[Expert-Led Masterclass] Influence Operations Targeting Critical Infrastructure

Overview

Highlights:

  • Intensive 3 day in-person course
  • Facilitated by two intelligence experts
  • Certificate of Completion

What you will learn from this Masterclass:

  • APPLY advanced analytical frameworks for identifying cognitive deception and threats.
  • UTILIZE necessary strategies and tactics to understand the risks and build a structured defence against hostile Disinformation and Deception Campaigns.
  • UNDERSTAND emerging threat vectors, such as AI-generated disinformation campaigns and the utilization of authentic .
  • IDENTIFY the key tell-tale signs of digital forgeries and false narratives.
  • MEASURE your cognitive awareness and judgement to implement effective heuristics and decision-making.
  • NAVIGATE the dynamic threat actor landscape of the world of Information Warfare.
  • PERFORM Disinformation Network Analysis and   against future attacks.
Who should attend

Directors, Head of Departments, Key Stakeholders with responsibilities in:

  • Military Intelligence Investigations
  • LE and Intelligence Analysts
  • National Security Analysts
  • Journalists
  • Academic Researchers
  • Policy Managers
  • Diplomats
  • Liaison Officers
  • Crisis Communications and PR Departments
  • Information Security Analysts
  • Insider Threat Analysts
  • Legal
  • Network Administration
  • Physical Security
  • AI/ML Engineers
Trainers

Our first Expert Trainer was the former Head of the Intelligence Division,  IDF Intelligence

He has more than 25 years of experience of Military Intelligence Tradecraft Expert. Skilled and experienced in a number of collection methodologies and analysis, including SIGINT and Open-Source and Web Intelligence.

  • Head of Strategic Branch, Research and Analytics Division, Israel Defense Forces
  • Extensive track record in heading and implementing intelligence, research and risk-analysis based policy and strategy and integrating holistic technological solutions.
  • Web Intelligence instructor. Builder and Consultant to governments
    and companies around the world on Social Media intelligence (SOCMINT) and WEBINT tools.
  • Attaché, Israeli Embassy, Washington, DC.
  • A skilled and experienced in several collection methodologies and analysis, including SIGINT and Open-Source and Web Intelligence.
  • Passionate about the intersection of research, analysis and technology and their impact on real-world decision making.
  • Currently a Senior  Research Fellow at the Abba Eban Institute of International Diplomacy.

Our second Expert Trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

The course will include high-level Academic studies with practical, hands-on experience. 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue for this in-person course after registration.

For more information, write to hello@q8asia.com.sg

Brochure Download


[Expert Led Masterclass] Mastering Video Surveillance Systems

Overview

Gain invaluable insights into the latest advancements in VSS technology, including camera types, video analytics, and situational awareness in this masterclass.  Apply what you learned from real-world scenarios and VSS techniques to detect and prevent intrusions, monitor critical areas, and responding effectively to incidents. 

Equip yourself with the knowledge and skills to design and implement cutting-edge VSS solutions that address the evolving security landscape.

  • UNDERSTAND the intention and elements of Video Surveillance Systems (VSS), including situational awareness, intrusion detection, life-safety elements, and the impact of artificial intelligence.
  • MASTER VSS and security network design considerations, such as bandwidth, cabling options, power requirements, equipment location, data storage, and information security.
  • EXPLORE coverage zone planning to meet operational requirements.
  • DETERMINE system requirements based on operational needs, including resolution, lighting, and analytics requirements.
  • IDENTIFY layout and location planning considerations, including environmental factors and accessibility.
  • DESIGN monitoring and control locations, considering incident response and ergonomic factors.
  • LEARN about post-incident analysis using recorded footage features.
  • GAIN INSIGHTS into stakeholder requirements and operational considerations that inform system specifications.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers
Trainer

Our Expert Trainer is a skilled security system professional with over 15 years of security system design and implementation experience in various sectors, including expansive public realm systems, high value office and museum developments as well as government and military systems. 

