Designing Security for New and Existing Buildings

Designing Security for New and Existing Buildings
Overview

This two-day in-depth and hands-on Masterclass will provide attendees with practical knowledge of how security risks that business assets and operations face can be understood in the context of designing out areas of risk.  The Masterclass will provide practical examples for designing physical and technical mitigation measures to protect defined assets.

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

What you will learn from this Masterclass:

  • Gain insights into the concepts in Security Risk Management within the context of securing the built environment.
  • Understand the functions of Physical Security.
  • Learn how to plan and conduct Physical Security Assessments.
  • Master the Design Principles and Practices.
  • Strengthen your organisation’s Physical Security and Protection Strategies.
Who will attend

The Masterclass is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

 

 

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers.  Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a highly skilled engineer and security design specialist who demonstrates strong customer focus combined with a proven commitment to the achievement of targets and business objectives. He applies excellent analytical skills, problem solving abilities, people management, communication and negotiation skills to achieve the strategic aims while delivering cost efficiency and added value. A confident member of multidisciplinary teams, he has provided engineering strategic consultancy in the construction sector in Europe and the Middle East across a range of sectors. His designs incorporate advanced and intuitive technologies, which integrate with the business operation and provide flexibility to adapt to the changing threat environment.

Trainer 2 specialises in technologies to support the protection of crowded spaces, such as sports venues, universities, hotels and shopping complexes. This has included development of a software program to optimise people flow through security gates for the construction phase of the 2012 Olympic Stadium, reducing procurement costs from £16M to £10M. 

Case Studies

One-to-one Consultation:

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Combating Multi – Assault and Counter Terrorism Action Capabilities (MACTAC)

Combating Multi-Assault
Overview

This Masterclass is designed to give the professional practitioner whether from Law Enforcement, Private Security, Corporate Security and Venue security an understanding of this threat through case studies. The second part of the program draws on Israeli and Global best practices such as the US MACTAC (Multiple Assault Counter Terror Action Capability) to set up a security system that will help defend against such lethal attacks, and help you prepare personnel to deal with this threat. The third part of the program goes into some of the leading tactics for confronting the threat and what people encountering such as a threat can do to save themselves.

What you will learn from this Masterclass:

  • Assess the threat levels in Singapore with emphasis on current conditions.
  • Set up a security system that will help defend against such lethal attacks.
  • Identify the differences between security for deterrence only and security for safety.
  • Determine and Develop the security planning phase and its elements of a security plan.
  • Execute the right Emergency Response Planning for specific threats.
  • Gain insights into case studies of recent and historic attacks throughout the world.
Who will attend

Counterterrorism/Law Enforcement, Risk Managers, Security Managers, Counterterrorism Policy Makers, Venue and Facilities Professional Practitioners

From the following sectors:

  • Aviation
  • Banking and finance
  • Embassies of foreign governments
  • Government agencies
  • Healthcare
  • Maritime and shipping
  • Oil and gas infrastructure
  • Plant and public utilities
  • Power station
  • Production
  • Security and defence
  • Tourism and hospitality
  • Transportation
  • City planners
  • Insurance brokers
  • City sanitation management
  • Event planners

 

 

 

Trainer

From China to Singapore; from Algeria to Nigeria, in Europe, Israel and South/Central America, Trainer has trained and provided products to more than 3000 agencies in Homeland Security, Emergency Management, Emergency Medicine, and specialised equipment training for the world’s premiere manufacturers.

Trainer is the publisher of the Counter Terrorist Magazine, distributed in the US, Europe and Asia, in its 9th year, and the organiser of the Homeland Security Professionals Conference in Orlando, celebrating its 12 year anniversary. Trainer was the very first editor of the premiere edition of the Counter Terrorist Magazine – now in its 9th year of publication and is the publisher as President of SSI.

