[Expert-Led Masterclass] Counter Improvised Explosive Devices (C-IED) in Today’s Terror Threat Environment

Overview

Highlights:

This in-person Masterclass is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this Masterclass:

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainer

Expert Trainer has 30 years’ experience in both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances. He has extensive experience of IEDD, Explosive Ordnance Disposal (EOD) and Conventional Munitions Disposal (CMD) operations.

Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore

Brochure Download


[Expert-Led Digital Masterclass] Anti-Drone Countermeasures for Critical Infrastructures

Overview

Highlights:

  • Intensive 4-Hour Course 
  • Remote Access
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn at this Expert-Led Digital Masterclass:

  • MITIGATE against the threat of unmanned aerial systems – as drones are typically known in military contexts.
  • ASSESS the risk and vulnerabilities of drone terrorism.
  • CONSIDER all possible, innovative ways terrorists might use UAS
  • ENGAGE in a comprehensive vulnerability assessment to identify security and protection gaps.
Who should attend
  • Counterterrorism Officers
  • Law Enforcement and Intelligence Officers
  • Risk / Crisis Response Managers
  • Chief /Director/ Manager of Security
  • Chief Operations Officer
  • VP of Security
Trainer

Our Expert Trainer has been working, training and educating internationally in the field of anti and counter-terrorism for the past 25 years. He is a retired former
member of a counterterrorism training wing, known only as DG1.

He has been delivering education and training to International Police, Armed Forces, and Private Security Personnel including international organizations from both public and private sectors. His work has taken him through Russia, Ukraine, Kazakhstan, Latvia, Estonia, Finland, United States, Ecuador, Egypt, Poland, Bulgaria, Turkey, Greece, Italy and many more places in connection with his duties. He gives his clients a leading edge in preventing and countering the phenomenon that is International Terrorism to make the world a safer place.

Case Studies

Featured Case Study 1: Successful Case Study on Counter Drone Solutions on Public Venue and Critical Infrastructure

Case Study 2:  Country Action Plans and Policies on Countering Misuse of Drones

Assessing How Terrorists Are Exploiting Critical Infrastructure Vulnerabilities

Partners

FEATURE PARTNER:

Regulus Cyber was founded in 2016 with the vision of providing cybersecurity for GNSS, authenticating satellite-based navigation and timing to assure accuracy, reliability and security. Co-founders Yonatan Zur, CEO, and Yoav Zangvil, CTO, are industry veterans with diverse experience across industries including Aerospace, defense, communications and navigation systems. The company is backed by leading Venture Capital firms including Sierra Ventures, Canaan Partners, F2 capital and The Technion, Israel’s leading Technological University. (GNSS = Global Navigation Satellite Systems: GPS-USA, Galileo-Europe, BeiDou-China, GLONASS-Russia).

Website: https://www.regulus.com/

Venue

This Digital Masterclass will be conducted on Zoom.

We will be in touch closer to the date of the course with the information.

Brochure Download


[Expert-Led Digital Masterclass] Insider Risk Management

Overview

In this 2-day training course we will learn more about  insider threats, such as sabotage, espionage, fraud, workplace violence and data theft.

We will use the Signpost Six methodology to take first steps into Insider Risk Assessment and Management and apply this to your organizations.

What you will learn from this Masterclass:

  • UNDERSTAND of early signs of insider risk and the whole spectrum of insider risk activity.
  • GAIN a holistic view on Insider Risk Management.
  • EMPLOY concrete tools to start assessing Insider Risk Maturity within their own organisations.
  • IMPLEMENT a basis to a road map of actions within their organisations.
  • PRACTISE through practical case work.
Who will attend

This course is ideal for professionals who manage:

  • Corporate Security
  • Ethics and Compliance
  • Information Security
  • Insider Risk
  • Legal
  • Human Resources
  • Any other role that’s relevant to the management of Insider Risk
Trainer

Our Trainer is a Clinical Psychologist, Intelligence and Security Expert with core expertise in behavioural science and has integrated her skills in Insider Risk Programme training and consultancy to both the public and private sectors.