He is fully versed in current security technologies and developments of such systems, capable of designing systems of various complexities and providing information of suitable quality for the whole design process, from concept through to construction level information.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert Led Masterclass] Security Design for Critical Infrastructures & Public Spaces

Overview

This two-day in-depth and hands-on workshop designed to equip you with the essential expertise, knowledge, and strategies for designing foolproof security systems. 

Tailored for those involved in the construction of critical infrastructures and public spaces, you will gain timely insights and practical strategies to effectively safeguard these vital assets.

  • DETERMINE the evidence required to demonstrate security.
  • UNDERSTAND of the Security Management approach to safeguard assets and business processes.
  • INSIGHTS into different modes of operation and their impact on security.
  • IDENTIFY of how facility surroundings can affect security.
  • DEFINE user groups and their security needs.
  • KNOWLEDGE of facility security constraints and objectives.
  • APPLY Operational Requirements (ORs) to inform security system requirements.
  • GAIN AWARENESS of the security risks associated with critical infrastructures and public spaces.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers

Professionals from the following sectors:

  • Airport, ports, rail
  • Diplomatic service
  • Education institutions & schools
  • Financial institutions & data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & border control
  • Oil & gas infrastructure
  • Power plant and public utilities
  • Retail, sports and hospitality sectors
Trainer

Expert Trainer has 24 years of experience in security related field. A Chartered Security Professional, he is a member of Lead writing team for ASIS International Physical Assets Protection Standard. He has designed security for the London 2012 Olympic Games Main Stadium, which was the
first stadium to achieve a Secured by Design award.

 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert-Led Masterclass] Reading Suspicious Indicators & The Adversary’s MO

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will learn more about Suspicious Indicators and Adversary’s Methods of Operations, allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will also learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who should attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

Professionals such as:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our  Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. The Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

He is a

  • Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates
  • Registered NSW security trainer.
  • Member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.
  • Regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.
Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’
Partners

Training Partner:

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Details will be sent to attendees closer to the date of the course.

Brochure Download


[Expert-Led Masterclass] Reading Suspicious Indicators & The Adversary’s MO

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will learn more about Suspicious Indicators and Adversary’s Methods of Operations, allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will also learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who should attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

Professionals such as:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our  Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. The Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

He is a

  • Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates
  • Registered NSW security trainer.
  • Member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.
  • Regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.
Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’
Partners

Training Partner:

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Details will be sent to attendees closer to the date of the course.

Brochure Download


[Expert-Led Masterclass] CTI and Investigations for Analysts & Opsec

Overview

Highlights:

  • Intensive 3 day in-person course
  • Certificate of Completion

What you will learn from this Masterclass:

  • DISTINGUISH Threat Actors & Kill Chains
  • DISCOVER Dark Web, Deep Web & Clearweb Sources
  • DEFINE Emerging Threat Vectors, Such As AI-Generated Disinformation Campaigns
  • CREATE Active Avatars For CTI
  • ENHANCE Advanced OpSec And Virtual HUMINT Practices
  • NAVIGATE Online Infrastructure Investigations and Malign Domains
  • EXPOSE Threat Actors
  • PERFORM Network Analysis And Mitigate Against Future Attacks.
Who should attend

Directors, Head of Departments, Key Stakeholders with responsibilities in:

  • Military Intelligence Investigations
  • LE and Intelligence Analysts
  • National Security Analysts
  •  Information Security Analysts
  • Insider Threat Analysts
  • Legal
  • Network Administration
  • Physical Security
  • AI/ML Engineers
Trainer

Our Expert Trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Practical exercises are integrated into each module of the course, with a capstone investigation concluding the course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This course will be held at the Grand Copthorne Waterfront Hotel, 392 Havelock Road, Singapore 169663 .