Trainer is a widely published author on security-related subjects: IACSP Counter-Terror magazine, The Journal, Fire Chief, Law Enforcement Technology, Law Enforcement Executive Journal, Frontline First Responder, Executive Flyer, The Forum and many others.

Trainer has also provided commentary for ABC Radio, National Public Radio and has appeared on numerous newscasts commenting on security issues for NBC, CBS and ABC. He co-authored the seminal text on Suicide Terror: Understanding and confronting the threat and published by John Wiley. The book was praised by Israel’s current prime minister, Benjamin Nethanyahu.

In November of 2010, backed by private investors, Trainer created the Homeland Security Network www.homelandsecuritynet.com as a portal and social media for bona fide members of Homeland Security each of which is vetted by hand.

Case Studies

HIGH IMPACT LEARNING - Case Study 1

Omar Mateen and the Pulse night club shooting of June 12th 2016 based on a personal debriefing received from Police Chief Mina of Orlando PD. The Second deadliest attack in US History killing 49 and wounding more than 58 others.

HIGH IMPACT LEARNING - Case Study 2

The Westlake Mall attack - On Saturday 21 September 2013, unidentified gunmen attacked Westgate shopping mall, an upscale mall in Nairobi, Kenya. The attack resulted in at least 67 deaths, and more than 175 people were wounded.

HIGH IMPACT LEARNING - Case Study 3

The Paris attack(s) of November 13th 2015 is one of the deadliest ever incidents of terror. At least 130 people were killed, hundreds were injured by 7 attackers using a combination of bombs and gunfire. France and Paris have never really recovered from these and ensuing attacks have made it worse. Right now, France has suspended civil liberties and imposed martial law lasting until 2017.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Designing Security for New and Existing Buildings

Designing Security for New and Existing Buildings
Overview

This two-day in-depth and hands-on Masterclass will provide attendees with practical knowledge of how security risks that business assets and operations face can be understood in the context of designing out areas of risk.  The Masterclass will provide practical examples for designing physical and technical mitigation measures to protect defined assets.

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

What you will learn from this Masterclass:

  • Gain insights into the concepts in Security Risk Management within the context of securing the built environment.
  • Understand the functions of Physical Security.
  • Learn how to plan and conduct Physical Security Assessments.
  • Master the Design Principles and Practices.
  • Strengthen your organisation’s Physical Security and Protection Strategies.
Who will attend

The Masterclass is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

 

 

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers.  Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a highly skilled engineer and security design specialist who demonstrates strong customer focus combined with a proven commitment to the achievement of targets and business objectives. He applies excellent analytical skills, problem solving abilities, people management, communication and negotiation skills to achieve the strategic aims while delivering cost efficiency and added value. A confident member of multidisciplinary teams, he has provided engineering strategic consultancy in the construction sector in Europe and the Middle East across a range of sectors. His designs incorporate advanced and intuitive technologies, which integrate with the business operation and provide flexibility to adapt to the changing threat environment.

Trainer 2 specialises in technologies to support the protection of crowded spaces, such as sports venues, universities, hotels and shopping complexes. This has included development of a software program to optimise people flow through security gates for the construction phase of the 2012 Olympic Stadium, reducing procurement costs from £16M to £10M. 

Case Studies

One-to-one Consultation:

For the first three companies that confirm attendance on the workshop, trainers are offering a review of one current project based on the ground floor (only) of a building.  Delegates will need to supply in advance a PDF copy of the building floor plan and a maximum of five questions they would like to discuss.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Pre-Attack Flags and Indicators of Jihadist Extremism

Pre-Attack Flags and Indicators
Overview

“Pre-Attack Flags and Indicators and the Future of Jihadist Extremism” is specifically developed to provide delegates a strategic understanding of Jihadist Extremism. Delegates will first learn about the history and evolution of Jihadist activities and the buildout of ISIS from 2003 to present. Delegates will also analyse the relevant actors in the current Jihadist Movement.

