He discussed the steps to pre- meeting of the Saskatchewan pare and conduct such an exercise based on Chapter. an actual test conducted in Asia with his own The Mexico City Chapter learned executive managers. Attendees were able to about security in post-conflict Col- explore details of the exercise, as well as ombia when Colonel Julian Gonza- probe the benefits and potential pitfalls. Pic- lez Gonzalez of the Colombian Na- tured here, Chapter Chair Tyn van Amelsfoort tional Police was the guest speaker. (left) presents Haworth with an ASIS me- He related the history of crime in mento after his presentation. the country and how the police are working to improve security. fonica de Argentina, was the fea- is helping develop collaboration Richard P. Wright, CPP, director tured speaker. with the Moroccan security sector of global security for VDI, gave a and supporting the genesis of a talk on terrorism and crime in Latin Groups 9-15 new chapter in Morocco. America and the Caribbean for the The Ireland Chapter celebrated Jamaica Chapter. Another meeting embers of the France its 21st anniversary at Facebook’s featured a talk by O’Neil Hamilton, Chapter participated in European headquarters in Dublin. who is the regional coordinator for Mthe Préventica Safety and Educational programs included a the implementation of United Na- Security Conference and Exhibition talk on identity theft by David tions Security Council Resolution in Casablanca, Morocco. Sylvain Snow, head of Special Investigations 1540 in the Caribbean Community Arnold participated in an interna- Zurich; a presentation by Mike member states. tional roundtable on cybersecurity, Croll, head of field security for the Telecommunications security and Alexandre Petit gave a presen- European External Action Service; was the topic for the Buenos Aires, tation on the differences and inter- a briefing on mitigating threats to a Argentina Chapter when Carlos ests in internal security services company’s assets and brand by Jim Amaya, technical manager for Tele- and external suppliers. The chapter Coursey of Facebook; and a pres-

CHAPTER HIGHLIGHT

he San Antonio Chapter honored outstanding law enforcement officers, military personnel, and federal agents from the city and sur- rounding communities during its 25th Annual Law Enforcement Awards and Luncheon. Special Agent Antonio Leal of the Texas Depart- Tment of Public Safety was named the Distinguished Law Enforcement Officer of the Year. Sichan Siv, former U.S. ambassador to the United Nations, was the keynote speaker, and Steve Spriester of KSAT News 12 was the master of ceremonies. Other distinguished visitors included ASIS President-Elect David C. Davis, CPP; Brigadier General Robert LaBrutta, commander of Joint Base San Antonio; Chief Deputy Manuel Longoria of the Bexar County Sheriff’s Office; Bexar County District Attorney Nicolas LaHood; and San Antonio Police Chief Anthony Trevino.

36 ASIS DYNAMICS ChapterNews Letter to the Editor entation on women in security by MY NAME IS BETH WALSH and Center for Missing and Exploited Sarah O’Donnel of the Irish Secu- I work with the nonprofit, Children (NCMEC). Suk spoke rity Industry Association. ASIS Splashes of Hope (SOH), a 501(c) passionately on the NCMEC’s President Dave N. Tyson, CPP, was 3 nonprofit organization founded multifaceted approach to ensure also present at the celebration. in 1996 by artist Heather Buggée. child safety, support families and The United Kingdom Chapter The mission of SOH is to facili- victims, and to bring home the has signed an agreement with tate healing through custom-de- missing. After his presentation, London First to deepen the rela- signed, hand- Suk ex- tionships between the two groups painted pressed the and to foster greater cooperation murals for need for between them. hospital and SOH murals Kursad Sak, PSP, of KS Consult- social service at two of ing, and Mehmet Tekoz of Philip facilities. NCMEC’s Morris welcomed members of the This beauti- locations in Turkey Chapter to a meeting at the ful artwork Upstate Philip Morris facility, where atten- has trans- New York. dees toured the factory and learned formed bar- SOH met about the security practices in use. ren walls in with John Khalid El-Domiaty, vice presi- these settings Kelly of the dent of Stone Security Engineering, into uplifting Saratoga gave a talk on blast mitigation tech- environ- Center for niques and materials for the Middle ments that the Family East Chapter. Another meeting fea- support the healing process. in Saratoga Springs, New York, tured a presentation by Alanood Last year, SOH give a presenta- which is a part of the NCMEC. Alrabiah of Saudi Aramco on the tion at an ASIS International Long Using the ASIS Long Island Chap - role human resources plays in im- Island Chapter meeting. SOH ter’s donation, SOH’s Baecher, proving a company’s culture and Director of Operations Diana was able to paint murals in the security standards. Fogarty presented an over view facility’s entrance stairwell as well More than 400 security profes- of the organization and who it as in a victim examination room. sionals attended a forum hosted by serves. She explained that many The children are now greeted by the Riyadh Chapter. Kingdom of healthcare and social service facil- a friendly and colorful outdoor Saudi Arabia (KSA) Brigade Ab- ities would like such murals to scene with hot air balloons, rolling dullah Hassan Al-Zahrani gave a brighten places where children hills, and friendly animals. Addi- presentation on the vision of KSA undergo painful treatments and tionally, the staff can distract public security and future plans. endure long hospital stays. Fogarty young patients during exams and Several companies and the local spoke of how SOH collaborates medical procedures with four new media showcased the latest in se- with the staff to customize the “I Spy”-themed murals featuring curity equipment and technology. murals and also exhibited “Friend the center’s signature teddy bear. An additional two-day seminar on on the Mend” puppet packets SOH is grateful to the Long physical security planning was at- that include a “Vincent Van Island Chapter for its support tended by 25 individuals, who Monkey” hand puppet, coloring and looks forward to working were given a certificate for their book, and cray ons that are given together in the future. To learn participation in the workshop. to pediatric patients. more about the organization, or The Dubai Chapter created a Some months after the pres- to make a donation, visit www. new website to serve regional entation, the Long Island Chapter splashesofhope.org or call 631/424- members at www.asisdubai. org. chose SOH as the charity to 8230. N The Australian Capital Territory which the proceeds of its Annual Chapter welcomed Brett Han sen Golf Outing would be donated. Letters to the editor should include address, of HID Global to talk about new Buggée and Sarah Baecher, a mu- title, company affiliation, and daytime phone authentication technologies and ral artist and project manager, at- number. Letters can be e-mailed to ASIS Dy- smart cards. Attendees learned tended a chapter luncheon to namics Editor-in-Chief Ann Longmore-Ether - about developments in authentica- gratefully accept the $4,000 check. idge at [email protected]; mailed tion technology, including the use At the event Buggée and Baecher to ASIS Dynamics, 1625 Prince Street, Alexan- dria, VA 22314; or faxed to 703/ 518-1518. of smart devices for access control, met keynote speaker Ed Suk, ex- Letters may be edited for length and clarity. such as opening doors, and for ecutive director for the National short-term visitor access. N

JULY/AUGUST 2015 37