For more information, write to hello@q8asia.com.sg

Brochure Download


[Expert Led Masterclass] Effective Investigative Questioning

Overview

This 2-day workshop is aimed at equipping delegates with the necessary skills and approaches of Security Questioning. Apart from general guidelines and principals of Security Questioning, delegates will learn the how to use tactical questioning to elicit information from suspects. Through this workshop, delegates will be able to apply the skills and knowledge of Security Questioning when dealing with suspicious documentation, human resource and internal investigation.

Most importantly, this workshop will teach delegates how to identify and differentiate between someone with malicious intent and someone who is duped or coerced into committing a crime. To enhance delegates’ learning experience, this workshop includes both theoretical and simulated scenarios (field exercise) to illustrate the application of Security Questioning in day-to-day security operations.

What you will learn from this Masterclass:

  • LEARN how to use tactical questioning to uncover information and intelligence from individuals, suspects and/or convicted criminals and terrorists
  • MASTER different approaches and techniques to questioning.
  • RECOGNISE and DIFFERENTIATE someone with malicious intent and someone who is duped or coerced into becoming a mule.
  • APPLY security questioning as an investigative tool to solve an internal security incident in an organisation.
  • IMPLEMENT effective security questioning processes in your own protected environment.
Who should attend
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. He has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Our trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer.

He is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

Tabletop Exercise - Developing and Testing a Cover Story

Delegates will work in groups and receive specific assignments for developing cover stories for specific missions.  They will then be challenged by their peers in the classroom who will test the strength and reliability of the cover story and the ability of the trainee to maintain it against security questioning.

Mall Field Exercise

Delegates will be tasked with specific targets and missions for which they will use their cover stories to gain information and intelligence.

Exercise Debrief

Delegates will brief each other about their experiences in the field. They will also point out weaknesses and strengths in their cover stories and behaviors as individuals and as a group.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about the venue closer to the date of the course.

Brochure Download


[Expert Led Digital Masterclass] Cyber Warfare and Operations Design

Overview

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert-Led Masterclass] Reading Suspicious Indicators & The Adversary’s MO

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will learn more about Suspicious Indicators and Adversary’s Methods of Operations, allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will also learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who should attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

Professionals such as:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our  Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. The Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

He is a

  • Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates
  • Registered NSW security trainer.
  • Member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.
  • Regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.
Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’
Partners

Training Partner:

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Details will be sent to attendees closer to the date of the course.

Brochure Download


[Expert Led Digital Masterclass] Designing Security for New and Existing Buildings

Overview

This two-day in-depth and hands-on Masterclass will provide attendees with practical knowledge of how security risks that business assets and operations face can be understood in the context of designing out areas of risk.  The Masterclass will provide practical examples for designing physical and technical mitigation measures to protect defined assets.

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

What you will learn from this Masterclass:

  • Gain insights into the concepts in Security Risk Management within the context of securing the built environment.
  • Understand the functions of Physical Security.
  • Learn how to plan and conduct Physical Security Assessments.
  • Master the Design Principles and Practices.
  • Strengthen your organisation’s Physical Security and Protection Strategies.
Who will attend

The Masterclass is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers.  Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a highly skilled engineer and security design specialist who demonstrates strong customer focus combined with a proven commitment to the achievement of targets and business objectives. He applies excellent analytical skills, problem solving abilities, people management, communication and negotiation skills to achieve the strategic aims while delivering cost efficiency and added value. A confident member of multidisciplinary teams, he has provided engineering strategic consultancy in the construction sector in Europe and the Middle East across a range of sectors. His designs incorporate advanced and intuitive technologies, which integrate with the business operation and provide flexibility to adapt to the changing threat environment.

Trainer 2 specialises in technologies to support the protection of crowded spaces, such as sports venues, universities, hotels and shopping complexes. This has included development of a software program to optimise people flow through security gates for the construction phase of the 2012 Olympic Stadium, reducing procurement costs from £16M to £10M. 

Case Studies

One-to-one Consultation:

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download