[Expert Led Digital Masterclass] Designing Security for New and Existing Buildings

Overview

This two-day in-depth and hands-on Masterclass will provide attendees with practical knowledge of how security risks that business assets and operations face can be understood in the context of designing out areas of risk.  The Masterclass will provide practical examples for designing physical and technical mitigation measures to protect defined assets.

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

What you will learn from this Masterclass:

  • Gain insights into the concepts in Security Risk Management within the context of securing the built environment.
  • Understand the functions of Physical Security.
  • Learn how to plan and conduct Physical Security Assessments.
  • Master the Design Principles and Practices.
  • Strengthen your organisation’s Physical Security and Protection Strategies.
Who will attend

The Masterclass is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers.  Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a highly skilled engineer and security design specialist who demonstrates strong customer focus combined with a proven commitment to the achievement of targets and business objectives. He applies excellent analytical skills, problem solving abilities, people management, communication and negotiation skills to achieve the strategic aims while delivering cost efficiency and added value. A confident member of multidisciplinary teams, he has provided engineering strategic consultancy in the construction sector in Europe and the Middle East across a range of sectors. His designs incorporate advanced and intuitive technologies, which integrate with the business operation and provide flexibility to adapt to the changing threat environment.

Trainer 2 specialises in technologies to support the protection of crowded spaces, such as sports venues, universities, hotels and shopping complexes. This has included development of a software program to optimise people flow through security gates for the construction phase of the 2012 Olympic Stadium, reducing procurement costs from £16M to £10M. 

Case Studies

One-to-one Consultation:

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


[Expert Led Digital Masterclass] Cyber Warfare and Operations Design

Overview

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert Led Masterclass] Effective Investigative Questioning

Overview

This 2-day workshop is aimed at equipping delegates with the necessary skills and approaches of Security Questioning. Apart from general guidelines and principals of Security Questioning, delegates will learn the how to use tactical questioning to elicit information from suspects. Through this workshop, delegates will be able to apply the skills and knowledge of Security Questioning when dealing with suspicious documentation, human resource and internal investigation.

Most importantly, this workshop will teach delegates how to identify and differentiate between someone with malicious intent and someone who is duped or coerced into committing a crime. To enhance delegates’ learning experience, this workshop includes both theoretical and simulated scenarios (field exercise) to illustrate the application of Security Questioning in day-to-day security operations.

What you will learn from this Masterclass:

  • LEARN how to use tactical questioning to uncover information and intelligence from individuals, suspects and/or convicted criminals and terrorists
  • MASTER different approaches and techniques to questioning.
  • RECOGNISE and DIFFERENTIATE someone with malicious intent and someone who is duped or coerced into becoming a mule.
  • APPLY security questioning as an investigative tool to solve an internal security incident in an organisation.
  • IMPLEMENT effective security questioning processes in your own protected environment.
Who should attend
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. He has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Our trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer.

He is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

Tabletop Exercise - Developing and Testing a Cover Story

Delegates will work in groups and receive specific assignments for developing cover stories for specific missions.  They will then be challenged by their peers in the classroom who will test the strength and reliability of the cover story and the ability of the trainee to maintain it against security questioning.

Mall Field Exercise

Delegates will be tasked with specific targets and missions for which they will use their cover stories to gain information and intelligence.

Exercise Debrief

Delegates will brief each other about their experiences in the field. They will also point out weaknesses and strengths in their cover stories and behaviors as individuals and as a group.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about the venue closer to the date of the course.

Brochure Download


[Expert-Led Masterclass] Reading Suspicious Indicators & The Adversary’s MO

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will learn more about Suspicious Indicators and Adversary’s Methods of Operations, allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will also learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who should attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

Professionals such as:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our  Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. The Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

He is a

  • Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates
  • Registered NSW security trainer.
  • Member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.
  • Regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.
Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’
Partners

Training Partner:

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Details will be sent to attendees closer to the date of the course.

