Security Program Design:

Similar documents
Security Program Design:

Security Force Management:

Training Opportunities

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

building for my Future 2013 Certification

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

Cybersecurity & Privacy Enhancements

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Agenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5

Memphis Chapter. President s Message. This annual event is designed to provide students with a

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

The Office of Infrastructure Protection

Utilities Security Council The Current May 2013

2016 SPONSORSHIP OPPORTUNITIES

Information Security Officer (ISO) Education

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

Checkpoint Learning Premier Plus CPE Package

About ASIS International

raining Meeting your training needs and CPE requirements opportunities October-December 2017 #GFOA Group-Live Course

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

IT in Healthcare Day

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

Cyber, Information Security, and Data Protection

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

SANS Vendor Offerings Detail

BRING EXPERT TRAINING TO YOUR WORKPLACE.

The Institute of Internal Auditors San Gabriel Valley Chapter

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Industrial Control Systems November 18, 2015

ACUIA Region 5 Meeting October 3-4, 2011 SEFCU, Albany, NY

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Volume 2014, Number 4. Volunteers Needed!

RISK MANAGEMENT Education and Certification

raining Meeting your training needs and CPE requirements opportunities April-June Group-Live Course Group Internet- Based Course

THE BEST & MORE OCT , 2018 / LAS VEGAS, NV / REGISTER AT

2018 CALENDAR OF ACTIVITIES

ACAMS (Association of Certified AML Specialist)

raining Meeting your training needs and CPE requirements opportunities January-March Group-Live Course Group Internet- Based Course

C2013 r.theiia.org/goto/m Visit www to register or for more information.

Jim Brenton Regional Security Coordinator ERCOT Electric Reliability Council of Texas

Cybersecurity Overview

Sage Data Security Services Directory

2016 LEARNING SYSTEM FOR CSCP CERTIFICATION EXAM PREPARATION. learncscp.com

to Enhance Your Cyber Security Needs

NERC COMPLIANCE FUNDAMENTALS

Accelerate Your Enterprise Private Cloud Initiative

SUBSTATION PERMITTING & SITING

The New Standard for IR Professionals

TCJIUG Texas Criminal Justice Information Users' Group PO Box Austin, TX 78768

BHConsulting. Your trusted cybersecurity partner

INFORMATION SECURITY OFFICER (ISO) EDUCATION Securing Your Bank s Future. May 17, 2017 TBA Barrett Training Center Nashville, Tenn.

ISACA Enterprise. Solutions and Resources

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Les joies et les peines de la transformation numérique

raining Meeting your training needs and CPE requirements opportunities January-March Check out just added webinars Group-Live Course

EXHIBITOR & SPONSORSHIP PROSPECTUS

raining Meeting your training needs and CPE requirements opportunities January-March Group-Live Course Group Internet- Based Course

AFC Compliance Careers

Welcome to the webinar! We will start within a few minutes

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

PIPELINE SECURITY An Overview of TSA Programs

Why you should adopt the NIST Cybersecurity Framework

The Office of Infrastructure Protection

BHConsulting. Your trusted cybersecurity partner

Checkpoint Learning Premier CPE package

Hearing Voices: The Cybersecurity Pro s View of the Profession

OPERATIONS CONTROL CENTER

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

INFORMATION TECHNOLOGY AUDIT &

2018 National Homeland Security Conference Preliminary Conference Agenda

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

NC SWANA Managers Training Center

Candidate Profile for the Position of Vice President, Education and Certification

Marketing Opportunities

Featuring California-Specific SWANA MOLO Training In Today s World, You Can t Afford NOT To Be Trained & Certified

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Drive Your Career Forward IIA Certifications and Qualifications

1 st Annual Meeting for Abacus Latin America Members

Risk Advisory Academy Training Brochure

Department of Homeland Security Updates

ARRA State & Local Energy Assurance Planning & Implementation

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Emergency Management Program Letters of Recognition

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

Cybersecurity Training

Cyber and Physical Security: An Integrated Approach Tim Rigg Managing Director, Enterprise Protective Services

