Upstream Petroleum Economics: Economics, Risk, Fiscal Analysis, KL, Malaysia

Overview

This 3-day Upstream Petroleum Economics is specially designed to equip delegates with the skills and techniques to evaluate and make decisions on petroleum projects.  The workshop covers cash flow analysis, economic indicators, risk analysis and fiscal analysis. Throughout the workshop, participants will complete practical exercises and examples to reinforce their understanding of the concepts.

What you will learn from this Masterclass:

  • UNDERSTAND the way in which the oil and gas industry evaluates and makes decisions on petroleum project investments.
  • CALCULATE and INTERPRET economic indicators.
  • APPLY risk analysis to oil and gas investments.
  • EVALUATE petroleum fiscal and PSC terms of worldwide.
  • APPLY the principles of economic/financial analysis through practical instruction in the analytical techniques used in the industry.
  • PREPARE economic analyses and to review critically the analyses prepared by others.
  • RECOGNISE and DIFFERENTIATE between good and bad practice in oil and gas industry economic/financial evaluation
Who will attend
  • Accountants
  • Economists
  • Engineers
  • Explorationists
  • Financial managers
  • Geologists
  • Negotiators
  • Planners
Trainer

Expert Trainer has over 40 years’ experience as a petroleum economist in the upstream industry. Expert Trainer is an international consultant in petroleum economics.

Expert Trainer has presented over 200 short courses for the petroleum industry in the Asia, Europe, USA and Africa on petroleum economics and worldwide PSC/fiscal regimes. He has also given frequent presentations to oil and finance industry seminars and conferences internationally.

Expert Trainer has held various petroleum economics and commercial positions in the oil and gas industry. He has advised companies and governments in the Asia/Pacific region on petroleum PSC and fiscal terms. He has valued many petroleum properties and companies for acquisition and sale; prepared economics research reports on oil and gas industry projects and has provided commercial support for oil field operations and investments worldwide.

Case Studies

Tabletop Exercises:

  • Preparing a net cash flow projection.
  • Determining economic life and estimating reserves.
  • Calculating tax and demonstrating the economic effects of typical tax regime.
  • Calculating cost recovery and profit sharing.
  • Generating cash flow incorporating inflation.
  • Showing the effect of fiscal drag.
  • Calculating NPV and demonstrating its features.
  • Calculating real and nominal NPVs.
  • Calculating IRR and interpreting multiple IRRs.
  • Calculating payback.
  • Calculating CPI.
  • Incremental economics and the effects of fiscal terms.
  • Preparing sensitivity analyses and using them to make investment decisions.
  • Preparing probability analysis and defining the statistics.
  • Using probability and combining uncertain oil industry variables.
  • Monte Carlo simulation
  • Economics of drilling, farming out acreage and the effects of fiscal terms on exploration decisions.
  • Calculating the net cash flow of an example field development under the countries’ fiscal terms.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

 

Venue

Workshop venue to be confirmed. 

Industry Insights
Brochure Download


Counter Improvised Explosive Devices (C-IED) in Today’s Terror Threat Environment

Overview

This 2-day workshop and training is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this workshop: 

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/ Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainers

This 2-day workshop will be conducted by 2 Expert Trainers. Expert Trainers have over 30 years of experience in IED field and both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances.

Testimonials

"The course was extremely well thought out, presented extremely well and the instructors were approachable and involved and interested in teaching the students."
Maj James Morgan, 277 EOD Coy USMC, EOD, HME Course, April 2015

"One of the best courses I have ever attended... in fact I am proud of this course. Thank you."
Maj Francis Ndonye, Specialist EOD Course, Kenya, Jun 2014

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Managing Internet of Things (IoT) Security Risks

Overview

This 2-day Managing Internet of Things (IoT) Security Risks Masterclass provides delegates a strategic understanding on the new threats and paradigms emerging from IoT while guiding on the right approaches in handling such threats. Due to the nature of IoT and its ubiquity, security needs to be addressed in a fundamentally different way; the devices are no longer important, but their data is. Based on the zero-trust networking, assume breach and cattle-vs-pets paradigms, this Masterclass will help delegates look at IoT security in a whole different way. 