Brochure Download


[Expert Led Masterclass] CCTV Operator Surveillance for Security with CPTED Principles

Overview

Highlights:

  • DETECT suspicion indicators relating to their operational environment using CCTV.
  • ASSESS suspicion indicators based on known and predicted criminal and/or terrorist methods of operation.
  • CONDUCT, deploy, interact and communicate using criminal threat mitigation techniques.
  • AUGMENT the human element of security framework and enhance the safety and security of the people and the assets they serve.
  • INCREASE the perceived risk of being detected, captured and possibly arrested,
  • IMPLEMENT effective CCTV Deterrence strategies.
  • MASTER the principles of Security Surveillance through proper CCTV placement.
Who should attend

This Masterclass is ideal for the:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

About the Expert Trainer

  • Over 40 years of experience handling high-profile cases and investigations with the Singapore Police Force.
  • Recipient of awards and accolades for outstanding achievements and long service in the police force.
Case Studies

Our trainer will incorporate relevant case examples of real, local cases solved by CCTV and detective ground work  in this masterclass.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive information about the venue closer to the date of the event.

Brochure Download


[Expert-Led Digital Masterclass] Counter Improvised Explosive Devices (CIED)

Overview

Highlights:

This online Masterclass is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this Masterclass:

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainer

Our expert trainer has 30 years’ experience in both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances. He has extensive experience of IEDD, Explosive Ordnance Disposal (EOD) and Conventional Munitions Disposal (CMD) operations.

Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This class will be conducted online on Zoom. Participants will receive Zoom details  closer to the date of the course.

For enquiries, please write to hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Detecting Radicalisation and HVE via Cyber Intelligence

Overview

Highlights:

  • Intensive 4-Hour Course over 2-Days
  • Remote Access
  • On-demand Expert Knowledge
  • Accessible on mobile and TV
  • Certificate of Completion

What you will learn from this Masterclass:

Terrorism and radicalization threats rank high among the risks to any country or organisation's interests. In recent years, this threat materialised in the form of online activity by terror operatives and supporters that exploit the web and social media for funding, recruiting, incitement, radicalisation, psychological warfare and planning of terror attacks. In the future, more risks are expected, particularly in the civilian sector, due to the evolution of big data. These risks are the result of the rise of social media and instant messaging platforms, and end-to-end encryption apps. Dealing with terror attacks now requires advanced defense capabilities, including AI, big data analytics and human domain expertise.

Who should attend
  • Counterterrorism, Law Enforcement Officers & Policy Makers
  • Risk Managers, Security Personnel
  • Chief /Director/ Manager of Security
Trainers

Our first Expert Trainers is:

  • A skilled and experienced in several collection methodologies and analysis, including SIGINT and Open-Source and Web Intelligence.
  • Passionate about the intersection of research, analysis and technology and their impact on real-world decision making.
  • Currently a Senior  Research Fellow at the Abba Eban Institute of International Diplomacy.

Our second Expert Trainer is:

  • a Cyber Security and policy expert.
  • Head of the Policy and Technology Program at the Abba Eban Institute (AEI), and a Research Fellow at the International Institute for Counter-Terrorism (ICT), both at the IDC Herzliya.
  • He is also Senior Researcher at the Blavatnik Interdisciplinary Cyber Research Center (ICRC) at Tel Aviv University.
  • His research fields include Cybersecurity and Cyber Terrorism, focusing on the use of web and social media by terror organizations.
Case Studies

The course combines high-level Academic studies with practical, hands-on experience. The trainers will introduce State-of-the-Art methodology that providing the right set of tools to discover the on-line Activities of radical groups around the world.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass will be conducted remotely.
For more information, write to hello@q8asia.com.sg

 

Brochure Download


[Expert-Led Digital Masterclass] COIN Operations for Team Leader Task Force

Overview

Highlights:

  • 3 day online course, 3 hours per day
  • Classes are available on demand in October, November and December 2022.
  • Remote Access
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn at this Expert-Led Digital Masterclass:

  • Establish the key soft skills of a leader and composition of a team.
  • Identify the differences between Insurgency and countering terrorism.
  • Comprehend the development of policies for countering terrorism vs Counter Insurgency Operations
  • Adopt the strategies that suits one organisation.
  • Recognise the role of information and intelligence play in leadership decision making.
  • Discover issue raised from planning to operations and the role of leader in building a Top Notch Counter Insurgency Task Force.
Who should attend

The workshop is aimed at security practitioners, policing services and organisations who have a responsibility for developing effective leadership teams responsible for countering terrorism from the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
Trainer

Our Expert Trainer has been working, training and educating internationally in the field of anti and counter-terrorism for the past 25 years. He is a retired former
member of a counterterrorism training wing, known only as DG1.

