Building Counter-Terrorism Leadership Team

Building Counter-Terrorism Leadership Team
Overview

This 2-day “Building Counter-Terrorism Leadership Team” training is to provide delegates a practical knowledge of how to formulate a coherent leadership team against the back drop of countering terrorism. The first day of the workshop will help delegates identify the key skills of a leader and factors that could affect morale of its team members. Delegates will also learn about intelligence team where they will understand the role of information and intelligence play in leadership decision making.

In addition, the trainer will go through the process from planning to operations and issues arise during this process and how should delegates respond to change. To enhance delegates’ learning experience, each day’s sessions is followed by discussion and exercises preparation as well as table top exercises drawing examples from recent life events.

What you will learn from this workshop:

  • Establish the key soft skills of a leader and composition of a team.
  • Identify the differences between Insurgency and countering terrorism.
  • Comprehend the development of policies for countering terrorism.
  • Adopt the strategies that suits one organisation.
  • Recognise the role of information and intelligence play in leadership decision making.
  • Discover issue raised from planning to operations and the role of leader in building a successful leadership team.

 

Who will attend

The workshop is aimed at security practitioners, policing services and organisations who have a responsibility for developing effective leadership teams responsible for countering terrorism from the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking
Trainer

Course Trainer is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks.

Prior to working in the security design world, Course Trainer completed 13 years with the British Army in 2003, working within the Security and Intelligence fields.  Operating within a number of diverse environments, including the Former Yugoslavia where he was responsible for developing operational & crises response plans for the extraction staff from areas of responsibility.  Key to this was the development of a risk management process linked to accurate intelligence reporting that enable constant situational reviews.  Between deployments Course Trainer developed the UK based training to accommodate other NATO Countries supporting JCO operations. 

Course Trainer was awarded top student on British Army Leadership Course, a physically and mentally intensive course conducted in the most severe and challenging conditions offered by the Brecon Beacons. Course Trainer was praised by instructors for the ability to overcome problems and motivate other team members.

As a member of ASIS International UK Chapter, Course Trainer was nominated to be a member of the executive writing team completing an American National Standard for the management of Physical Assets Protection programmes. Course Trainer has also worked as part of the technical committee for the Private Security Contractors Standard (PSC) that has been adopted by the UK Foreign and Commonwealth Office as a benchmark process.

Case Studies

Operation Oak – The Rescue of Benito Mussolini

Using this case study candidates will discuss the formation of the team and look at the planning issues around the rescue for Mussolini during WW2’

Excision – German Attack on Tito’s HQ In WW2

Using this case study candidates will discuss why merits and impacts of the mission in relation to counter insurgency operations’

The Insider Threat

Using a number of recent open source examples from the Southeast Asia region, candidates will discuss how the team leadership can influence counter terrorism activities.

Society and Crime in relation to terrorism

Using open source information from the Southeast Asia region candidates will discuss the societal and crime changes that could influence changes in terrorism.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Mitigation Strategies for Vehicle Borne Threats

Mitigation Strategies for Vehicle Borne Threats
Overview

This 2-day in-depth and hands-on workshop is designed to help delegates gain a strategic understanding of how to formulate a coherent strategy based upon International Standards and best practices of mitigation measures for vehicle borne threats.  This workshop will also consider the issues for deploying vehicle mitigation measures within the built environment.

To enhance delegates’ learning experience, each day’s taught sessions is followed by discussion and exercises preparation.

What you will learn from this workshop:

  • Distinguish different methods of attack.
  • Determine the constraints for planning vehicle mitigation measures.
  • Learn how to define the strategy for deployment.
  • Gain in-depth understanding of the process for selection and deployment of physical controls.
  • Master the process for developing procedural controls for the operation of physical controls.
  • Recognise security risk and credible threat.
  • Identify site constraints affecting possible mitigative measures.
  • Apprehend the dynamics of potential vehicle impact.
  • Understand the use of landform to reduce impact velocity.
  • Recognise third party standards, testing regimes and product types.
  • Apply the above in a practical exercise setting.

 

Who will attend

This workshop is aimed at:

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

From the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  •  Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers. Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a Security Design Strategist. In the last four years, he has been involved in the security design of three first class football stadium, a railway station, a student campus, a group of London theatres and an iconic tourist venue.

Prior to this he had 20 years practice as a police crime prevention officer and crime prevention design advisor in London. He was senior crime prevention design advisor to Metropolitan Police Specialist Operations. Trainer 2 draws upon extensive experience with the Metropolitan Police, and holds internal UK Government Home Office qualifications in crime prevention and counter-terrorism design techniques alongside independent academic qualifications in crime prevention and environmental design. He is used to working in environments requiring confidentiality and has been vetted to 'SC' level.

Case Studies

The World Trade Centre 1993 bombing

Iconic static target: Home-made explosive delivered by encroachment during the “business as usual” phase of activity-how practical is eternal vigilance? How and where could countermeasures be deployed?

Nice attack: Promenade des Anglais, Bastille Day 2016

Vehicle attack on a national public occasion/ example of attack method displacement where control measures had limited access to explosives -can we predict which potential targets to protect?. How do we define the target in these circumstances-what mitigation could be used and what might be practical?

The London 2012 Olympics

A practical exercise with maps of a massive complex target, this exercise will consider the three phases of construction, event and legacy focussing on access in the urban landscape, critical assets and crowded places.

London Borough Market Attack

An opportunity to discuss changing attack methodologies and opportunities to reduce their effect in a practical context.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Reading Suspicion Indicators & The Adversary’s Method of Operations, Singapore

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will come out with the ability to articulate “gut feeling” into clear definitions of Suspicion Indicators and Adversary’s Methods of Operations allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who will attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

With the following job titles:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security

 

Trainer

Workshop Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Workshop Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Workshop Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. Kim is a member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.

Workshop Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’

 

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Reading Suspicion Indicators & The Adversary’s Method of Operations, Malaysia

Reading suspicion indicators
Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will come out with the ability to articulate “gut feeling” into clear definitions of Suspicion Indicators and Adversary’s Methods of Operations allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who will attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

With the following job titles:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security

 

Trainer

Workshop Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Workshop Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Workshop Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. Kim is a member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.

Workshop Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’

 

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

The Ritz-Carlton

168, Jalan Imbi,

55100, Kuala Lumpur,

Malaysia

Tel: (6) 3142 8000

http://www.ritzcarlton.com/en/hotels/malaysia/kuala-lumpur

Industry Insights
Brochure Download