Advanced Outcome-based Contracting

Outcome based Contracting
Overview

Being listed as one of the best sourcing principals when buying services, Ministry of Manpower (9 March 2017), this training is specifically designed to help attendees gain a strategic understanding on Outcome Based Contract. 

Day 1 of the workshop will start by setting the theoretical foundation for the program and the supporting sourcing/contracting models before focusing on the importance of internal alignment and communication with stakeholders.  It will then move on to how organisations can action their strategy in the approaches they make to the marketplace via suitable ‘Request For …’ models (such as Request for Proposal or Request for Partner).  How to assess submissions or prospective suppliers/service providers will be illustrated using a number of approaches that are drawn from a wide range of sources.  Finally, the day will conclude by reviewing in detail the Relationship First/Contract Second approach via the ‘Getting to We’ model for relationship development.

Day 2 will introduce the collaborative, performance based and relational contracting.  Called the Vested Outsourcing model, it is defined by both solid economic theory underpinnings and a raft of successful case studies from around the world.  Participants will be introduced to the 10-step process for developing a Vested Deal, the structure of such a deal and the contents of each step.  Important elements such as the ‘Requirements Roadmap’, Pricing Model (versus just a price) and Governance Structures will be covered in depth.  Finally, the last session will bring together everything covered earlier in to a call to action to develop a strategy and implementation plan.

What will you learn from attending this workshop:

    • Understand the different types of contractual arrangements that are available.
    • Learn how a collaborative, performance based and relational contract will outperform a transactional arrangement in the right circumstances.
    • Adopt the right tools to to assess your situation and requirements so you can choose the right contractual model.
    • Select the right ‘Go to Market’ approach to find a partner/supplier that is consistent with your chosen contracting method.
    • Identify and execute a step-by-step guide to developing the right kind of relationships that will support the collaborative, performance based and relational style of contracts.
    • Adopt the Vested Outsourcing model of collaborative, performance based and relational contracting.
Who will attend

Professionals, Heads of Departments, Managers, Executives responsible for

  • Contracts
  • Maintenance
  • Operations
  • Procurement
  • Projects
  • Purchasing
  • Sourcing
  • Supply management

Examples of job titles:

  • CEO, COO, General Manager
  • Purchasing Director/ Manager
  • Procurement Director / Manager
  • Purchasing Manager
  • Senior Buyer
  • Supply Chain Manager
  • Logistics Manager
  • Contracts Manager
  • Commercial Manager
  • Business Manager
Trainer

Course Trainer is an experienced, commercially orientated and well qualified Supply Chain and Business Leader with corporate and consulting experience in Australia, Asia, USA and Europe. Course Trainer has wide ranging experience in Automotive, Health, SME, Manufacturing and Distribution Businesses. He has in-depth knowledge of advanced business techniques such as Kaizen, TQM, 6Sigma/Lean, Line of Site and Hoshin Kanri. During his career Andrew has identified and implemented best practice processes such as Advanced Planning, CPFR, Vendor Managed Inventory (VMI), DIFOT measurement, Supply Chain Assessments, SCOR and Supply Chain Risk Management and Assessment. Andrew’s experience in Supply Chain improvement techniques such as Value Stream Mapping, 5S, Activity Based Mapping and Analytics have delivered measurable benefits for employers and clients. He has also had responsibility for developing global strategic plans in a Fortune 500 corporation.

Course Trainer works with clients from industries such as automotive, logistics, health and agricultural production businesses to find improvement opportunities in their supply chain operations.  He also assists partners is setting up collaborative relational contracts as a deal coach. He has also written a number of articles for magazines and whitepapers and case studies.  Collaborative and relationship based contracting is a passion of Course Trainer 's and he has spoken at a number of conferences and run numerous workshops on this subject.

Case Studies

Case Studies in Vested Outsourcing, Government and Private Sector examples

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights

Outcome-based procurement to be introduced in selected sectors: MOF
Read more at http://www.channelnewsasia.com/news/singapore/outcome-based-procurement-to-be-introduced-in-selected-sectors-m-8087926

Singapore to introduce outcome-based procurement

Read more at https://procurementandsupply.com/2016/05/singapore-introduce-outcome-based-procurement/

Brochure Download


Engineering, Procurement, Construction (EPC) Contract Management

Engineering, Procurement and Construction Contract Management
Overview

A three-day masterclass that will give delegates a thorough understanding of the nature of EPC contracting and the kinds of projects which normally require this approach. There will be an examination of how to analyse and apportion construction risks and the opportunity to gain a knowledge of the key provisions used in EPC contracts for the management of risk.

