Upstream Petroleum Economics: Economics, Risk, Fiscal Analysis, KL, Malaysia

Overview

This 3-day Upstream Petroleum Economics is specially designed to equip delegates with the skills and techniques to evaluate and make decisions on petroleum projects.  The workshop covers cash flow analysis, economic indicators, risk analysis and fiscal analysis. Throughout the workshop, participants will complete practical exercises and examples to reinforce their understanding of the concepts.

What you will learn from this Masterclass:

  • UNDERSTAND the way in which the oil and gas industry evaluates and makes decisions on petroleum project investments.
  • CALCULATE and INTERPRET economic indicators.
  • APPLY risk analysis to oil and gas investments.
  • EVALUATE petroleum fiscal and PSC terms of worldwide.
  • APPLY the principles of economic/financial analysis through practical instruction in the analytical techniques used in the industry.
  • PREPARE economic analyses and to review critically the analyses prepared by others.
  • RECOGNISE and DIFFERENTIATE between good and bad practice in oil and gas industry economic/financial evaluation
Who will attend
  • Accountants
  • Economists
  • Engineers
  • Explorationists
  • Financial managers
  • Geologists
  • Negotiators
  • Planners
Trainer

Expert Trainer has over 40 years’ experience as a petroleum economist in the upstream industry. Expert Trainer is an international consultant in petroleum economics.

Expert Trainer has presented over 200 short courses for the petroleum industry in the Asia, Europe, USA and Africa on petroleum economics and worldwide PSC/fiscal regimes. He has also given frequent presentations to oil and finance industry seminars and conferences internationally.

Expert Trainer has held various petroleum economics and commercial positions in the oil and gas industry. He has advised companies and governments in the Asia/Pacific region on petroleum PSC and fiscal terms. He has valued many petroleum properties and companies for acquisition and sale; prepared economics research reports on oil and gas industry projects and has provided commercial support for oil field operations and investments worldwide.

Case Studies

Tabletop Exercises:

  • Preparing a net cash flow projection.
  • Determining economic life and estimating reserves.
  • Calculating tax and demonstrating the economic effects of typical tax regime.
  • Calculating cost recovery and profit sharing.
  • Generating cash flow incorporating inflation.
  • Showing the effect of fiscal drag.
  • Calculating NPV and demonstrating its features.
  • Calculating real and nominal NPVs.
  • Calculating IRR and interpreting multiple IRRs.
  • Calculating payback.
  • Calculating CPI.
  • Incremental economics and the effects of fiscal terms.
  • Preparing sensitivity analyses and using them to make investment decisions.
  • Preparing probability analysis and defining the statistics.
  • Using probability and combining uncertain oil industry variables.
  • Monte Carlo simulation
  • Economics of drilling, farming out acreage and the effects of fiscal terms on exploration decisions.
  • Calculating the net cash flow of an example field development under the countries’ fiscal terms.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

 

Venue

Workshop venue to be confirmed. 

Industry Insights
Brochure Download


Maritime Cyber Security

Maritime Cyber Security
Overview

This workshop aims to increase awareness and provide knowledge on maritime cyber security through case studies and practical examples that attendees will be able to apply as best practises to their organisations, in order to optimise resources allocation and achieve maximum return-on-investment in the maritime sector.

It will provide the inputs required for building and maintaining a comprehensive cyber security strategy based on a risk-management approach as well as offer insights for those who want to enrich their business cyber security capability maturity.

