Open Source Intelligence (OSINT) for Defence and Security Investigation, Malaysia

Overview

This 2-day Open Source Intelligence (OSINT) for Defence and Security Masterclass provides delegates a strategic understanding on how to employ OSINT research techniques securely and efficiently. Day 1 of the Maserclass teaches delegates how to understand the language of their source would use and how to formulate that into a collection plan. It also introduces tools and techniques to enhance delegates’ research skills.

On day 2, delegates will learn verification of a course, how to use foreign sites and languages when conducting research and most importantly how to remain safe and secure whilst conducting research.  The Masterclass will include practical sessions throughout to reinforce the objectives taught.

What you will learn from this Masterclass:

  • IMPLEMENT a streamlined approach when conducting OSINT to ensure the outputs address the specific needs of the intended audience.
  • MASTER the use of Google dorking to refine your searches.
  • LEARN geolocation and verification methods.
  • MAKE the most of open source information research tools to locate, filter, and collect information and data more efficiently and effectively;
  • ADOPT a safe, secure and anonymous techniques when conducting research.
Who will attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Security Researchers
  • Counter Intelligence Investigators
Trainer

Expert Trainer completed 23 years in the British Army Intelligence Corps working in various fields including Counter Intelligence, Technical Investigations, Information Assurance, HUMINT IMINT and Cyber Security.

He developed an OSINT course to train other investigators and intelligence analysts in researching using the internet and doing it safely and anonymously.  Expert Trainer   has worked in mainland Europe, the Middle East and West Africa and currently teaches OSINT techniques to military staff across the 27 NATO nations and defence industry partners.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Open Source Intelligence (OSINT) for Defence and Security Investigation, Singapore

Overview

This 2-day Open Source Intelligence (OSINT) for Defence and Security Masterclass provides delegates a strategic understanding on how to employ OSINT research techniques securely and efficiently. Day 1 of the Maserclass teaches delegates how to understand the language of their source would use and how to formulate that into a collection plan. It also introduces tools and techniques to enhance delegates’ research skills.

On day 2, delegates will learn verification of a course, how to use foreign sites and languages when conducting research and most importantly how to remain safe and secure whilst conducting research.  The Masterclass will include practical sessions throughout to reinforce the objectives taught.

What you will learn from this Masterclass:

  • IMPLEMENT a streamlined approach when conducting OSINT to ensure the outputs address the specific needs of the intended audience.
  • MASTER the use of Google dorking to refine your searches.
  • LEARN geolocation and verification methods.
  • MAKE the most of open source information research tools to locate, filter, and collect information and data more efficiently and effectively;
  • ADOPT a safe, secure and anonymous techniques when conducting research.
Who will attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Security Researchers
  • Counter Intelligence Investigators
Trainer

Expert Trainer completed 23 years in the British Army Intelligence Corps working in various fields including Counter Intelligence, Technical Investigations, Information Assurance, HUMINT IMINT and Cyber Security.

He developed an OSINT course to train other investigators and intelligence analysts in researching using the internet and doing it safely and anonymously.  Expert Trainer   has worked in mainland Europe, the Middle East and West Africa and currently teaches OSINT techniques to military staff across the 27 NATO nations and defence industry partners.

Case Studies
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Active Shooter/ Assailant(s) Preparedness & Response

Overview

Active Assailant(s) Preparedness and Response Masterclass provides delegates a strategic understanding of how to gather information and rapidly deploy necessary actions in response to terrorism in today’s environment be it in the workplace, or crowded areas. Delegates will learn the practical steps to take in the event of a critical incident including dynamic lockdown and how to respond effectively in a critical incident such as active assailant attack.

This masterclass empowers leadership skills in the event of a crisis including the importance of preparedness, managing the aftermath and embedding continuous improvement into the crisis management framework. In addition, delegates will have the opportunity to explore a new vulnerability assessment tool that has been developed with consideration to the latest emerging trends in Terrorism.

