Designing Security for New and Existing Buildings

Designing Security for New and Existing Buildings
Overview

This two-day in-depth and hands-on Masterclass will provide attendees with practical knowledge of how security risks that business assets and operations face can be understood in the context of designing out areas of risk.  The Masterclass will provide practical examples for designing physical and technical mitigation measures to protect defined assets.

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

What you will learn from this Masterclass:

  • Gain insights into the concepts in Security Risk Management within the context of securing the built environment.
  • Understand the functions of Physical Security.
  • Learn how to plan and conduct Physical Security Assessments.
  • Master the Design Principles and Practices.
  • Strengthen your organisation’s Physical Security and Protection Strategies.
Who will attend

The Masterclass is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

 

 

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers.  Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a highly skilled engineer and security design specialist who demonstrates strong customer focus combined with a proven commitment to the achievement of targets and business objectives. He applies excellent analytical skills, problem solving abilities, people management, communication and negotiation skills to achieve the strategic aims while delivering cost efficiency and added value. A confident member of multidisciplinary teams, he has provided engineering strategic consultancy in the construction sector in Europe and the Middle East across a range of sectors. His designs incorporate advanced and intuitive technologies, which integrate with the business operation and provide flexibility to adapt to the changing threat environment.

Trainer 2 specialises in technologies to support the protection of crowded spaces, such as sports venues, universities, hotels and shopping complexes. This has included development of a software program to optimise people flow through security gates for the construction phase of the 2012 Olympic Stadium, reducing procurement costs from £16M to £10M. 

Case Studies

One-to-one Consultation:

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Pre-Attack Flags and Indicators of Jihadist Extremism

Pre-Attack Flags and Indicators
Overview

“Pre-Attack Flags and Indicators and the Future of Jihadist Extremism” is specifically developed to provide delegates a strategic understanding of Jihadist Extremism. Delegates will first learn about the history and evolution of Jihadist activities and the buildout of ISIS from 2003 to present. Delegates will also analyse the relevant actors in the current Jihadist Movement.

On day 2, delegates will also gain an insight of Jihadist ideology/mindset where they will examine the 10 indicators of Jihad (Pre-Attack). Most importantly, delegates will identify and execute the appropriate counter-terrorism strategies/ approach while anticipating the future of Jihad in Southeast Asia.

What you will learn from this workshop:

  • Comprehensive understanding of the pre-attack indicators of terrorism.

  • History of Jihad and its evolution into modern society.

  • Mechanics and nuances of the Jihadist ideology and mindset.

  • History of ISIS and its anticipated future state.

  • ISIS foreign fighter flow as it relates to Asia.

Who will attend

Counterterrorism/Law Enforcement, Risk Managers, Security Managers, Counterterrorism Policy Makers.

Trainer

A former informant and now expert with experience in radicalisation, deradicalisation, countering violent extremism (CVE), National security and Counter-terrorism. Course Trainer was born and raised in Canada, growing up with two conflicting and competing cultures. At the age of 19, he went to India and Pakistan where he had a chance encounter with the Taliban before their takeover of Afghanistan in 1995.  Course Trainer became fully radicalised as a supporter of the global Jihadist culture, recruiting others but the 9/11 attacks forced to him reconsider his views. He spent 2 years in Syria, continuing his study of Arabic and Islamic Studies and went through a period of full deradicalisation.

Returning to Canada in 2004, he was recruited by the Canadian Security Intelligence Service (CSIS) and worked several CLASSIFIED infiltration operations on the internet, in chat-protected forums and on the ground with human networks.  In late 2005, one of those intelligence files moved to the Royal Canadian Mounted Police (RCMP), Integrated National Security Enforcement Team (INSET) for investigation. The "Toronto 18" terrorism case resulted in the conviction of 11 aspiring violent extremists after testifying over 4 years, in 5 legal hearings at the Ontario Superior Court of Justice.

Course Trainer has since obtained a Master of Policing, Intelligence and Counter Terrorism (MPICT). He is now an external SME (Subject Matter Expert) on national security and counterterrorism to the Command Staff of CENTCOM, the United Nations Security Council & Counter Terrorism Executive Directorate and trains police, intelligence and special operations forces on relevant topics. He has appeared on multiple U.S., British and Canadian media outlets (CNN, CBC, ABC and NBC) as a commentator and is extensively involved with the ISIS social media and Foreign Fighter file, including Returnees and rehabilitation.

Case Studies

Case studies specific to SEA realm will be discussed in the workshop. 

Partners

 

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Building Counter-Terrorism Leadership Team

Building Counter-Terrorism Leadership Team
Overview

This 2-day “Building Counter-Terrorism Leadership Team” training is to provide delegates a practical knowledge of how to formulate a coherent leadership team against the back drop of countering terrorism. The first day of the workshop will help delegates identify the key skills of a leader and factors that could affect morale of its team members. Delegates will also learn about intelligence team where they will understand the role of information and intelligence play in leadership decision making.

In addition, the trainer will go through the process from planning to operations and issues arise during this process and how should delegates respond to change. To enhance delegates’ learning experience, each day’s sessions is followed by discussion and exercises preparation as well as table top exercises drawing examples from recent life events.

What you will learn from this workshop:

  • Establish the key soft skills of a leader and composition of a team.
  • Identify the differences between Insurgency and countering terrorism.
  • Comprehend the development of policies for countering terrorism.
  • Adopt the strategies that suits one organisation.
  • Recognise the role of information and intelligence play in leadership decision making.
  • Discover issue raised from planning to operations and the role of leader in building a successful leadership team.