On day 2, delegates will also gain an insight of Jihadist ideology/mindset where they will examine the 10 indicators of Jihad (Pre-Attack). Most importantly, delegates will identify and execute the appropriate counter-terrorism strategies/ approach while anticipating the future of Jihad in Southeast Asia.

What you will learn from this workshop:

  • Comprehensive understanding of the pre-attack indicators of terrorism.

  • History of Jihad and its evolution into modern society.

  • Mechanics and nuances of the Jihadist ideology and mindset.

  • History of ISIS and its anticipated future state.

  • ISIS foreign fighter flow as it relates to Asia.

Who will attend

Counterterrorism/Law Enforcement, Risk Managers, Security Managers, Counterterrorism Policy Makers.

Trainer

A former informant and now expert with experience in radicalisation, deradicalisation, countering violent extremism (CVE), National security and Counter-terrorism. Course Trainer was born and raised in Canada, growing up with two conflicting and competing cultures. At the age of 19, he went to India and Pakistan where he had a chance encounter with the Taliban before their takeover of Afghanistan in 1995.  Course Trainer became fully radicalised as a supporter of the global Jihadist culture, recruiting others but the 9/11 attacks forced to him reconsider his views. He spent 2 years in Syria, continuing his study of Arabic and Islamic Studies and went through a period of full deradicalisation.

Returning to Canada in 2004, he was recruited by the Canadian Security Intelligence Service (CSIS) and worked several CLASSIFIED infiltration operations on the internet, in chat-protected forums and on the ground with human networks.  In late 2005, one of those intelligence files moved to the Royal Canadian Mounted Police (RCMP), Integrated National Security Enforcement Team (INSET) for investigation. The "Toronto 18" terrorism case resulted in the conviction of 11 aspiring violent extremists after testifying over 4 years, in 5 legal hearings at the Ontario Superior Court of Justice.

Course Trainer has since obtained a Master of Policing, Intelligence and Counter Terrorism (MPICT). He is now an external SME (Subject Matter Expert) on national security and counterterrorism to the Command Staff of CENTCOM, the United Nations Security Council & Counter Terrorism Executive Directorate and trains police, intelligence and special operations forces on relevant topics. He has appeared on multiple U.S., British and Canadian media outlets (CNN, CBC, ABC and NBC) as a commentator and is extensively involved with the ISIS social media and Foreign Fighter file, including Returnees and rehabilitation.

Case Studies

Case studies specific to SEA realm will be discussed in the workshop. 

Partners

 

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Building Counter-Terrorism Leadership Team

Building Counter-Terrorism Leadership Team
Overview

This 2-day “Building Counter-Terrorism Leadership Team” training is to provide delegates a practical knowledge of how to formulate a coherent leadership team against the back drop of countering terrorism. The first day of the workshop will help delegates identify the key skills of a leader and factors that could affect morale of its team members. Delegates will also learn about intelligence team where they will understand the role of information and intelligence play in leadership decision making.

In addition, the trainer will go through the process from planning to operations and issues arise during this process and how should delegates respond to change. To enhance delegates’ learning experience, each day’s sessions is followed by discussion and exercises preparation as well as table top exercises drawing examples from recent life events.

What you will learn from this workshop:

  • Establish the key soft skills of a leader and composition of a team.
  • Identify the differences between Insurgency and countering terrorism.
  • Comprehend the development of policies for countering terrorism.
  • Adopt the strategies that suits one organisation.
  • Recognise the role of information and intelligence play in leadership decision making.
  • Discover issue raised from planning to operations and the role of leader in building a successful leadership team.

 

Who will attend

The workshop is aimed at security practitioners, policing services and organisations who have a responsibility for developing effective leadership teams responsible for countering terrorism from the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking
Trainer

Course Trainer is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks.