What you will learn from this Masterclass:

  • ASSESS current threat environment and EXAMINE its impacts on an organisation risk profile.
  • HEIGHTEN security of an agency/ organisation in a threat environment.
  • ESTABLISH the practical steps to be adopted in the event of an attack.
  • EMPOWER leadership in a crisis from preparedness to response.
  • DEVELOP a response plan that effectively respond to critical incidents.
  • EDUCATE employees with all the necessary steps to be taken in the event of an emergency response.
Who will attend
  • Organisational Management at any level that is responsible for people, property and/or business continuity. Both management in the area of security/ risk management and operational management.

    • Business Continuity Managers
    • Corporate Security Managers
    • Crisis Response Managers
    • Facilities Management Managers
    • Government Ministries
    • Security Consultants
    • State Security Agencies
    • Strategic Planner & Managers
    • Strategic Risk Managers
Trainer

With 33 year’s experience with the NSW Police Force, Expert Trainer has recently been appointed Head of Security, Rugby League World Cup 2017, as well as other notable appointments including Lead Security and Risk Consultant, Vivid Sydney 2016 Event.

Expert Trainer has consulted major organisations in the area of Risk Management, Threat Environment and Counter Terrorism training.

Expert Trainer has partnered with Deloitte in the areas of Risk management, Recovery and Resilience and provided counter terrorism response training (Responding to Workplace Emergencies) to Prime Group, Red Dawn, Village Roadshow and ANZAC War Memorial.

Expert Trainer was the key NSWPF contact for The Department of Premier and Cabinet (Protocol and Special Events Division) and Destination NSW. This included responsibility for activation of the Police Operations Centre/Government Coordination Centre in the event of a major incident or emergency.

Expert Trainer has represented the NSW Police Force at many international events including the Australian Government Observers program Qatar Asian Cup 2011, observer to NYPD security operations in support of United Nations General events in New York and major event security planning with other Federal Agencies in Washington.

Case Studies

HIGH IMPACT LEARNING - Class Exercise 1

Emergency/ Crisis Management Scenario

HIGH IMPACT LEARNING - Class Exercise 2

Active Shooter Scenario

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Managing Internet of Things (IoT) Security Risks

Managing Internet of Things (IoT)
Overview

This 2-day Managing Internet of Things (IoT) Security Risks Masterclass provides delegates a strategic understanding on the new threats and paradigms emerging from IoT while guiding on the right approaches in handling such threats. Due to the nature of IoT and its ubiquity, security needs to be addressed in a fundamentally different way; the devices are no longer important, but their data is. Based on the zero-trust networking, assume breach and cattle-vs-pets paradigms, this Masterclass will help delegates look at IoT security in a whole different way. 

What you will learn from this Masterclass:

  • Recognise the new threats IoT pose for an enterprise
  • Identify the threats and limitations at the technical level
  • Integrate IoT security in your existing security management
  • Determine proper responses to IoT threats
  • Refocus your security efforts to stay in control
Who will attend
  • Corporate Business Continuity
  • Corporate Infrastructure
  • Information Security 

  • Information Security and Risk

  • Network administrators
  • Network Architecture
  • Network Security Systems
  • Network Services

  • Payment and Fraud
Security
  • Payment Systems & Risk
Group
  • Security Programme
  • Security
Information Security Policy
  • System Administration
Trainer

Armed with more than 30 years of experience in this industry, Expert Trainer is an independent security consultant. Expert Trainerhas been involved in many large-scale projects including mobile security, banking security, industrial automation, covering technical and non-technical aspects.

Expert Trainer started as a technical security tester and has delivered courses on mobile security in Abu Dhabi, Kuala Lumpur, Singapore and Capetown. He has international experience in most European countries, the Caribbean, Asia and the Middle East.