The Trainer has worked on high profile assignments for the Dutch Ministry of Defense and Shell International, where she held global responsibility for security threat assessments and management on country, asset and individual levels. Having worked for years in the Oil and Gas sector, a high-risk environment for all forms of (cyber) security threats, she and the industry simultaneously grew up with growing threats in the cyber domain.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

To be confirmed.

 

Industry Insights
Brochure Download


[Expert-Led Digital Masterclass] Predictive Profiling

Overview

Highlights:

  • Intensive 6-Hours Course
  • Remote Access
  • On-demand Expert Knowledge
  • Accessible on mobile and TV
  • Certificate of Completion

What you will learn at this Digital Masterclass:

  • Understand the operational process of executing a successful attack.
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises. Ability to pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who should attend

Security, intelligence, military and law enforcement professionals including:

  • Vice President or Director of Security
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
Trainer

Our Expert Trainer is the Chameleon Associates Managing Partner for the Australian Pacific Region. He has over 30 years of security and emergency experience, including service with the Royal Australian Navy,  Victorian, Queensland and NSW Fire and Ambulance Services, as well as several senior management roles positions in the security industry.

For the past decade,  he was employed in the hospitality industry, holding Security / Safety Management positions with the Sheraton and Accor hotel groups and Corporate Security Manager (Papua New Guinea) for the Southern Pacific Hotels Corporation.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass will be conducted online. For more information, please write to us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Tactical Data Links (TDLs)

Overview

TDL’s are key to providing integrated information networks and applications, facilitating shared Situational Awareness and enabling the exploitation of information across the battlespace. The understanding of what TDL’s can and cannot do is important for everything that is done in the TDL and Multi Domain C2 worlds. More importantly to you, it is the cornerstone of everything that will be taught on this course.

This training provides personnel with the knowledge required to understand and interact with the complexities that are TDL’s.  Attendees will come out of the course with a greater confidence in their abilities to engage in TDL conversations.

  • EXPLAIN the history of TDLs
  • Understand the characteristics of in service of TDLs (Links 11, 16, 22, VMF and JREAP)
  • EQUIP yourself with TDLs terminals and equipment
  • MASTER the operational applications of TDLs
  • STRENGTHEN skills in standards and interoperability including interoperability challenges
Who should attend

This course is ideal for

  • Engineers
  • Operators
  • Procurement Staff
  • Policy Advisors
  • Academics & Researchers
  • Industry Programme Managers
  • Developers and Engineers
Trainer

About Our Trainer: 

  • Over 30 years of field experience
  • Deployed worldwide in support of Operations and Exercises, achieving 3,500 flying hours in numerous Radar, Electronic Warfare and Tactical Datalinks (TDL) related roles.
  • Qualified Intelligence, Surveillance, Target Acquisition and Reconnaissance Instructor specialising in Air Command and Control, Electronic Surveillance and Electronic Warfare, and TDL.
  • Link 16 Advisor and in the UK working within Interoperability and Training
Case Studies

The trainer will share relevant case studies where applicable.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Hard Rock Hotel Singapore. More details will be sent to the participants closer to the date of the event.

For enquiries, please contact us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Anti-Drone Countermeasures for Critical Infrastructures

Overview

Highlights:

  • Intensive 4-Hour Course 
  • Remote Access
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn at this Expert-Led Digital Masterclass:

  • MITIGATE against the threat of unmanned aerial systems – as drones are typically known in military contexts.
  • ASSESS the risk and vulnerabilities of drone terrorism.
  • CONSIDER all possible, innovative ways terrorists might use UAS
  • ENGAGE in a comprehensive vulnerability assessment to identify security and protection gaps.
Who should attend
  • Counterterrorism Officers
  • Law Enforcement and Intelligence Officers
  • Risk / Crisis Response Managers
  • Chief /Director/ Manager of Security
  • Chief Operations Officer
  • VP of Security
Trainer

Our Expert Trainer has been working, training and educating internationally in the field of anti and counter-terrorism for the past 25 years. He is a retired former
member of a counterterrorism training wing, known only as DG1.