What you will learn from this Masterclass:

  • Recognise the new threats IoT pose for an enterprise
  • Identify the threats and limitations at the technical level
  • Integrate IoT security in your existing security management
  • Determine proper responses to IoT threats
  • Refocus your security efforts to stay in control
Who will attend
  • Corporate Business Continuity
  • Corporate Infrastructure
  • Information Security 

  • Information Security and Risk

  • Network administrators
  • Network Architecture
  • Network Security Systems
  • Network Services

  • Payment and Fraud
Security
  • Payment Systems & Risk
Group
  • Security Programme
  • Security
Information Security Policy
  • System Administration
Trainer

Armed with more than 30 years of experience in this industry, Expert Trainer is an independent security consultant. Expert Trainerhas been involved in many large-scale projects including mobile security, banking security, industrial automation, covering technical and non-technical aspects.

Expert Trainer started as a technical security tester and has delivered courses on mobile security in Abu Dhabi, Kuala Lumpur, Singapore and Capetown. He has international experience in most European countries, the Caribbean, Asia and the Middle East.

Expert Trainer has consulted a large number industries ranging from ministries of Dutch government, utilities companies, banking sectors, Europol, payment providers, and Dutch Telecom operators.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Imagery Intelligence (IMINT) for An Enhanced Intelligence Gathering Process

Overview

This workshop provides an insight into imagery intelligence. It introduces delegates a variety of imagery types that can all be used to provide valuable additional intelligence to enhance existing sources, build target packs and gain an understanding of an area. Expert Trainer will incorporate open source tools and material to deliver the course to ensure that imagery intelligence skills can be practised and used with minimum outlay in a familiar environment.

This workshop is a practical, hands-on course and all subjects will be reinforced with practical elements and real-world examples.

What you will learn from this workshop:

  • MASTER the building blocks of Imagery Analysis.
  • IDENTIFY and EXPLOIT the different types of imagery.
  • COMPARE maps and imagery to accurately geolocate targets.
  • LEARN how to use common items to measure distances on unreferenced imagery.
  • BUILD a report using Full Motion Video.
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • ISR Operators
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Expert Trainer has more than 20 years’ experience in the British Army Intelligence Corps in which time he worked in various fields including Counter Intelligence, Technical Investigations, Information Assurance (IA), Human Intelligence (HUMINT), Imagery Intelligence (IMINT) and Cyber Security. He has worked in mainland Germany, France, Turkey, Cyprus, Oman, Qatar, Bahrain, the Balkans, Iraq, Afghanistan, and Sierra Leone, and currently teaches intelligence techniques to military staff from across the 29 NATO member nations, African partner nations and also to partners within the defence industry.

Expert Trainer
completed the 16-week United Kingdom Imagery Analysis Course in 2000 and then went on to work with the USA analysing Predator, Reaper and Hermes 450 imagery on missions for the Balkans conflict. He has also provided imagery support to operations in Sierra Leone and then managed the training and operations of the British Army Reserve Imagery Analysis unit. 

Table-top Exercises
  • This is a 3-day practical course and students are encouraged to follow the teaching on their own laptops. Teaching will be conducted through instructor led lessons and student discovery through practical exercises.
  • Students should bring a Laptop and wheel mouse with Google Earth Pro, VLC Video Player and, Paint Shop Pro installed and working. It would be useful to have an office suite with PowerPoint, OneNote or similar application. Links will be provided in the joining instructions.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Cyber Security & Resilience for Critical National Infrastructure and Technologies.

Cyber Security and Resilience
Overview

Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. There will be live demonstrations of end-to-end attacks and real-world case studies.

Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.