Expert Trainer has consulted a large number industries ranging from ministries of Dutch government, utilities companies, banking sectors, Europol, payment providers, and Dutch Telecom operators.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Designing Security for New and Existing Buildings

Designing Security for New and Existing Buildings
Overview

This two-day in-depth and hands-on Masterclass will provide attendees with practical knowledge of how security risks that business assets and operations face can be understood in the context of designing out areas of risk.  The Masterclass will provide practical examples for designing physical and technical mitigation measures to protect defined assets.

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

What you will learn from this Masterclass:

  • Gain insights into the concepts in Security Risk Management within the context of securing the built environment.
  • Understand the functions of Physical Security.
  • Learn how to plan and conduct Physical Security Assessments.
  • Master the Design Principles and Practices.
  • Strengthen your organisation’s Physical Security and Protection Strategies.
Who will attend

The Masterclass is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

 

 

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers.  Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a highly skilled engineer and security design specialist who demonstrates strong customer focus combined with a proven commitment to the achievement of targets and business objectives. He applies excellent analytical skills, problem solving abilities, people management, communication and negotiation skills to achieve the strategic aims while delivering cost efficiency and added value. A confident member of multidisciplinary teams, he has provided engineering strategic consultancy in the construction sector in Europe and the Middle East across a range of sectors. His designs incorporate advanced and intuitive technologies, which integrate with the business operation and provide flexibility to adapt to the changing threat environment.

Trainer 2 specialises in technologies to support the protection of crowded spaces, such as sports venues, universities, hotels and shopping complexes. This has included development of a software program to optimise people flow through security gates for the construction phase of the 2012 Olympic Stadium, reducing procurement costs from £16M to £10M. 

Case Studies

One-to-one Consultation:

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Combating Multi – Assault and Counter Terrorism Action Capabilities (MACTAC)

Combating Multi-Assault
Overview

This Masterclass is designed to give the professional practitioner whether from Law Enforcement, Private Security, Corporate Security and Venue security an understanding of this threat through case studies. The second part of the program draws on Israeli and Global best practices such as the US MACTAC (Multiple Assault Counter Terror Action Capability) to set up a security system that will help defend against such lethal attacks, and help you prepare personnel to deal with this threat. The third part of the program goes into some of the leading tactics for confronting the threat and what people encountering such as a threat can do to save themselves.

What you will learn from this Masterclass:

  • Assess the threat levels in Singapore with emphasis on current conditions.
  • Set up a security system that will help defend against such lethal attacks.
  • Identify the differences between security for deterrence only and security for safety.
  • Determine and Develop the security planning phase and its elements of a security plan.
  • Execute the right Emergency Response Planning for specific threats.
  • Gain insights into case studies of recent and historic attacks throughout the world.
Who will attend

Counterterrorism/Law Enforcement, Risk Managers, Security Managers, Counterterrorism Policy Makers, Venue and Facilities Professional Practitioners

From the following sectors:

  • Aviation
  • Banking and finance
  • Embassies of foreign governments
  • Government agencies
  • Healthcare
  • Maritime and shipping
  • Oil and gas infrastructure
  • Plant and public utilities
  • Power station
  • Production
  • Security and defence
  • Tourism and hospitality
  • Transportation
  • City planners
  • Insurance brokers
  • City sanitation management
  • Event planners

 

 

 

Trainer

From China to Singapore; from Algeria to Nigeria, in Europe, Israel and South/Central America, Trainer has trained and provided products to more than 3000 agencies in Homeland Security, Emergency Management, Emergency Medicine, and specialised equipment training for the world’s premiere manufacturers.

Trainer is the publisher of the Counter Terrorist Magazine, distributed in the US, Europe and Asia, in its 9th year, and the organiser of the Homeland Security Professionals Conference in Orlando, celebrating its 12 year anniversary. Trainer was the very first editor of the premiere edition of the Counter Terrorist Magazine – now in its 9th year of publication and is the publisher as President of SSI.

