Security Program Design:

Similar documents
Security Program Design:

Security Force Management:

Utilities Security Council The Current May 2013

Training Opportunities

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

Cybersecurity & Privacy Enhancements

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Checkpoint Learning Premier Plus CPE Package

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Cyber, Information Security, and Data Protection

The Office of Infrastructure Protection

raining Meeting your training needs and CPE requirements opportunities October-December 2017 #GFOA Group-Live Course

Information Security Officer (ISO) Education

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

Agenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5

building for my Future 2013 Certification

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

C2013 r.theiia.org/goto/m Visit www to register or for more information.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

2016 SPONSORSHIP OPPORTUNITIES

Department of Homeland Security Updates

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course

Volume 2014, Number 4. Volunteers Needed!

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Marketing Opportunities

Business Continuity An Integral Part of Risk Management At Constellation Energy

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

BHConsulting. Your trusted cybersecurity partner

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course

Why you should adopt the NIST Cybersecurity Framework

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

raining Meeting your training needs and CPE requirements opportunities January-March Group-Live Course Group Internet- Based Course

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

RISK MANAGEMENT Education and Certification

BHConsulting. Your trusted cybersecurity partner

Saskatoon Business College Corporate Training Centre (306)

The Institute of Internal Auditors San Gabriel Valley Chapter

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

ACUIA Region 5 Meeting October 3-4, 2011 SEFCU, Albany, NY

2018 CALENDAR OF ACTIVITIES

NC SWANA Managers Training Center

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn.

ISACA Enterprise. Solutions and Resources

IT in Healthcare Day

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Risk Advisory Academy Training Brochure

Checkpoint Learning Premier CPE package

CISA Training.

5 th IRF Latin America Regional Congress

Corporate Security & Emergency Management Summary of Submitted 2015 Budget From Rates

Accelerate Your Enterprise Private Cloud Initiative

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com

Partnership Information

TEL2813/IS2820 Security Management

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Information Technology

HCISPP HealthCare Information Security and Privacy Practitioner

Topics Include: #ITROADMAP. August Oak Brook, IL The Hyatt Lodge at McDonald s Campus

About ASIS International

Application for Certification

300 Riverview Plaza Odysseus Marcopolus, Chief Operating Officer Trenton, NJ POLICY NO: SUPERSEDES: N/A VERSION: 1.0

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

2018 National Homeland Security Conference Preliminary Conference Agenda

The Office of Infrastructure Protection

raining Meeting your training needs and CPE requirements opportunities January-March Check out just added webinars Group-Live Course

EXHIBITOR & SPONSORSHIP PROSPECTUS

2016 BOMI International. Revised: June C A N A D A WELCOME TO OUR: CERTIFICATE PROGRAMS

Storage Networking Industry Association Michael Oros Executive Director. Learn more:

to Enhance Your Cyber Security Needs

2017 PORT SECURITY SEMINAR & EXPO. ISACA/CISM Information Security Management Training for Security Directors/Managers

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Certified Cyber Security Specialist

Checkpoint Learning Premier Plus CPE package

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

PROTECT International Exhibition and Conference on Security & Safety. March 12 13, 2018 at New World Makati Hotel, Manila, Philippines

EU General Data Protection Regulation (GDPR) Achieving compliance

ACAMS (Association of Certified AML Specialist)

The National Organization of Black Law Enforcement Executives (NOBLE) A NOBLE Focus on Collaboration and Unity. & Tomorrow

ISACA MANILA CHAPTER CALENDAR OF ACTIVITIES

The National Organization of Black Law Enforcement Executives (NOBLE) & Tomorrow

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

Hearing Voices: The Cybersecurity Pro s View of the Profession

Securing Your Digital Transformation

2018 CLTD LEARNING SYSTEM

Sage Data Security Services Directory

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

CFE Exam Review Course

Transcription:

Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs

Are you confident in your ability to create an integrated, end-to-end security program? Can you confidently answer these questions? What standards, models, and resources do utilities utilize to design programs to protect critical infrastructure? How do law enforcement and the intelligence community factor into a security plan? How are different security solutions aligned with varying complexities of security problems while maintaining an integrated security focus? How is security risk management applied as the first step in creating an integrated security program? How are metrics used to build on security program success? What are the steps in building an integrated command center? Join us in Toronto, Canada to get the answers! This program provides protection planning information using practical, real life examples from the diverse and complex utilities, critical infrastructure protection domain. A broad array of security solutions with sound protection philosophy is applied culminating in a fully integrated, end-to-end security program that any industry can apply in part or in whole. Learn how utilities security professionals are adapting to the new reality of integrated security management. Come away with valuable resources to assist you in your own security program planning. Sponsored by the ASIS Utilities Security Council and the Critical Infrastructure Working Group YOUR RETURN ON INVESTMENT Expand your knowledge of security program development and application. Learn how to integrate complex and diverse security solutions into a cohesive, functioning security program. Benefit from the expertise of experienced professionals who have not only developed security plans and programs for many of North America s largest utilities in order to protect critical infrastructure, but have also worked with governments, regulatory bodies, and law enforcement to develop fully integrated and comprehensive security solutions, compliance programs, and security frameworks. PROFESSIONALLY DEVELOPED FOR Physical and cyber security managers and directors Risk managers Specialists/managers/directors of critical infrastructure security programs Homeland security specialists and managers Business continuity planners Facility and infrastructure managers Emergency management professionals Professionals preparing to take the CPP or PSP exams