Using case studies, delegates will learn some of the main practical steps in successful contract negotiation and administration. Attendees will also become familiar with strategies for mitigating/avoiding the effects of construction disputes.

What you will learn from this Masterclass:

  • UNDERSTAND how to select the optimal form of contract for any given project.
  • RECOGNISE the necessary steps in administering an EPC contract to achieve completion on time and within budget.
  • BECOME FAMILIAR with the forms of contract which provide the fairest and most bankable balance of risk: a summary of the main features of the FIDIC 2017 edition silver book.
  • ABILITY to deal with cost overruns, claims and delays in a timely and collaborative manner.
  • IDENTIFY design risk, design obligations and other key provisions in EPC contracts. Gaining a familiarity with anticipated negotiating positions of owners and contractors.
  • MASTER how to allocate risk using a risk register and putting in place a contractual structure which effectively regulates the relationships between the parties.
  • IDENTIFY the essentials of EPC contracting and the most beneficial applications of this approach.
  • EXPERIENCE the use of mediation, dispute adjudication boards and other methods of minimising claims and disputes.
Who will attend
  • Project Managers.
  • Project Engineers.
  • Quantity Surveyors.
  • Commercial Managers and Directors.
  • General Counsel .

And other Professionals active in process engineering, water treatment, waste management, power generation, oil and gas, petrochemicals and other industries involving the operation of industrial plant.

 

 

 

 

Trainer

Armed with over 30 years of experience in construction law, Expert Trainer is an experienced legal consultant advising on projects and resolving disputes in the UK and internationally. His advisory work has included assisting governments and government entities, local authorities, lenders, consortia and concession companies, developers, engineers and contractors.

He has extensive knowledge of the principal sectors engaged with the construction industry, and a close understanding of the forms of contracts (and related legal materials) it uses, their structure and how they function in allocating risk.

Expert Trainer represents clients on construction industry disputes and in commercial transactions where construction is the major element. He has advised all the main sections of the industry on a very wide portfolio of cases. They have included resolving a complex mediation with several participants, an adjudication for a joint venture employer, negotiating a complex multi party EPC contract for an LNG terminal in India and politically sensitive contract documents for an iconic civic building in Hong Kong.

Case Studies

HIGH IMPACT LEARNING - Case Study 1

LNG fired Power Generation Scheme (1).

HIGH IMPACT LEARNING - Case Study 2

LNG fired Power Generation Scheme with multiple contracts (2).

HIGH IMPACT LEARNING - Case Study 3

Case study on DABs.

HIGH IMPACT LEARNING - Class Exercise

Practical exercise in compiling a risk register.

HIGH IMPACT LEARNING - Class Exercise

Practical example of assembling tender invitation documents.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Pre-Attack Flags and Indicators of Jihadist Extremism

Pre-Attack Flags and Indicators
Overview

“Pre-Attack Flags and Indicators and the Future of Jihadist Extremism” is specifically developed to provide delegates a strategic understanding of Jihadist Extremism. Delegates will first learn about the history and evolution of Jihadist activities and the buildout of ISIS from 2003 to present. Delegates will also analyse the relevant actors in the current Jihadist Movement.

On day 2, delegates will also gain an insight of Jihadist ideology/mindset where they will examine the 10 indicators of Jihad (Pre-Attack). Most importantly, delegates will identify and execute the appropriate counter-terrorism strategies/ approach while anticipating the future of Jihad in Southeast Asia.

What you will learn from this workshop:

  • Comprehensive understanding of the pre-attack indicators of terrorism.

  • History of Jihad and its evolution into modern society.

  • Mechanics and nuances of the Jihadist ideology and mindset.

  • History of ISIS and its anticipated future state.

  • ISIS foreign fighter flow as it relates to Asia.

Who will attend

Counterterrorism/Law Enforcement, Risk Managers, Security Managers, Counterterrorism Policy Makers.

Trainer

A former informant and now expert with experience in radicalisation, deradicalisation, countering violent extremism (CVE), National security and Counter-terrorism. Course Trainer was born and raised in Canada, growing up with two conflicting and competing cultures. At the age of 19, he went to India and Pakistan where he had a chance encounter with the Taliban before their takeover of Afghanistan in 1995.  Course Trainer became fully radicalised as a supporter of the global Jihadist culture, recruiting others but the 9/11 attacks forced to him reconsider his views. He spent 2 years in Syria, continuing his study of Arabic and Islamic Studies and went through a period of full deradicalisation.