Trainer is a widely published author on security-related subjects: IACSP Counter-Terror magazine, The Journal, Fire Chief, Law Enforcement Technology, Law Enforcement Executive Journal, Frontline First Responder, Executive Flyer, The Forum and many others.

Trainer has also provided commentary for ABC Radio, National Public Radio and has appeared on numerous newscasts commenting on security issues for NBC, CBS and ABC. He co-authored the seminal text on Suicide Terror: Understanding and confronting the threat and published by John Wiley. The book was praised by Israel’s current prime minister, Benjamin Nethanyahu.

In November of 2010, backed by private investors, Trainer created the Homeland Security Network www.homelandsecuritynet.com as a portal and social media for bona fide members of Homeland Security each of which is vetted by hand.

Case Studies

HIGH IMPACT LEARNING - Case Study 1

Omar Mateen and the Pulse night club shooting of June 12th 2016 based on a personal debriefing received from Police Chief Mina of Orlando PD. The Second deadliest attack in US History killing 49 and wounding more than 58 others.

HIGH IMPACT LEARNING - Case Study 2

The Westlake Mall attack - On Saturday 21 September 2013, unidentified gunmen attacked Westgate shopping mall, an upscale mall in Nairobi, Kenya. The attack resulted in at least 67 deaths, and more than 175 people were wounded.

HIGH IMPACT LEARNING - Case Study 3

The Paris attack(s) of November 13th 2015 is one of the deadliest ever incidents of terror. At least 130 people were killed, hundreds were injured by 7 attackers using a combination of bombs and gunfire. France and Paris have never really recovered from these and ensuing attacks have made it worse. Right now, France has suspended civil liberties and imposed martial law lasting until 2017.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Designing Security for New and Existing Buildings

Designing Security for New and Existing Buildings
Overview

This two-day in-depth and hands-on Masterclass will provide attendees with practical knowledge of how security risks that business assets and operations face can be understood in the context of designing out areas of risk.  The Masterclass will provide practical examples for designing physical and technical mitigation measures to protect defined assets.

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

What you will learn from this Masterclass:

  • Gain insights into the concepts in Security Risk Management within the context of securing the built environment.
  • Understand the functions of Physical Security.
  • Learn how to plan and conduct Physical Security Assessments.
  • Master the Design Principles and Practices.
  • Strengthen your organisation’s Physical Security and Protection Strategies.
Who will attend

The Masterclass is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

 

 

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers.  Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a highly skilled engineer and security design specialist who demonstrates strong customer focus combined with a proven commitment to the achievement of targets and business objectives. He applies excellent analytical skills, problem solving abilities, people management, communication and negotiation skills to achieve the strategic aims while delivering cost efficiency and added value. A confident member of multidisciplinary teams, he has provided engineering strategic consultancy in the construction sector in Europe and the Middle East across a range of sectors. His designs incorporate advanced and intuitive technologies, which integrate with the business operation and provide flexibility to adapt to the changing threat environment.

Trainer 2 specialises in technologies to support the protection of crowded spaces, such as sports venues, universities, hotels and shopping complexes. This has included development of a software program to optimise people flow through security gates for the construction phase of the 2012 Olympic Stadium, reducing procurement costs from £16M to £10M. 

Case Studies

One-to-one Consultation:

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Pre-Attack Flags and Indicators of Jihadist Extremism

Pre-Attack Flags and Indicators
Overview

“Pre-Attack Flags and Indicators and the Future of Jihadist Extremism” is specifically developed to provide delegates a strategic understanding of Jihadist Extremism. Delegates will first learn about the history and evolution of Jihadist activities and the buildout of ISIS from 2003 to present. Delegates will also analyse the relevant actors in the current Jihadist Movement.

On day 2, delegates will also gain an insight of Jihadist ideology/mindset where they will examine the 10 indicators of Jihad (Pre-Attack). Most importantly, delegates will identify and execute the appropriate counter-terrorism strategies/ approach while anticipating the future of Jihad in Southeast Asia.