CFE Exam Review Course

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Welcome October, 2013 INSIDE THIS ISSUE. Jesse A. Hanford Greater Cincinnati ISACA President

38th Annual Columbus Chapter Annual Seminar and Exhibits

Checkpoint Learning Premier Plus CPE package

Transcription:

Security Program Design: A Critical Infrastructure Protection Model July 16 17, 2014 Earn up to 16 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N

Are you confident in your ability to create an integrated, end-to-end security program? Can you confidently answer these questions? What standards, models, and resources do utilities utilize to design programs to protect critical infrastructure? How do law enforcement and the intelligence community factor into a security plan? How are different security solutions aligned with varying complexities of security problems while maintaining an integrated security focus? How is security risk management applied as the first step in creating an integrated security program? How are metrics used to build on security program success? What are the steps in building an integrated command center? Join us in Long Beach, California, and get the answers! This program provides protection planning information using practical, real life examples from the diverse and complex utilities, critical infrastructure protection domain. A broad array of security solutions with sound protection philosophy is applied culminating in a fully integrated, end-to-end security program that any industry can apply in part or in whole. Learn how utilities security professionals are adapting to the new reality of integrated security management. Come away with valuable resources to assist you in your own security Sponsored by program planning. the ASIS Utilities Security Council and the Critical Infrastructure Working Group RETURN ON YOUR INVESTMENT Expand your knowledge of security program development and application. Learn how to integrate complex and diverse security solutions into a cohesive, functioning security program. Benefit from the expertise of experienced professionals who have not only developed security plans and programs for many of North America s largest utilities in order to protect critical infrastructure, but have also worked with governments, regulatory bodies, and law enforcement to develop fully integrated and comprehensive security solutions, compliance programs, and security frameworks. PROFESSIONALLY DEVELOPED FOR Physical and cyber security managers and directors Risk managers Specialists/managers/directors of critical infrastructure security programs Homeland security specialists and managers Business continuity planners Facility and infrastructure managers Emergency management professionals Professionals preparing to take the CPP or PSP exams Register by May 17 for earlybird rates!

PROGRAM OVERVIEW Security Program Development and Effective Risk Management Review risk management standards and risk assessment tools. Review how vulnerability assessments can be used to identify threats for enhanced risk management. Learn to plot risk for enterprise risk management alignment; determine your risk tolerance; and learn how to use risk mitigation in security planning. Security Command Centers All segments of a command center will be addressed, from selecting, staffing, and equipping to business case support and critical functions. Security Technology Application A fully integrated security program model is necessary in today s security management plan and for future-proofing your security program. Evaluate the capabilities of common physical and Security Governance cyber security technologies; then learn to Often misunderstood and left unapplied, measure system effectiveness. Learn how a good governance structure is necessary information technology management and to effective security management. operational technology management link Security governance, risk, and to the overall technology applied to the compliance management are linked as security program. an important triad in the security model. Protection Principles Examine the protection principles used within our security programs. Review in depth defense, deterrence, detection, delay, and response concepts. Critical asset identification, adversary path applications, worst case scenario planning, response exercises, and the relationship between business continuity, disaster recovery, and safety are covered. Security Program Metrics Review who uses metrics, how to select the best ones for your program, and why they are important especially in promoting your department. Discuss the contribution of security incident management to metrics and learn how useful audits can be using metrics as a baseline. Standards and Guidelines Examine the difference and learn why we need both. See how they can be used in the assessment process. Sample security standards will be reviewed. A call for involvement will be presented as well. Program Design: Complex Security Problems, the Utilities View Bring it all together for dams and powerhouses, nuclear plants, reservoirs, pipelines, and transmission lines. Acts of terrorism, building response programs, and working with outside agencies will also be included. NETWORKING Use this exciting opportunity to collaborate with other security practitioners from diverse industries. Hear from seasoned security professionals. Program content updates will be posted at www.asisonline.org.