What you will learn from this workshop: 

  • DEVELOP an understanding & awareness of key aspects of maritime cyber security.
  • UNDERSTAND the vulnerabilities of on-board and at-shore, widely used, IT and OT systems.
  • VALUE the importance of developing a risk-based cyber security strategy and policy implementation.
  • ADOPT the most suitable code of practice for cyber threat risk mitigation and contingency planning.
  • MAKE an informed decision on resources allocation for cyber security measures, tools and infrastructure.
  • IDENTIFY and select capability development content that will generate maximum impact for your organisation.
  • ACT as ambassadors in promoting a people-focused cyber culture within your organisation.
Who should attend
  • Senior managers who are looking to raise awareness on cyber security within their organisations.
  • Leaders who wish to be considered as pioneers in cyber security.
  • First line supervisors who wish to equip themselves with practical knowledge that will be applied to protect their everyday business activities from cyber threats.
  • All staff engaged, directly or indirectly, in the maritime sector (ports, shipping operators, brokers, insurers, government officials, lead auditors etc).
Trainer

Expert Trainer has over 19 years of professional experience as a navy warfare officer in NATO, EU and UN operations. Since joining the Hellenic Navy in 2003,
he rose to the rank of Lieutenant Commander, and was awarded medals and honorary awards for participation in international missions. During his time with the navy, he worked part-time as an instructor and lecturer with the Hellenic Naval Academy and the Hellenic Air Force.

Expert Trainer has worked as Editor in Chief for the Institute of International Relations at Panteion University's monthly newsletter on Naval Strategy and Maritime Security. He has also taught maritime security and cyber security at the University of Plymouth as a Visiting Research Fellow.

Table-top Exercises

Apart from case study analysis on real-life maritime-related cyber breaches, delegates will also develop a 10-step cyber security policy for your
organisation.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Imagery Intelligence (IMINT) for An Enhanced Intelligence Gathering Process

IMINT
Overview

This workshop provides an insight into imagery intelligence. It introduces delegates a variety of imagery types that can all be used to provide valuable additional intelligence to enhance existing sources, build target packs and gain an understanding of an area. Expert Trainer will incorporate open source tools and material to deliver the course to ensure that imagery intelligence skills can be practised and used with minimum outlay in a familiar environment.

This workshop is a practical, hands-on course and all subjects will be reinforced with practical elements and real-world examples.

What you will learn from this workshop:

  • MASTER the building blocks of Imagery Analysis.
  • IDENTIFY and EXPLOIT the different types of imagery.
  • COMPARE maps and imagery to accurately geolocate targets.
  • LEARN how to use common items to measure distances on unreferenced imagery.
  • BUILD a report using Full Motion Video.
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • ISR Operators
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Expert Trainer has more than 20 years’ experience in the British Army Intelligence Corps in which time he worked in various fields including Counter Intelligence, Technical Investigations, Information Assurance (IA), Human Intelligence (HUMINT), Imagery Intelligence (IMINT) and Cyber Security. He has worked in mainland Germany, France, Turkey, Cyprus, Oman, Qatar, Bahrain, the Balkans, Iraq, Afghanistan, and Sierra Leone, and currently teaches intelligence techniques to military staff from across the 29 NATO member nations, African partner nations and also to partners within the defence industry.

Expert Trainer
completed the 16-week United Kingdom Imagery Analysis Course in 2000 and then went on to work with the USA analysing Predator, Reaper and Hermes 450 imagery on missions for the Balkans conflict. He has also provided imagery support to operations in Sierra Leone and then managed the training and operations of the British Army Reserve Imagery Analysis unit. 

Table-top Exercises
  • This is a 3-day practical course and students are encouraged to follow the teaching on their own laptops. Teaching will be conducted through instructor led lessons and student discovery through practical exercises.
  • Students should bring a Laptop and wheel mouse with Google Earth Pro, VLC Video Player and, Paint Shop Pro installed and working. It would be useful to have an office suite with PowerPoint, OneNote or similar application. Links will be provided in the joining instructions.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Counter Improvised Explosive Devices (C-IED) in Today’s Terror Threat Environment

Overview

This 2-day workshop and training is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this workshop: 

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/ Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainers

This 2-day workshop will be conducted by 2 Expert Trainers. Expert Trainers have over 30 years of experience in IED field and both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances.