Prior to working in the security design world, Course Trainer completed 13 years with the British Army in 2003, working within the Security and Intelligence fields.  Operating within a number of diverse environments, including the Former Yugoslavia where he was responsible for developing operational & crises response plans for the extraction staff from areas of responsibility.  Key to this was the development of a risk management process linked to accurate intelligence reporting that enable constant situational reviews.  Between deployments Course Trainer developed the UK based training to accommodate other NATO Countries supporting JCO operations. 

Course Trainer was awarded top student on British Army Leadership Course, a physically and mentally intensive course conducted in the most severe and challenging conditions offered by the Brecon Beacons. Course Trainer was praised by instructors for the ability to overcome problems and motivate other team members.

As a member of ASIS International UK Chapter, Course Trainer was nominated to be a member of the executive writing team completing an American National Standard for the management of Physical Assets Protection programmes. Course Trainer has also worked as part of the technical committee for the Private Security Contractors Standard (PSC) that has been adopted by the UK Foreign and Commonwealth Office as a benchmark process.

Case Studies

Operation Oak – The Rescue of Benito Mussolini

Using this case study candidates will discuss the formation of the team and look at the planning issues around the rescue for Mussolini during WW2’

Excision – German Attack on Tito’s HQ In WW2

Using this case study candidates will discuss why merits and impacts of the mission in relation to counter insurgency operations’

The Insider Threat

Using a number of recent open source examples from the Southeast Asia region, candidates will discuss how the team leadership can influence counter terrorism activities.

Society and Crime in relation to terrorism

Using open source information from the Southeast Asia region candidates will discuss the societal and crime changes that could influence changes in terrorism.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

 

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Mitigation Strategies for Vehicle Borne Threats

Mitigation Strategies for Vehicle Borne Threats
Overview

This 2-day in-depth and hands-on workshop is designed to help delegates gain a strategic understanding of how to formulate a coherent strategy based upon International Standards and best practices of mitigation measures for vehicle borne threats.  This workshop will also consider the issues for deploying vehicle mitigation measures within the built environment.

To enhance delegates’ learning experience, each day’s taught sessions is followed by discussion and exercises preparation.

What you will learn from this workshop:

  • Distinguish different methods of attack.
  • Determine the constraints for planning vehicle mitigation measures.
  • Learn how to define the strategy for deployment.
  • Gain in-depth understanding of the process for selection and deployment of physical controls.
  • Master the process for developing procedural controls for the operation of physical controls.
  • Recognise security risk and credible threat.
  • Identify site constraints affecting possible mitigative measures.
  • Apprehend the dynamics of potential vehicle impact.
  • Understand the use of landform to reduce impact velocity.
  • Recognise third party standards, testing regimes and product types.
  • Apply the above in a practical exercise setting.

 

Who will attend

This workshop is aimed at:

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

From the following sectors:

  • Airport, ports, rail
  • Diplomatic, government agencies
  • Education institution, schools
  • Financial institutes data centres
  •  Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & borders
  • Oil & gas infrastructure
  • Plant and public utilities
  • Power plants
  • Shopping malls
  • Stadiums, hotels & public places
  • Traffic management & parking

 

Trainer

Trainer 1 is a highly skilled security strategist who applies the principles of Secured by Design effectively alongside his extensive industry knowledge and experience to add value to projects through developing clear and effective strategic security intent, integrating innovative physical controls, technical measures and procedural responses applied at reasonable cost in relation to identified risks. He drives projects to completion; ensuring security control systems are delivered to implementation and operation. Operating with ease in multi-disciplinary environments he liaises with architectural and engineering teams applying design solutions for changing threats, using a risk based approach. This ensures crime prevention and physical asset protection are considered at the earliest stages, achieving significant savings and value through effective specification.