He has been delivering education and training to International Police, Armed Forces, and Private Security Personnel including international organizations from both public and private sectors. His work has taken him through Russia, Ukraine, Kazakhstan, Latvia, Estonia, Finland, United States, Ecuador, Egypt, Poland, Bulgaria, Turkey, Greece, Italy and many more places in connection with his duties. He gives his clients a leading edge in preventing and countering the phenomenon that is International Terrorism to make the world a safer place.

Case Studies

Featured Case Study 1: Successful Case Study on Counter Drone Solutions on Public Venue and Critical Infrastructure

Case Study 2:  Country Action Plans and Policies on Countering Misuse of Drones

Assessing How Terrorists Are Exploiting Critical Infrastructure Vulnerabilities

Partners

FEATURE PARTNER:

Regulus Cyber was founded in 2016 with the vision of providing cybersecurity for GNSS, authenticating satellite-based navigation and timing to assure accuracy, reliability and security. Co-founders Yonatan Zur, CEO, and Yoav Zangvil, CTO, are industry veterans with diverse experience across industries including Aerospace, defense, communications and navigation systems. The company is backed by leading Venture Capital firms including Sierra Ventures, Canaan Partners, F2 capital and The Technion, Israel’s leading Technological University. (GNSS = Global Navigation Satellite Systems: GPS-USA, Galileo-Europe, BeiDou-China, GLONASS-Russia).

Website: https://www.regulus.com/

Venue

This Digital Masterclass will be conducted on Zoom.

We will be in touch closer to the date of the course with the information.

Brochure Download


[Expert-Led Digital Masterclass] Open Source and Social Media Intelligence

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential. The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who will attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Expert Trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world.

His experience, and USP, is based on 38 years as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely. Our onboarding package will ensure a smooth learning experience.
Not to worry, we're ready to answer any questions, reach us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Background Vetting and Insider Threat Mitigation

Overview

Highlights:

  • Intensive 12-Hours Course
  • Remote Access
  • More than 6 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What will you learn in this Masterclass?

  • MASTER good tradecraft and digital hygiene when researching an applicant or member of staff.
  • CAPTURE data relating to the subject, deleted, historic and current.
  • EQUIP yourself with the latest and updated methods to effectively profile a subject.
  • ADOPT the latest cutting-edge tradecraft and good practice.
  • STEP UP skills in effectively capturing everything in a subject’s digital footprint.
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations when deployed.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence gathering on subjects.
Who should attend?
  • Vetting Officers and Teams
  • Organisational Security Teams
  • Recruitment Teams
  • Internal Investigation Officers
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely.

Let us know if you have any questions by sending them to hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Real World Surveillance Techniques

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who will attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be conducted online. For more information, please email us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] CARVER plus Shock Vulnerability Assessment Tool

Overview

Highlights:

  • Intensive 12-Hours Course
  • Remote Access
  • More than 6 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What will you learn in this Masterclass?

  • EQUIP yourself with the Risk-based Decision-Making Model.
  • ANALYSE the effects of consequence, threat, and vulnerability when planning for executing and recovering from a security incident.
  • PLAN, PREPARE, CONDUCT, and REPORT a Vulnerability Assessment.
  • EMPLOY the principles of the CARVER Methodology.
  • IDENTIFY the most effective point/element to attack, and also the weakest point(s) to protect.
Who should attend?
  • Professionals engaged in security planning.
  • Security officers and security experts of critical infrastructure and facilities in government organisations, public and commercial sectors.
  • Intelligence officials in security Governmental and Public organisations as well as the private sectors.
Trainer

About our Expert Trainer

  • Over 30 years of field experience.
  • Author of "CARVER+Shock, Vulnerability Assessments".
  • Retired US Army Special Forces Officer.
  • High experienced in developing and implementing critical infrastructure protection programme and armed response capabilities.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass will be conducted on Zoom.

Let us know if you have any questions by sending them to hello@q8asia.com.sg.

Brochure Download