Testimonials

"The course was extremely well thought out, presented extremely well and the instructors were approachable and involved and interested in teaching the students."
Maj James Morgan, 277 EOD Coy USMC, EOD, HME Course, April 2015

"One of the best courses I have ever attended... in fact I am proud of this course. Thank you."
Maj Francis Ndonye, Specialist EOD Course, Kenya, Jun 2014

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Business Focused Data Visualisation, Dashboard and Data Story Design

Overview

This two-day workshop provides practical knowledge, grounded in high-quality academic research and industry best practice, that will help people to design and develop data visualisations, dashboards and data stories that decision makers enjoy using and consider valuable to the business.

The key element of this workshop is that it is technology independent. The principles and processes covered in the workshop can be successfully applied to the design and development of any data visualisation, dashboard and data story irrespective of the BI and analytics platform being used.

The workshop combines learning data visualisation, dashboard and data storytelling design concepts and best practices, small group exercises to help participants immediately apply what they have learned and discussion sessions where participants can ask questions arising from their own business projects.

What you will learn from this workshop:

  • USE KNOWLEDGE of human visual and thinking processes to guide the design of attractive and effective data visualisations, dashboards and data stories.
  • EXPLAIN how data visualisations, dashboards and data stories support analytics and data-driven decision making.
  • CHOOSE the correct form to communicate data and information simply, clearly and accurately to business users.
  • APPLY best practice design principles to the design of data visualisations dashboards and data stories.
  • ADOPT decision-driven design and evolutionary development to create data visualisations, dashboards and data stories that are useful for business users.
  • INTERACT with business users to gather the correct requirements for a data visualisation, dashboard and data stories.
Who will attend
  • Business Intelligence Designer / Analyst / Developer
  • Reporting Designer / Analyst / Developer
  • Data Scientist
  • Data Analyst
  • Finance Analyst
  • Financial / Management Accountant
  • Dashboard Designer / Analyst / Developer
  • Business Intelligence and Analytics Manager
  • Business Intelligence and Analytics Architect
  • Users of Self-Service Business Intelligence Tools
Trainer

Course Trainer has more than 20 years of expertise in business intelligence, business analytics, operational reporting, data warehousing and other decision support projects. As Principal Consultant & Director, Course Trainer provides business decision makers with rapid access to their information for knowledgeable business outcomes. He is responsible for establishing the company’s innovation, growth, sales and marketing strategy. In addition, he combines his in-depth business and information technology expertise with his academic research and teaching experience to provide clients a hands-on approach by serving as a lead program director, solution architect and data modeller.

Course Trainer served from 2000 to 2009 as National Solutions Manager for business intelligence and analytics firm Wave Business Solutions. In this role, Course Trainer was responsible for the development and implementation of a number of information management-related solutions for clients across various industries.

From 1997 to 2000, Course Trainer was a Business Performance Reporting Analyst for AMP Financial Services. In this role, he was a liaison between the business and information technology departments in the ongoing support, maintenance and further development of a divisional management reporting system. Prior to that, he served as in multiple technology solutions project lead roles from 1995 to 1997 for financial services company Cuscal.

Course Trainer's academic accomplishments include having published a number of peer-reviewed conference and journal papers on business intelligence and analytics.

Table-top Exercises
  • Choosing the correct graphs
  • Review and suggest improvements for data visualisations
  • Review and suggest improvements for dashboard designs
  • Case study introduction
  • Dashboard design exercise
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Insider Threat Management

Overview

This 2-day workshop on Insider Threat Management will help delegates gain a strategic understanding of risks and threats within an organisation. This workshop covers how to identify Internal Threats and its different types of Internal Threats to how to conduct a risk assessment of their organisation to deter and manage Internal Threats. This workshop presents an in-depth view of the Insider Threat problems and teaches delegates how to develop a proven and comprehensive Insider Threat Risk Mitigation Framework for detecting, deterring and managing Insider Threats.