Returning to Canada in 2004, he was recruited by the Canadian Security Intelligence Service (CSIS) and worked several CLASSIFIED infiltration operations on the internet, in chat-protected forums and on the ground with human networks.  In late 2005, one of those intelligence files moved to the Royal Canadian Mounted Police (RCMP), Integrated National Security Enforcement Team (INSET) for investigation. The "Toronto 18" terrorism case resulted in the conviction of 11 aspiring violent extremists after testifying over 4 years, in 5 legal hearings at the Ontario Superior Court of Justice.

Course Trainer has since obtained a Master of Policing, Intelligence and Counter Terrorism (MPICT). He is now an external SME (Subject Matter Expert) on national security and counterterrorism to the Command Staff of CENTCOM, the United Nations Security Council & Counter Terrorism Executive Directorate and trains police, intelligence and special operations forces on relevant topics. He has appeared on multiple U.S., British and Canadian media outlets (CNN, CBC, ABC and NBC) as a commentator and is extensively involved with the ISIS social media and Foreign Fighter file, including Returnees and rehabilitation.

Case Studies

Case studies specific to SEA realm will be discussed in the workshop. 

Partners

 

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Building Counter-Terrorism Leadership Team

Building Counter-Terrorism Leadership Team
Overview

This 2-day “Building Counter-Terrorism Leadership Team” training is to provide delegates a practical knowledge of how to formulate a coherent leadership team against the back drop of countering terrorism. The first day of the workshop will help delegates identify the key skills of a leader and factors that could affect morale of its team members. Delegates will also learn about intelligence team where they will understand the role of information and intelligence play in leadership decision making.

In addition, the trainer will go through the process from planning to operations and issues arise during this process and how should delegates respond to change. To enhance delegates’ learning experience, each day’s sessions is followed by discussion and exercises preparation as well as table top exercises drawing examples from recent life events.

What you will learn from this workshop:

  • Establish the key soft skills of a leader and composition of a team.
  • Identify the differences between Insurgency and countering terrorism.
  • Comprehend the development of policies for countering terrorism.
  • Adopt the strategies that suits one organisation.
  • Recognise the role of information and intelligence play in leadership decision making.
  • Discover issue raised from planning to operations and the role of leader in building a successful leadership team.

 

Who will attend

The workshop is aimed at security practitioners, policing services and organisations who have a responsibility for developing effective leadership teams responsible for countering terrorism from the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking
Trainer

Course Trainer is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks.

Prior to working in the security design world, Course Trainer completed 13 years with the British Army in 2003, working within the Security and Intelligence fields.  Operating within a number of diverse environments, including the Former Yugoslavia where he was responsible for developing operational & crises response plans for the extraction staff from areas of responsibility.  Key to this was the development of a risk management process linked to accurate intelligence reporting that enable constant situational reviews.  Between deployments Course Trainer developed the UK based training to accommodate other NATO Countries supporting JCO operations. 

Course Trainer was awarded top student on British Army Leadership Course, a physically and mentally intensive course conducted in the most severe and challenging conditions offered by the Brecon Beacons. Course Trainer was praised by instructors for the ability to overcome problems and motivate other team members.

As a member of ASIS International UK Chapter, Course Trainer was nominated to be a member of the executive writing team completing an American National Standard for the management of Physical Assets Protection programmes. Course Trainer has also worked as part of the technical committee for the Private Security Contractors Standard (PSC) that has been adopted by the UK Foreign and Commonwealth Office as a benchmark process.

Case Studies

Operation Oak – The Rescue of Benito Mussolini

Using this case study candidates will discuss the formation of the team and look at the planning issues around the rescue for Mussolini during WW2’

Excision – German Attack on Tito’s HQ In WW2

Using this case study candidates will discuss why merits and impacts of the mission in relation to counter insurgency operations’

The Insider Threat

Using a number of recent open source examples from the Southeast Asia region, candidates will discuss how the team leadership can influence counter terrorism activities.

Society and Crime in relation to terrorism

Using open source information from the Southeast Asia region candidates will discuss the societal and crime changes that could influence changes in terrorism.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Mitigation Strategies for Vehicle Borne Threats

Mitigation Strategies for Vehicle Borne Threats
Overview

This 2-day in-depth and hands-on workshop is designed to help delegates gain a strategic understanding of how to formulate a coherent strategy based upon International Standards and best practices of mitigation measures for vehicle borne threats.  This workshop will also consider the issues for deploying vehicle mitigation measures within the built environment.