Trainer 1 specialises in protection of crowded spaces, such as mixed-use developments, sports venues, universities, hotels and shopping complexes. Consideration of behavioural aspects, through application of his social and criminological studies enables Trainer 1 to implement Crime Prevention Through Environmental Design. This seeks to reduce the occurrence of and impacts of Crime and Anti-Social behaviour and improve the experience for target segment customers. Trainer 1 has worked on projects around the world and was the lead security designer for the London 2012 Stadium.

Trainer 2 is a Security Design Strategist. In the last four years, he has been involved in the security design of three first class football stadium, a railway station, a student campus, a group of London theatres and an iconic tourist venue.

Prior to this he had 20 years practice as a police crime prevention officer and crime prevention design advisor in London. He was senior crime prevention design advisor to Metropolitan Police Specialist Operations. Trainer 2 draws upon extensive experience with the Metropolitan Police, and holds internal UK Government Home Office qualifications in crime prevention and counter-terrorism design techniques alongside independent academic qualifications in crime prevention and environmental design. He is used to working in environments requiring confidentiality and has been vetted to 'SC' level.

Case Studies

The World Trade Centre 1993 bombing

Iconic static target: Home-made explosive delivered by encroachment during the “business as usual” phase of activity-how practical is eternal vigilance? How and where could countermeasures be deployed?

Nice attack: Promenade des Anglais, Bastille Day 2016

Vehicle attack on a national public occasion/ example of attack method displacement where control measures had limited access to explosives -can we predict which potential targets to protect?. How do we define the target in these circumstances-what mitigation could be used and what might be practical?

The London 2012 Olympics

A practical exercise with maps of a massive complex target, this exercise will consider the three phases of construction, event and legacy focussing on access in the urban landscape, critical assets and crowded places.

London Borough Market Attack

An opportunity to discuss changing attack methodologies and opportunities to reduce their effect in a practical context.

Partners

Media Partners:

 

The Asia Pacific Security Magazine is published bi-monthly with a strong support for industry exhibition and conference events within the Asia Pacific region. It is available online to read by all and distributed to leading industry decision makers and a subscriber database. 

The Australian Security Magazine is the country’s leading government and corporate security magazine. Printed bi-monthly, the magazine is distributed at leading industry conferences, and to many of the biggest decision makers in the security industry and sold in selected stores. It is a highly respected and sought after publication, incorporating investigative journalism, provoking editorial and up-to-date news, trends and events for all Australasian security professionals.  

The Malaysia Security Magazine is the region’s newest government and corporate security magazine to be published quarterly and distributed free of charge at leading industry events. As a My Security Media publication the magazine will incorporate investigative journalism, provoking editorial and up-to-date news, trends and events for all ASEAN security professionals.  

Please note that in 2018 MSM will be re-branded to become the Southeast Asia Security Magazine (SASM). 

 

 

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Reading Suspicion Indicators & The Adversary’s Method of Operations, Singapore

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will come out with the ability to articulate “gut feeling” into clear definitions of Suspicion Indicators and Adversary’s Methods of Operations allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who will attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

With the following job titles:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security

 

Trainer

Workshop Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Workshop Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Workshop Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. Kim is a member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.

Workshop Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’

 

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Grand Copthorne Waterfront Hotel

392, Havelock Road,

Singapore 169663

T: (65) 6733 0880 

W: https://www.millenniumhotels.com/en/singapore/grand-copthorne-waterfront/

Industry Insights
Brochure Download


Reading Suspicion Indicators & The Adversary’s Method of Operations, Malaysia

Reading suspicion indicators
Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will come out with the ability to articulate “gut feeling” into clear definitions of Suspicion Indicators and Adversary’s Methods of Operations allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who will attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

With the following job titles:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security

 

Trainer

Workshop Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Workshop Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Workshop Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. Kim is a member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.

Workshop Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’

 

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

The Ritz-Carlton

168, Jalan Imbi,

55100, Kuala Lumpur,

Malaysia

Tel: (6) 3142 8000

http://www.ritzcarlton.com/en/hotels/malaysia/kuala-lumpur

Industry Insights
Brochure Download