What you will learn from this workshop: 

  • DETER, DETECT AND MITIGATE actions by insiders who represent a threat to national security and organisations.
  • RECOGNISE actions and behaviours that can signify an Insider Threat.
  • ASSESS current Insider Threat Programme for weaknesses and make enhancements.
  • IDENTIFY Insider Threat risks, vulnerabilities and weaknesses within an organisation.
  • IMPLEMENT risk mitigation strategies and actionable steps that can be taken.
  • DEVELOP and IMPLEMENT an Insider Threat Awareness and Reporting Program.
Who should attend

Anyone involved in the development, oversight, or operation of an Insider Threat or risk management program:

  • Chief Information Security Officer
  • Chief Security Officer
  • Chief Risk Officer
  • Counterintelligence Investigators
  • Facility Security Officer
  • Human Resource Manager
  • Legal Manager
  • Network Security Officer
  • Security Officer
Trainer

Expert Trainer is a highly experienced senior law enforcement, security and incident management practitioner. He has over 37 years of leadership experience in both law enforcement and the security industry. Having spent over 33 years in law enforcement with the Hong Kong Police, Peter reached the rank of Assistant Commissioner
and was awarded the Police Distinguished Service Medal (P.D.S.M.) for his exemplary service and contribution to Hong Kong.

Expert Trainer has been a speaker at numerous international conferences, including: The California Association of Hostage Negotiators, USA; The Interpol Strategic Planners Conference, France; The Razak School of Government, Malaysia; The ASEAN Regional Forum on Bio-Preparedness and Disaster Response Conference, Philippines; the Asia Emergency Management Conference; and the Risk and Resilience Conference, Singapore.

Table-top Exercises

Case study exercises will be guided by Expert Trainer and will also include:

  • Case Management on Handling Insider Threats
  • How to Develop an Insider Threat Program Blueprint.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Effective Investigative Questioning: Uncover and Prevent Potential Threats

Effective Investigative Questioning
Overview

This 2-day workshop is aimed at equipping delegates with the necessary skills and approaches of Security Questioning. Apart from general guidelines and principals of Security Questioning, delegates will learn the how to use tactical questioning to elicit information from suspects. Through this workshop, delegates will be able to apply the skills and knowledge of Security Questioning when dealing with suspicious documentation, human resource and internal investigation.

Most importantly, this workshop will teach delegates how to identify and differentiate between someone with malicious intent and someone who is duped or coerced into committing a crime. To enhance delegates’ learning experience, this workshop includes both theoretical and simulated scenarios (field exercise) to illustrate the application of Security Questioning in day-to-day security operations.

What you will learn from this Masterclass:

  • LEARN how to use tactical questioning to uncover information and intelligence from individuals, suspects and/or convicted criminals and terrorists
  • MASTER different approaches and techniques to questioning.
  • RECOGNISE and DIFFERENTIATE someone with malicious intent and someone who is duped or coerced into becoming a mule.
  • APPLY security questioning as an investigative tool to solve an internal security incident in an organisation.
  • IMPLEMENT effective security questioning processes in your own protected environment.
Who will attend
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Expert Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Expert Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. 

Expert Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

Tabletop Exercise - Developing and Testing a Cover Story

Delegates will work in groups and receive specific assignments for developing cover stories for specific missions.  They will then be challenged by their peers in the classroom who will test the strength and reliability of the cover story and the ability of the trainee to maintain it against security questioning.

Mall Field Exercise

Delegates will be tasked with specific targets and missions for which they will use their cover stories to gain information and intelligence.

Exercise Debrief

Delegates will brief each other about their experiences in the field. They will also point out weaknesses and strengths in their cover stories and behaviors as individuals and as a group.

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed.