What you will learn from this workshop:

  • Comprehensive understanding of the pre-attack indicators of terrorism.

  • History of Jihad and its evolution into modern society.

  • Mechanics and nuances of the Jihadist ideology and mindset.

  • History of ISIS and its anticipated future state.

  • ISIS foreign fighter flow as it relates to Asia.

Who will attend

Counterterrorism/Law Enforcement, Risk Managers, Security Managers, Counterterrorism Policy Makers.

Trainer

A former informant and now expert with experience in radicalisation, deradicalisation, countering violent extremism (CVE), National security and Counter-terrorism. Course Trainer was born and raised in Canada, growing up with two conflicting and competing cultures. At the age of 19, he went to India and Pakistan where he had a chance encounter with the Taliban before their takeover of Afghanistan in 1995.  Course Trainer became fully radicalised as a supporter of the global Jihadist culture, recruiting others but the 9/11 attacks forced to him reconsider his views. He spent 2 years in Syria, continuing his study of Arabic and Islamic Studies and went through a period of full deradicalisation.

Returning to Canada in 2004, he was recruited by the Canadian Security Intelligence Service (CSIS) and worked several CLASSIFIED infiltration operations on the internet, in chat-protected forums and on the ground with human networks.  In late 2005, one of those intelligence files moved to the Royal Canadian Mounted Police (RCMP), Integrated National Security Enforcement Team (INSET) for investigation. The "Toronto 18" terrorism case resulted in the conviction of 11 aspiring violent extremists after testifying over 4 years, in 5 legal hearings at the Ontario Superior Court of Justice.

Course Trainer has since obtained a Master of Policing, Intelligence and Counter Terrorism (MPICT). He is now an external SME (Subject Matter Expert) on national security and counterterrorism to the Command Staff of CENTCOM, the United Nations Security Council & Counter Terrorism Executive Directorate and trains police, intelligence and special operations forces on relevant topics. He has appeared on multiple U.S., British and Canadian media outlets (CNN, CBC, ABC and NBC) as a commentator and is extensively involved with the ISIS social media and Foreign Fighter file, including Returnees and rehabilitation.

Case Studies

Case studies specific to SEA realm will be discussed in the workshop. 

Partners

 

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Building Counter-Terrorism Leadership Team

Building Counter-Terrorism Leadership Team
Overview

This 2-day “Building Counter-Terrorism Leadership Team” training is to provide delegates a practical knowledge of how to formulate a coherent leadership team against the back drop of countering terrorism. The first day of the workshop will help delegates identify the key skills of a leader and factors that could affect morale of its team members. Delegates will also learn about intelligence team where they will understand the role of information and intelligence play in leadership decision making.

In addition, the trainer will go through the process from planning to operations and issues arise during this process and how should delegates respond to change. To enhance delegates’ learning experience, each day’s sessions is followed by discussion and exercises preparation as well as table top exercises drawing examples from recent life events.

What you will learn from this workshop:

  • Establish the key soft skills of a leader and composition of a team.
  • Identify the differences between Insurgency and countering terrorism.
  • Comprehend the development of policies for countering terrorism.
  • Adopt the strategies that suits one organisation.
  • Recognise the role of information and intelligence play in leadership decision making.
  • Discover issue raised from planning to operations and the role of leader in building a successful leadership team.

 

Who will attend

The workshop is aimed at security practitioners, policing services and organisations who have a responsibility for developing effective leadership teams responsible for countering terrorism from the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking
Trainer

Course Trainer is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks.

Prior to working in the security design world, Course Trainer completed 13 years with the British Army in 2003, working within the Security and Intelligence fields.  Operating within a number of diverse environments, including the Former Yugoslavia where he was responsible for developing operational & crises response plans for the extraction staff from areas of responsibility.  Key to this was the development of a risk management process linked to accurate intelligence reporting that enable constant situational reviews.  Between deployments Course Trainer developed the UK based training to accommodate other NATO Countries supporting JCO operations. 