FAST FACTS Registration Hours Tuesday 5:00 6:00 pm Wednesday 7:00 8:00 am Program Hours Wednesday-Thursday 8:00 am 5:15 pm Registration Fees Registration fees include a networking reception, daily refreshment breaks and continental breakfast. Hotel costs are not included. Early-bird 5/17/14 After 5/17/14 Member $ 825 $ 925 Nonmember $1,125 $1,225 Program Chair Anthony Hurley Vice President of Operations Investor Owned Utility Instructors Darren Nielsen, CPP, PCI, PSP, CISA Senior Compliance Auditor, Cyber and Physical Security Western Electricity Coordinating Council Doug Powel, CPP, PSP Manager, SMI Security, Privacy & Safety BC Hydro & Power Authority Anthony Hurley Vice President of Operations Investor Owned Utility Updates will be posted online Hotel Be sure to mention ASIS when requesting the special room rate of $149 single/double (plus tax). It will be honored until the room block is full or June 20. Hilton Long Beach 701 West Ocean Blvd. 90831 +1.800.Hiltons +1.562.983.3400. Team Discounts 10% off when three to five attendees register from the same organization; 15% for six or more. For details, email asis@asisonline.org. HOW TO REGISTER Web www.asisonline.org/calendar Phone +1.703.519.6200

Upcoming Programs APRIL JULY 1-3 14-15 Executive Protection 7-8 13th European Security Conference & Exhibition The Hague, The Netherlands Enhanced Violence Assessment and Management Denver, CO 9-10 Active Shooter Denver, CO 16 Managing Contractors On-site MAY 5-6 7th Annual CSO Roundtable Summit: Business in the Americas Miami, FL 5-6 Security Practices in a High Rise Environment Chicago, IL 5-8 ASIS Assets Protection CourseTM: Practical Applications (APC II) Charleston, SC 8-9 CPP and PSP Classroom Reviews Westminster, CO 21 Case Study of a Transnational Threat: Lashkar-E-Taiba JUNE 2-5 ASIS Assets Protection CourseTM: Functional Management (APC III) New Orleans, LA 3-6 Effective Management for Security Professionals Executive Education Madrid, Spain Security Force Management New Orleans, LA 9-10 9-11 Facility Security Design New Orleans, LA 11 How to Protect a Company s Perimeter 14-17 Managing Your Physical Security Program and Advanced Topics 16 Twelve Symptoms of a School with Problems 16-17 Security Program Design: A Critical Infrastructure Protection Model AUGUST 20 Critical Infrastructure Protection from a Private Security Perspective SEPTEMBER 27-28 CPP, PCI, PSP Classroom Reviews Atlanta, GA 27-28 CPP, PCI, PSP Classroom Reviews Atlanta, GA 29-Oct 2 60th Annual Seminar & Exhibits Atlanta, GA Join 20,000+ professionals at the world s most influential security event. 30-Oct 2 Education Sessions Sponsored by ASIS Gaming and Waging Protection Council for Global gaming Expo Las Vegas, NV About ASIS International ASIS International (ASIS) is the preeminent organization for security professionals, with more than 38,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests, such as the ASIS Annual Seminar and Exhibits, as well as specific security topics. ASIS also advocates the role and value of the security management profession to business, the media, government entities, and the public. By providing members and the security community with access to a full range of programs and services, and by publishing the industry s number one magazine Security Management ASIS leads the way for advanced and improved security performance.

Security Program Design: A Critical Infrastructure Protection Model July 16 17, 2014 ASIS Delivers Distinctive Security Education Save $100! Register by May 17. Leading security practitioners, who face the same challenges you face, develop and deliver distinctive ASIS programs. They address real-world security issues through personal experiences and by applying theories, proven and tested, by leading security professionals. Your colleagues highly rate ASIS programs for providing best practices and the newest strategies for mitigating ever-changing security threats today s implementation for tomorrow s security. For more information, visit www.asisonline.org. 1625 Prince Street Alexandria, VA 22314-2818 USA Non-Profit US Postage PAID ASIS