What you will learn from this Masterclass:

  • APPLY knowledge of offensive and defensive cyber security.
  • EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
  • IDENTIFY the technical, procedural and human requirements for defensive activities.
  • MEASURE the effectiveness of security controls using security audits and monitoring.
  • NAVIGATE the cyber security threat landscape.
  • OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
Who will attend
  • Director, Head of Department, Managers, Supervisors, Executives and Officers of:

    • Counter-Intelligence Investigation
    • Human Resources
    • Information Security
    • Information Technology (IT)
    • Insider Threat Analysts
    • Insider Threat Program Managers
    • Legal
    • Network Administration
    • Physical Security
    • Software Engineering
Trainer

Expert Trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management.  He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.

Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.

Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.

Case Studies

Live end-to-end attack demonstrations. 

 A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.

The attack chain. 

Case studies/examples of different types of attacks. Please elaborate more. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks. 

Defensive case studies/examples.  

A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks. A number of specific examples from the instructor’s personal and professional experience will be given, including taking a layered approach to security, and protecting against human threats.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Procurement Strategies for Substantial Cost Savings

Overview

What you will learn from this Masterclass:

    • Identify and understand the present digital technologies that may impact Supply Chain.
    • Distinguish between effective vendors and underperforming vendors.
    • Analyse total spend and formulate performance measures to develop an effective cost savings strategy.
    • Master cost-price analysis techniques.
    • Examine the various sourcing methodologies and determine the preferred strategy that suit your organisation’s needs.
    • Strengthen your negotiation skills to achieve maximum cost savings.
Who should attend

Directors / Heads / General Managers/ Senior Managers/ Managers/ Supervisors/ Senior Buyers/ Purchasing Officers/ Purchasing Staff/ Cost Analysts from the following industries:

  • Commodity
  • Construction and Infrastructure
  • Education Services
  • Finance
  • Food Production
  • Government and Public Sector
  • Health Services
  • Importers
  • Manufacturing
  • Oil and Gas
  • Service Providers
  • Transport, Storage and Distribution
  • Wholesale and Retail
Trainer

Expert Trainer has more than 30 years of leadership experience in multiple industries as well as in academia and the services sector. He has served as a Board Director of Public Listed companies in Singapore and South Korea. He also served as a Board Director of private companies in the United States, Europe and in the Asia-Pacific region, specifically in Australia, China, Korea, Singapore, Malaysia, Thailand, Philippines, Vietnam and Indonesia.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Brochure Download


Maritime Cyber Security

Maritime Cyber Security
Overview

This workshop aims to increase awareness and provide knowledge on maritime cyber security through case studies and practical examples that attendees will be able to apply as best practises to their organisations, in order to optimise resources allocation and achieve maximum return-on-investment in the maritime sector.

It will provide the inputs required for building and maintaining a comprehensive cyber security strategy based on a risk-management approach as well as offer insights for those who want to enrich their business cyber security capability maturity.

What you will learn from this workshop: 

  • DEVELOP an understanding & awareness of key aspects of maritime cyber security.
  • UNDERSTAND the vulnerabilities of on-board and at-shore, widely used, IT and OT systems.
  • VALUE the importance of developing a risk-based cyber security strategy and policy implementation.
  • ADOPT the most suitable code of practice for cyber threat risk mitigation and contingency planning.
  • MAKE an informed decision on resources allocation for cyber security measures, tools and infrastructure.
  • IDENTIFY and select capability development content that will generate maximum impact for your organisation.
  • ACT as ambassadors in promoting a people-focused cyber culture within your organisation.
Who should attend
  • Senior managers who are looking to raise awareness on cyber security within their organisations.
  • Leaders who wish to be considered as pioneers in cyber security.
  • First line supervisors who wish to equip themselves with practical knowledge that will be applied to protect their everyday business activities from cyber threats.
  • All staff engaged, directly or indirectly, in the maritime sector (ports, shipping operators, brokers, insurers, government officials, lead auditors etc).
Trainer

Expert Trainer has over 19 years of professional experience as a navy warfare officer in NATO, EU and UN operations. Since joining the Hellenic Navy in 2003,
he rose to the rank of Lieutenant Commander, and was awarded medals and honorary awards for participation in international missions. During his time with the navy, he worked part-time as an instructor and lecturer with the Hellenic Naval Academy and the Hellenic Air Force.