He has been delivering education and training to International Police, Armed Forces, and Private Security Personnel including international organizations from both public and private sectors. His work has taken him through Russia, Ukraine, Kazakhstan, Latvia, Estonia, Finland, United States, Ecuador, Egypt, Poland, Bulgaria, Turkey, Greece, Italy and many more places in connection with his duties. He gives his clients a leading edge in preventing and countering the phenomenon that is International Terrorism to make the world a safer place.

Case Studies

Relevant case studies will be included in this course

Partners

Interested in partnering with us for this course, write to hello@q8asia.com.sg for partnership opportunities!

Venue

This Digital Masterclass will be conducted on Zoom.

Zoom details will be provided closer to the date of the course.

Brochure Download


[Expert-Led Masterclass] Counter Improvised Explosive Devices (C-IED) in Today’s Terror Threat Environment

Overview

Highlights:

This in-person Masterclass is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this Masterclass:

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainer

Expert Trainer has 30 years’ experience in both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances. He has extensive experience of IEDD, Explosive Ordnance Disposal (EOD) and Conventional Munitions Disposal (CMD) operations.

Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore

Brochure Download


[Expert-Led Digital Masterclass] Anti-Drone Countermeasures for Critical Infrastructures

Overview

Highlights:

  • Intensive 4-Hour Course 
  • Remote Access
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn at this Expert-Led Digital Masterclass:

  • MITIGATE against the threat of unmanned aerial systems – as drones are typically known in military contexts.
  • ASSESS the risk and vulnerabilities of drone terrorism.
  • CONSIDER all possible, innovative ways terrorists might use UAS
  • ENGAGE in a comprehensive vulnerability assessment to identify security and protection gaps.
Who should attend
  • Counterterrorism Officers
  • Law Enforcement and Intelligence Officers
  • Risk / Crisis Response Managers
  • Chief /Director/ Manager of Security
  • Chief Operations Officer
  • VP of Security
Trainer

Our Expert Trainer has been working, training and educating internationally in the field of anti and counter-terrorism for the past 25 years. He is a retired former
member of a counterterrorism training wing, known only as DG1.

He has been delivering education and training to International Police, Armed Forces, and Private Security Personnel including international organizations from both public and private sectors. His work has taken him through Russia, Ukraine, Kazakhstan, Latvia, Estonia, Finland, United States, Ecuador, Egypt, Poland, Bulgaria, Turkey, Greece, Italy and many more places in connection with his duties. He gives his clients a leading edge in preventing and countering the phenomenon that is International Terrorism to make the world a safer place.

Case Studies

Featured Case Study 1: Successful Case Study on Counter Drone Solutions on Public Venue and Critical Infrastructure

Case Study 2:  Country Action Plans and Policies on Countering Misuse of Drones

Assessing How Terrorists Are Exploiting Critical Infrastructure Vulnerabilities

Partners

FEATURE PARTNER:

Regulus Cyber was founded in 2016 with the vision of providing cybersecurity for GNSS, authenticating satellite-based navigation and timing to assure accuracy, reliability and security. Co-founders Yonatan Zur, CEO, and Yoav Zangvil, CTO, are industry veterans with diverse experience across industries including Aerospace, defense, communications and navigation systems. The company is backed by leading Venture Capital firms including Sierra Ventures, Canaan Partners, F2 capital and The Technion, Israel’s leading Technological University. (GNSS = Global Navigation Satellite Systems: GPS-USA, Galileo-Europe, BeiDou-China, GLONASS-Russia).

Website: https://www.regulus.com/

Venue

This Digital Masterclass will be conducted on Zoom.

We will be in touch closer to the date of the course with the information.

Brochure Download