 

Industry Insights
Brochure Download


Anti-Money Laundering and Counter Financing of Terrorism (AML/CFT)

Anti-Money Laundering and Counter Financing of Terrorism
Overview

This workshop aims to provide delegates a strategic understanding on how to combat money laundering and financing terrorist within their organisation or agencies. It enables delegates to effectively combat ML and FT by recognising the challenges posed in the implementation of ML and FT regime. This workshop teaches delegates how to conduct risk assessment findings and process used for assessing risks relating AML and CFT in Southeast Asia region. Apart from that, delegates will learn how to establish an effective working relationship as reporting entity with AML/CFT Regulators and FIUs. Most importantly, delegates will master the investigative techniques and approaches of ML and FT crimes. This highly interactive workshop will ensure delegates walkway with the skills and knowledge of combating ML and FT.

What you will learn from this Masterclass:

  • GAIN INSIGHTS into financial sectors role in supporting government’s Anti-Money Laundering (AML) and Counter Financing Terrorism (CFT).
  • IDENTIFY AND DIFFERENTIATE the difference between Money Laundering (ML) and Financing Terrorist (FT) concepts, principles and techniques.
  • RECOGNISE the stages of ML and FT and how their origins in criminal activities can be disguised to avoid being detected.
  • EXAMINE the risks terrorism financing present, ASSESS these risks and what challenges jurisdictions are facing in COMBATING ML and FT effectively.
  • CEASE terrorist revenue and funding streams from entering formal financial markets with effective investigation techniques.
  • STRENGTHEN the role of private sector stakeholders in identifying and disrupting money launder and terrorism financing.
Who will attend
  • AML/CFT Analyst
  • Conduct, Compliance and Operational Risk Officer
  • Financial Crime Officer
  • Financial Investigation and Intelligence Officer
Trainer

Expert Trainer has accumulated over 40 years of expertise in the field of investigating financial crime and combating money laundering and terrorist financing. 

Expert Trainer has been engaged full time as consultant on Anti Money Laundering/Counter Financing of Terrorism (AML/CFT) having worked in over 20 countries during the past seven years while working with the International Monetary Fund (IMF), World Bank (WB), United Nations Office on Drugs (UNODC SE Asia Counter Financing of Terrorism Programme, Bangkok), UN Global Money Laundering Programme (UNGPML – Namibia) and, the UN Counter Terrorism Sanctions Implementation Working Group for Implementation of the UNSCR 1267 and 1373 Security Council CFT Sanctions (New York).

In a consulting role, Expert Trainer has provided technical assistance to support governments strengthen AML/CFT regimes including developing national strategies and policies, strengthen laws and building the capacity of law enforcement, FIU’s, prosecutors and other related AML/CFT stakeholders to combat ML and FT. 

Expert Trainer is a trained FATF evaluator (qualified in 2013) and has participated as the FIU and law enforcement expert in the FATF country mutual evaluations of South Africa, Thailand and Philippines. 

Case Studies

Practical Exercise (s)

  • Group Exercise ML and FT practical exercise which encourages participants “to think how terrorist financers take advantages of vulnerabilities and weaknesses in AML/CFT regimes
  • Group Exercise ML and FT practical exercise which encourages participants “approaches to conducting ML/FT investigations”
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Workshop venue to be confirmed. 

Industry Insights
Brochure Download


Designing CCTV Security Systems

Designing CCTV Security Systems
Overview

This Design CCTV Security System Masterclass is designed to help delegates the necessary skills on how to clearly define their CCTV design outcomes and requirements. This Masterclass highlights the principles behind CCTV design and system implementation. It addresses the problems associated with poorly designed systems and the necessary tools and approaches to mitigate such risks. Case studies covered in this Masterclass is based from the instructor’s own security design experiences and practical exercises are used throughout to reinforce learning points.