 

Who will attend

The workshop is aimed at security practitioners, policing services and organisations who have a responsibility for developing effective leadership teams responsible for countering terrorism from the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking
Trainer

Course Trainer is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks.

Prior to working in the security design world, Course Trainer completed 13 years with the British Army in 2003, working within the Security and Intelligence fields.  Operating within a number of diverse environments, including the Former Yugoslavia where he was responsible for developing operational & crises response plans for the extraction staff from areas of responsibility.  Key to this was the development of a risk management process linked to accurate intelligence reporting that enable constant situational reviews.  Between deployments Course Trainer developed the UK based training to accommodate other NATO Countries supporting JCO operations. 

Course Trainer was awarded top student on British Army Leadership Course, a physically and mentally intensive course conducted in the most severe and challenging conditions offered by the Brecon Beacons. Course Trainer was praised by instructors for the ability to overcome problems and motivate other team members.

As a member of ASIS International UK Chapter, Course Trainer was nominated to be a member of the executive writing team completing an American National Standard for the management of Physical Assets Protection programmes. Course Trainer has also worked as part of the technical committee for the Private Security Contractors Standard (PSC) that has been adopted by the UK Foreign and Commonwealth Office as a benchmark process.

Case Studies

Operation Oak – The Rescue of Benito Mussolini

Using this case study candidates will discuss the formation of the team and look at the planning issues around the rescue for Mussolini during WW2’

Excision – German Attack on Tito’s HQ In WW2

Using this case study candidates will discuss why merits and impacts of the mission in relation to counter insurgency operations’

The Insider Threat

Using a number of recent open source examples from the Southeast Asia region, candidates will discuss how the team leadership can influence counter terrorism activities.

Society and Crime in relation to terrorism

Using open source information from the Southeast Asia region candidates will discuss the societal and crime changes that could influence changes in terrorism.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Mitigation Strategies for Vehicle Borne Threats

Mitigation Strategies for Vehicle Borne Threats
Overview

This 2-day in-depth and hands-on workshop is designed to help delegates gain a strategic understanding of how to formulate a coherent strategy based upon International Standards and best practices of mitigation measures for vehicle borne threats.  This workshop will also consider the issues for deploying vehicle mitigation measures within the built environment.

To enhance delegates’ learning experience, each day’s taught sessions is followed by discussion and exercises preparation.

What you will learn from this workshop:

  • Distinguish different methods of attack.
  • Determine the constraints for planning vehicle mitigation measures.
  • Learn how to define the strategy for deployment.
  • Gain in-depth understanding of the process for selection and deployment of physical controls.
  • Master the process for developing procedural controls for the operation of physical controls.
  • Recognise security risk and credible threat.
  • Identify site constraints affecting possible mitigative measures.
  • Apprehend the dynamics of potential vehicle impact.
  • Understand the use of landform to reduce impact velocity.
  • Recognise third party standards, testing regimes and product types.
  • Apply the above in a practical exercise setting.

 

Who will attend

This workshop is aimed at:

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

From the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  •  Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers. Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a Security Design Strategist. In the last four years, he has been involved in the security design of three first class football stadium, a railway station, a student campus, a group of London theatres and an iconic tourist venue.

Prior to this he had 20 years practice as a police crime prevention officer and crime prevention design advisor in London. He was senior crime prevention design advisor to Metropolitan Police Specialist Operations. Trainer 2 draws upon extensive experience with the Metropolitan Police, and holds internal UK Government Home Office qualifications in crime prevention and counter-terrorism design techniques alongside independent academic qualifications in crime prevention and environmental design. He is used to working in environments requiring confidentiality and has been vetted to 'SC' level.

Case Studies

The World Trade Centre 1993 bombing

Iconic static target: Home-made explosive delivered by encroachment during the “business as usual” phase of activity-how practical is eternal vigilance? How and where could countermeasures be deployed?

Nice attack: Promenade des Anglais, Bastille Day 2016

Vehicle attack on a national public occasion/ example of attack method displacement where control measures had limited access to explosives -can we predict which potential targets to protect?. How do we define the target in these circumstances-what mitigation could be used and what might be practical?

The London 2012 Olympics

A practical exercise with maps of a massive complex target, this exercise will consider the three phases of construction, event and legacy focussing on access in the urban landscape, critical assets and crowded places.

London Borough Market Attack

An opportunity to discuss changing attack methodologies and opportunities to reduce their effect in a practical context.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Reading Suspicion Indicators & The Adversary’s Method of Operations, Singapore

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will come out with the ability to articulate “gut feeling” into clear definitions of Suspicion Indicators and Adversary’s Methods of Operations allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who will attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

With the following job titles:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security

 

Trainer

Workshop Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Workshop Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Workshop Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. Kim is a member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.

Workshop Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’

 

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Reading Suspicion Indicators & The Adversary’s Method of Operations, Malaysia

Reading suspicion indicators
Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will come out with the ability to articulate “gut feeling” into clear definitions of Suspicion Indicators and Adversary’s Methods of Operations allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who will attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

With the following job titles:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security

 

Trainer

Workshop Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Workshop Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Workshop Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. Kim is a member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.

Workshop Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’

 

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

The Ritz-Carlton

168, Jalan Imbi,

55100, Kuala Lumpur,

Malaysia

Tel: (6) 3142 8000

http://www.ritzcarlton.com/en/hotels/malaysia/kuala-lumpur

Industry Insights
Brochure Download