PROGRAM OVERVIEW Security Program Development and Effective Risk Management Review risk management standards and risk assessment tools. Review how vulnerability assessments can be used to identify threats for enhanced risk management. Learn to plot risk for enterprise risk management alignment; determine your risk tolerance; and learn how to use risk mitigation in security planning. Protection Principles Examine the protection principles used within our security programs. Review defense in depth, deterrence, detection, delay, and response concepts. Critical asset identification, adversary path applications, worst case scenario planning, response exercises, and the relationship between business continuity, disaster recovery, and safety are covered. Security Program Metrics Review who uses metrics, how to select the best metric for your program, and why they are important especially in promoting your department. Discuss the contribution of security incident management to metrics and learn how useful audits can be using metrics as a baseline. Security Command Centers All segments of a command center will be addressed, from selecting, staffing, and equipping to business case support and critical functions. An Industry-based Starting Point: Security Manager s Handbook Learn the value of an industry handbook, first steps in creating one, and how to use it to your best advantage. Receive a copy of the ASIS International Utilities Security Council s handbook. Program Design: Complex Security Problems, the Utilities View Bring it all together for dams and powerhouses, nuclear plants, reservoirs, pipelines, and transmission lines. Acts of terrorism, building response programs, and working with outside agencies will also be included. NEW FOR 2013 Collaborate with security practitioners from diverse industries and dialogue with experienced and award winning security professionals when attendees of this program join attendees of Managing Your Physical Security Program and Advanced Topics sponsored by the Physical Security Council and collocated in Toronto for a one-hour, joint session. Program content updates will be posted at www.asisonline.org. Security Technology Application Evaluate the capabilities of common physical and cyber security technologies; then learn to measure system effectiveness. Register by May 17 for early bird rates! Standards and Guidelines Examine the difference and learn why we need both. See how they can be used in the assessment process. Sample security standards will be reviewed. A call for involvement will be presented as well.

Fast Facts Registration Hours Tuesday 5:00-6:00 pm Wednesday 7:00-8:00 am Program Hours Wednesday-Thursday 8:00 am-5:15 pm Registration Fees Registration fees include a networking reception, daily refreshment breaks and continental breakfast. Hotel costs are not included. Early Bird 5/17/13 After 5/17/13 Member $ 825 $ 925 Nonmember $1,125 $1,225 Program Chair Doug Powell, CPP, PSP Manager, SMI Security, Privacy & Safety BC Hydro & Power Authority Instructors Darren Nielsen, CPP, PCI, PSP, CISA Senior Compliance Auditor, Cyber Security Western Electric Coordinating Council Anthony Hurley Security Industry Professional Investor Owned Utility Sarah Bynum, CPP, CISSP Director of Corporate Security Siemens Energy, Inc. Updates will be posted online. Hotel Information Be sure to mention ASIS when requesting the special room rate of $179 single/double (plus tax). This price will be honored until June 20 or until the room block is full. Hyatt Regency Toronto 370 King Street Box 137 Toronto, ON M5V 1J9 Canada +1.416.343.1234 +1.877.806.0006 Team Discounts 10% off when three to five attendees register from the same organization; 15% for six or more. For details, email asis@asisonline.org. How to Register Web www.asisonline.org/calendar Phone +1.703.519.6200 A downloadable registration form is available from member services Programming, schedule, locations, and pricing are subject to change.

Relevant Standards and Guidelines Security Management Standard: Physical Asset Protection (2012) Organizational Resilience (2009) Business Continuity (2010) Workplace Violence Prevention and Intervention (2011) Risk Assessment Guideline (2003 Note: ASIS members are entitled to one free download of all Standards and Guidelines Relevant Pre-recorded s Measuring Security Risk: Part of the Management Process Good to Great: Building High Performance Security Programs Putting Your Program to the Test Upcoming Events MAY JULY 6-7 CPP and PSP Reviews New York, NY USA 8-9 23rd New York City Security Conference and Expo New York, NY USA 13-16 ASIS Assets Protection Course TM Practical Applications Tucson, AZ 15 Workplace Violence Within the Healthcare Industry 15-16 Executive Protection Toronto, ON Canada 15-18 Managing Your Physical Security Program and Advanced Topics Toronto, ON Canada 17 Recognizing and Assessing Suspicious Indicators AUGUST JUNE 3-4 Security Force Management Indianapolis, IN 3-5 Facility Security Design Indianapolis, IN 4-7 Effective Management for Security Professionals Madrid, Spain 10-13 ASIS Assets Protection Course TM Functional Management Chicago, IL 19 Social Media and Cloud Computing Threats to Privacy, Security and Liberty 21 Effects-based Security: Optimize Manpower and Budget About ASIS International ASIS International (ASIS) is the preeminent organization for security professionals, with more than 38,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests, such as the ASIS Annual Seminar and Exhibits, as well as specific security topics. ASIS also advocates the role and value of the security management profession to business, the media, government entities, and the public. By providing members and the security community with access to a full range of programs and services, and by publishing the industry s number one magazine Security Management ASIS leads the way for advanced and improved security performance.

Security Program Design A Critical Infrastructure Protection Model July 17-18, 2013 Toronto, Ontario CAN ASIS Delivers Distinctive Security Education Leading security practitioners, who face the same challenges you face, develop and deliver distinctive ASIS programs. They address real-world security issues through personal experiences and by applying theories, proven and tested by leading security professionals. Your colleagues highly rate ASIS programs for providing best practices and the newest strategies for mitigating ever-changing security threats today s implementation for tomorrow s security. For more information, visit www.asisonline.org Save $100! Register by May 17. 1625 Prince Street Alexandria, VA 22314-2818 USA Non-Profit US Postage PAID ASIS