The key focus area this Masterclass will cover include:

  • IDENTIFY key metrics to put in place to measure CCTV performance and benefits.
  • UNDERSTAND the steps involves in a CCTV system, from light entering a camera lens, to video transmission to post-incident investigation.
  • ESTABLISH the topology and equipment involved in a medium to large scale IP CCTV system.
  • GAIN INSIGHTS into the definition of various technical parameters commonly seen on CCTV system.
  • EXAMINE how video surveillance systems form part of the IoT and cyber security risks that need to be mitigated
Who will attend

The workshop is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Installation engineers
  • Maintenance engineers
  • Managers
  • Operators
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Supervisors
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.
Trainer

Expert Trainer is a highly qualified executive security and risk professional with an extremely wide breadth of experience providing security risk management consulting to sectors including defence, government, critical infrastructure, ports and marine, resources, data centres, mixed use developments, mass rapid transport, aviation, health, and education.

Expert Trainer’s experience spans the Asia Pacific and the Gulf (GCC) and regions, where he has applied a strong combination of technical, project management and business development skills.

During his time at Aurecon in Canberra (Australia’s political capital), Expert Trainer played key roles in advising state Government and Defence clients across a wide variety of projects. Highlights include leading the design of Canberra’s whole-of-city CCTV System over 2 years and performing security surveys of Defence facilities across Australia storing weapons, munitions and explosives.

He also undertook security design for the Australian Federal Police to house narcotics, firearms and seized contraband. Apart from that, Expert Trainer advised Australian Customs regarding the use of CCTV, geo-spatial crime statistical analysis for law enforcement and a rapid 150 camera CCTV System design for Oasis Hospital in the United Arab Emirates.

Expert Trainer has also advised Department of Defence RAAF Base on Tindal CCTV Design where he designed a high-performance CCTV, based on the Honeywell DVM platform for the Base perimeter and Jet Fighter Ordnance Loading Aprons.

He has also led the security design for the WA State iconic building One40 William, a 20-storey building with construction cost of $216M. The security was tailored to WA State specific requirements and included CCTV, access control, alarm and entrance control technology.

Case Studies

HIGH IMPACT LEARNING - EXERCISE

Participants will perform a theoretical design exercise with due consideration to camera placement, field of view, resolution, bandwidth and storage.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Venue to be confirmed.

Industry Insights
Brochure Download


Managing Internet of Things (IoT) Security Risks

Overview

This 2-day Managing Internet of Things (IoT) Security Risks Masterclass provides delegates a strategic understanding on the new threats and paradigms emerging from IoT while guiding on the right approaches in handling such threats. Due to the nature of IoT and its ubiquity, security needs to be addressed in a fundamentally different way; the devices are no longer important, but their data is. Based on the zero-trust networking, assume breach and cattle-vs-pets paradigms, this Masterclass will help delegates look at IoT security in a whole different way. 

What you will learn from this Masterclass:

  • Recognise the new threats IoT pose for an enterprise
  • Identify the threats and limitations at the technical level
  • Integrate IoT security in your existing security management
  • Determine proper responses to IoT threats
  • Refocus your security efforts to stay in control
Who will attend
  • Corporate Business Continuity
  • Corporate Infrastructure
  • Information Security 

  • Information Security and Risk

  • Network administrators
  • Network Architecture
  • Network Security Systems
  • Network Services

  • Payment and Fraud
Security
  • Payment Systems & Risk
Group
  • Security Programme
  • Security
Information Security Policy
  • System Administration
Trainer

Armed with more than 30 years of experience in this industry, Expert Trainer is an independent security consultant. Expert Trainerhas been involved in many large-scale projects including mobile security, banking security, industrial automation, covering technical and non-technical aspects.

Expert Trainer started as a technical security tester and has delivered courses on mobile security in Abu Dhabi, Kuala Lumpur, Singapore and Capetown. He has international experience in most European countries, the Caribbean, Asia and the Middle East.

Expert Trainer has consulted a large number industries ranging from ministries of Dutch government, utilities companies, banking sectors, Europol, payment providers, and Dutch Telecom operators.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download