To enhance delegates’ learning experience, each day’s taught sessions is followed by discussion and exercises preparation.

What you will learn from this workshop:

  • Distinguish different methods of attack.
  • Determine the constraints for planning vehicle mitigation measures.
  • Learn how to define the strategy for deployment.
  • Gain in-depth understanding of the process for selection and deployment of physical controls.
  • Master the process for developing procedural controls for the operation of physical controls.
  • Recognise security risk and credible threat.
  • Identify site constraints affecting possible mitigative measures.
  • Apprehend the dynamics of potential vehicle impact.
  • Understand the use of landform to reduce impact velocity.
  • Recognise third party standards, testing regimes and product types.
  • Apply the above in a practical exercise setting.

 

Who will attend

This workshop is aimed at:

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

From the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  •  Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers. Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a Security Design Strategist. In the last four years, he has been involved in the security design of three first class football stadium, a railway station, a student campus, a group of London theatres and an iconic tourist venue.

Prior to this he had 20 years practice as a police crime prevention officer and crime prevention design advisor in London. He was senior crime prevention design advisor to Metropolitan Police Specialist Operations. Trainer 2 draws upon extensive experience with the Metropolitan Police, and holds internal UK Government Home Office qualifications in crime prevention and counter-terrorism design techniques alongside independent academic qualifications in crime prevention and environmental design. He is used to working in environments requiring confidentiality and has been vetted to 'SC' level.

Case Studies

The World Trade Centre 1993 bombing

Iconic static target: Home-made explosive delivered by encroachment during the “business as usual” phase of activity-how practical is eternal vigilance? How and where could countermeasures be deployed?

Nice attack: Promenade des Anglais, Bastille Day 2016

Vehicle attack on a national public occasion/ example of attack method displacement where control measures had limited access to explosives -can we predict which potential targets to protect?. How do we define the target in these circumstances-what mitigation could be used and what might be practical?

The London 2012 Olympics

A practical exercise with maps of a massive complex target, this exercise will consider the three phases of construction, event and legacy focussing on access in the urban landscape, critical assets and crowded places.

London Borough Market Attack

An opportunity to discuss changing attack methodologies and opportunities to reduce their effect in a practical context.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


The Art of Negotiating Commercial Contracts

The art of negotiating commercial contracts
Overview

Contracts are a critical part of all businesses, in which commercial obligations are recorded and enforced. Most contracts of any complexity arise through a process that includes negotiation. The purpose of this intensive training is to equip delegates on negotiation process in the context of contracts (and disputes arising out of contracts) and demonstrate how a fairly straightforward improved technique can lead to better outcomes for your company.

The training will look at the basics of how contracts are formed, as this is crucial to gain an understanding of what points to be negotiated. It will also look at how you should prepare for negotiation, and what work is needed before you enter a negotiation.

 

Key Takeaways from Attending This Workshop:

  • Understand why contracts are used and how they are formed.
  • Appreciate different approaches in different legal systems and cultures.
  • Ensure you are dealing with people with appropriate authority.
  • Explore the importance of negotiation preparation and techniques.
  • Learn how negotiation fits in with different methods of procurement.
  • Identify how to set appropriate targets in negotiations.
  • Analyse the different roles used in negotiations.
  • Gain practical techniques for improving negotiation and ensuring desired outcome.
  • Resolve dispute through appropriate negotiation to avoid courts and arbitration.
  • Discover latest techniques in dispute resolution negotiation including mediation.
Who will attend
  • Legal Managers
  • Contracts Managers
  • Contracts Administrators
  • Commercial Managers
  • Corporate Counsels
  • Lawyers
  • Legal Advisors
  • Compliance Officers
  • Purchasing Manager
  • Procurement Managers
  • Business Development

From across ALL the industries and all those involved in the negotiation, drafting and management of commercial business contracts.

Trainer
Case Studies
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Venue to be confirmed.

Industry Insights
Brochure Download


Reading Suspicion Indicators & The Adversary’s Method of Operations, Singapore

Reading Suspicion Indicators - Singapore
Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will come out with the ability to articulate “gut feeling” into clear definitions of Suspicion Indicators and Adversary’s Methods of Operations allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who will attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

With the following job titles:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security

 

Trainer

Workshop Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Workshop Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Workshop Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. Kim is a member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.

Workshop Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’

 

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download