Course Trainer was awarded top student on British Army Leadership Course, a physically and mentally intensive course conducted in the most severe and challenging conditions offered by the Brecon Beacons. Course Trainer was praised by instructors for the ability to overcome problems and motivate other team members.

As a member of ASIS International UK Chapter, Course Trainer was nominated to be a member of the executive writing team completing an American National Standard for the management of Physical Assets Protection programmes. Course Trainer has also worked as part of the technical committee for the Private Security Contractors Standard (PSC) that has been adopted by the UK Foreign and Commonwealth Office as a benchmark process.

Case Studies

Operation Oak – The Rescue of Benito Mussolini

Using this case study candidates will discuss the formation of the team and look at the planning issues around the rescue for Mussolini during WW2’

Excision – German Attack on Tito’s HQ In WW2

Using this case study candidates will discuss why merits and impacts of the mission in relation to counter insurgency operations’

The Insider Threat

Using a number of recent open source examples from the Southeast Asia region, candidates will discuss how the team leadership can influence counter terrorism activities.

Society and Crime in relation to terrorism

Using open source information from the Southeast Asia region candidates will discuss the societal and crime changes that could influence changes in terrorism.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Mitigation Strategies for Vehicle Borne Threats

Mitigation Strategies for Vehicle Borne Threats
Overview

This 2-day in-depth and hands-on workshop is designed to help delegates gain a strategic understanding of how to formulate a coherent strategy based upon International Standards and best practices of mitigation measures for vehicle borne threats.  This workshop will also consider the issues for deploying vehicle mitigation measures within the built environment.

To enhance delegates’ learning experience, each day’s taught sessions is followed by discussion and exercises preparation.

What you will learn from this workshop:

  • Distinguish different methods of attack.
  • Determine the constraints for planning vehicle mitigation measures.
  • Learn how to define the strategy for deployment.
  • Gain in-depth understanding of the process for selection and deployment of physical controls.
  • Master the process for developing procedural controls for the operation of physical controls.
  • Recognise security risk and credible threat.
  • Identify site constraints affecting possible mitigative measures.
  • Apprehend the dynamics of potential vehicle impact.
  • Understand the use of landform to reduce impact velocity.
  • Recognise third party standards, testing regimes and product types.
  • Apply the above in a practical exercise setting.

 

Who will attend

This workshop is aimed at:

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

From the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  •  Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers. Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a Security Design Strategist. In the last four years, he has been involved in the security design of three first class football stadium, a railway station, a student campus, a group of London theatres and an iconic tourist venue.

Prior to this he had 20 years practice as a police crime prevention officer and crime prevention design advisor in London. He was senior crime prevention design advisor to Metropolitan Police Specialist Operations. Trainer 2 draws upon extensive experience with the Metropolitan Police, and holds internal UK Government Home Office qualifications in crime prevention and counter-terrorism design techniques alongside independent academic qualifications in crime prevention and environmental design. He is used to working in environments requiring confidentiality and has been vetted to 'SC' level.

Case Studies

The World Trade Centre 1993 bombing

Iconic static target: Home-made explosive delivered by encroachment during the “business as usual” phase of activity-how practical is eternal vigilance? How and where could countermeasures be deployed?

Nice attack: Promenade des Anglais, Bastille Day 2016

Vehicle attack on a national public occasion/ example of attack method displacement where control measures had limited access to explosives -can we predict which potential targets to protect?. How do we define the target in these circumstances-what mitigation could be used and what might be practical?

The London 2012 Olympics

A practical exercise with maps of a massive complex target, this exercise will consider the three phases of construction, event and legacy focussing on access in the urban landscape, critical assets and crowded places.

London Borough Market Attack

An opportunity to discuss changing attack methodologies and opportunities to reduce their effect in a practical context.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download