Expert Trainer has worked as Editor in Chief for the Institute of International Relations at Panteion University's monthly newsletter on Naval Strategy and Maritime Security. He has also taught maritime security and cyber security at the University of Plymouth as a Visiting Research Fellow.

Table-top Exercises

Apart from case study analysis on real-life maritime-related cyber breaches, delegates will also develop a 10-step cyber security policy for your
organisation.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Business Focused Data Visualisation, Dashboard and Data Story Design

Overview

This two-day workshop provides practical knowledge, grounded in high-quality academic research and industry best practice, that will help people to design and develop data visualisations, dashboards and data stories that decision makers enjoy using and consider valuable to the business.

The key element of this workshop is that it is technology independent. The principles and processes covered in the workshop can be successfully applied to the design and development of any data visualisation, dashboard and data story irrespective of the BI and analytics platform being used.

The workshop combines learning data visualisation, dashboard and data storytelling design concepts and best practices, small group exercises to help participants immediately apply what they have learned and discussion sessions where participants can ask questions arising from their own business projects.

What you will learn from this workshop:

  • USE KNOWLEDGE of human visual and thinking processes to guide the design of attractive and effective data visualisations, dashboards and data stories.
  • EXPLAIN how data visualisations, dashboards and data stories support analytics and data-driven decision making.
  • CHOOSE the correct form to communicate data and information simply, clearly and accurately to business users.
  • APPLY best practice design principles to the design of data visualisations dashboards and data stories.
  • ADOPT decision-driven design and evolutionary development to create data visualisations, dashboards and data stories that are useful for business users.
  • INTERACT with business users to gather the correct requirements for a data visualisation, dashboard and data stories.
Who will attend
  • Business Intelligence Designer / Analyst / Developer
  • Reporting Designer / Analyst / Developer
  • Data Scientist
  • Data Analyst
  • Finance Analyst
  • Financial / Management Accountant
  • Dashboard Designer / Analyst / Developer
  • Business Intelligence and Analytics Manager
  • Business Intelligence and Analytics Architect
  • Users of Self-Service Business Intelligence Tools
Trainer

Course Trainer has more than 20 years of expertise in business intelligence, business analytics, operational reporting, data warehousing and other decision support projects. As Principal Consultant & Director, Course Trainer provides business decision makers with rapid access to their information for knowledgeable business outcomes. He is responsible for establishing the company’s innovation, growth, sales and marketing strategy. In addition, he combines his in-depth business and information technology expertise with his academic research and teaching experience to provide clients a hands-on approach by serving as a lead program director, solution architect and data modeller.

Course Trainer served from 2000 to 2009 as National Solutions Manager for business intelligence and analytics firm Wave Business Solutions. In this role, Course Trainer was responsible for the development and implementation of a number of information management-related solutions for clients across various industries.

From 1997 to 2000, Course Trainer was a Business Performance Reporting Analyst for AMP Financial Services. In this role, he was a liaison between the business and information technology departments in the ongoing support, maintenance and further development of a divisional management reporting system. Prior to that, he served as in multiple technology solutions project lead roles from 1995 to 1997 for financial services company Cuscal.

Course Trainer's academic accomplishments include having published a number of peer-reviewed conference and journal papers on business intelligence and analytics.

Table-top Exercises
  • Choosing the correct graphs
  • Review and suggest improvements for data visualisations
  • Review and suggest improvements for dashboard designs
  • Case study introduction
  • Dashboard design exercise
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Insider Threat Management

Overview

This 2-day workshop on Insider Threat Management will help delegates gain a strategic understanding of risks and threats within an organisation. This workshop covers how to identify Internal Threats and its different types of Internal Threats to how to conduct a risk assessment of their organisation to deter and manage Internal Threats. This workshop presents an in-depth view of the Insider Threat problems and teaches delegates how to develop a proven and comprehensive Insider Threat Risk Mitigation Framework for detecting, deterring and managing Insider Threats.

What you will learn from this workshop: 

  • DETER, DETECT AND MITIGATE actions by insiders who represent a threat to national security and organisations.
  • RECOGNISE actions and behaviours that can signify an Insider Threat.
  • ASSESS current Insider Threat Programme for weaknesses and make enhancements.
  • IDENTIFY Insider Threat risks, vulnerabilities and weaknesses within an organisation.
  • IMPLEMENT risk mitigation strategies and actionable steps that can be taken.
  • DEVELOP and IMPLEMENT an Insider Threat Awareness and Reporting Program.
Who should attend

Anyone involved in the development, oversight, or operation of an Insider Threat or risk management program:

  • Chief Information Security Officer
  • Chief Security Officer
  • Chief Risk Officer
  • Counterintelligence Investigators
  • Facility Security Officer
  • Human Resource Manager
  • Legal Manager
  • Network Security Officer
  • Security Officer
Trainer

Expert Trainer is a highly experienced senior law enforcement, security and incident management practitioner. He has over 37 years of leadership experience in both law enforcement and the security industry. Having spent over 33 years in law enforcement with the Hong Kong Police, Peter reached the rank of Assistant Commissioner
and was awarded the Police Distinguished Service Medal (P.D.S.M.) for his exemplary service and contribution to Hong Kong.

Expert Trainer has been a speaker at numerous international conferences, including: The California Association of Hostage Negotiators, USA; The Interpol Strategic Planners Conference, France; The Razak School of Government, Malaysia; The ASEAN Regional Forum on Bio-Preparedness and Disaster Response Conference, Philippines; the Asia Emergency Management Conference; and the Risk and Resilience Conference, Singapore.

Table-top Exercises

Case study exercises will be guided by Expert Trainer and will also include:

  • Case Management on Handling Insider Threats
  • How to Develop an Insider Threat Program Blueprint.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Effective Investigative Questioning: Uncover and Prevent Potential Threats

Effective Investigative Questioning
Overview

This 2-day workshop is aimed at equipping delegates with the necessary skills and approaches of Security Questioning. Apart from general guidelines and principals of Security Questioning, delegates will learn the how to use tactical questioning to elicit information from suspects. Through this workshop, delegates will be able to apply the skills and knowledge of Security Questioning when dealing with suspicious documentation, human resource and internal investigation.

Most importantly, this workshop will teach delegates how to identify and differentiate between someone with malicious intent and someone who is duped or coerced into committing a crime. To enhance delegates’ learning experience, this workshop includes both theoretical and simulated scenarios (field exercise) to illustrate the application of Security Questioning in day-to-day security operations.

What you will learn from this Masterclass:

  • LEARN how to use tactical questioning to uncover information and intelligence from individuals, suspects and/or convicted criminals and terrorists
  • MASTER different approaches and techniques to questioning.
  • RECOGNISE and DIFFERENTIATE someone with malicious intent and someone who is duped or coerced into becoming a mule.
  • APPLY security questioning as an investigative tool to solve an internal security incident in an organisation.
  • IMPLEMENT effective security questioning processes in your own protected environment.
Who will attend
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Expert Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Expert Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. 

Expert Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

Tabletop Exercise - Developing and Testing a Cover Story

Delegates will work in groups and receive specific assignments for developing cover stories for specific missions.  They will then be challenged by their peers in the classroom who will test the strength and reliability of the cover story and the ability of the trainee to maintain it against security questioning.

Mall Field Exercise

Delegates will be tasked with specific targets and missions for which they will use their cover stories to gain information and intelligence.

Exercise Debrief

Delegates will brief each other about their experiences in the field. They will also point out weaknesses and strengths in their cover stories and behaviors as individuals and as a group.

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed.

 

Industry Insights
Brochure Download