Printer Friendly

Education matrix.

Education Matrix

       Tuesday, September 10
11:00 am                             1:30 pm

 (1) Using Crime Risk Benchmarking   Intermodel Logistics Security
     Increase Your Company's
     Success                         Executive Protection in the

     Home Health Nursing Security--  New Millennium
     The Unforeseen Risk ad Danger

     Biometrics--The Coming of Age

     Business Applications of Crime
     and Risk Data in the Retail
     Banking Industry



 (2) Islamic Terrorism and the       K-9's and September 11th:
     West: Conflicting Mentalities   Our Partners, Our Workers,
     and Missed Warnings             Our Heros

                                     Crisis Management--Facilitating
                                     the Public/Private Partnership

                                     High-Rise Environments--
                                     Protection and Survivability



 (3)                                 Today's Student Members--
                                     Tomorrow's Security Professionals








 (4) What is the Real Cyber Threat?  Managing Reputational Risk

     Utilizing the Internet and      Emerging Technology Panel
     Computers for Information,
     Research and Security
     Management



 (5)






 (6) Monitoring Employees in         How Security Providers Can Avoid
     the Workplace                   Liability in a Civil Lawsuit

                                     Crime Victim: The Company
                                     Perspective

 (7) Anatomy of a Procurement Fraud  Back to the Basics in Officer
                                     Training
     Culture and Security:
     Addressing America's Achilles'
     Heels

     Why Separate Security
     Departments Will No Longer
     Cut It

     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's
     Hot, What's Not--What's
     Working, What's Not



 (9) Basis of Design                 Anti-Terrorism: New Tools and
                                     Technology

                                     Security in a Global Company

                                     Digital Video Applications for
                                     Physical Security--Leveraging the
                                     Network

                                     Protecting America's
                                     Infrastructure--Standardizing in a
                                     Non-Standardized Environment



(10) Mergers and Acquisitions:
     A CPP's Survival Guide


                                            Tuesday, September 10
11:00 am                             4:30 pm

 (1) Using Crime Risk Benchmarking   Philadelphia: Role Model for
     Increase Your Company's         Fighting Economic Crimes
     Success

     Home Health Nursing Security--  The Intelligent Link Between Data
     The Unforeseen Risk ad Danger   and Video

     Biometrics--The Coming of Age

     Business Applications of Crime
     and Risk Data in the Retail
     Banking Industry



 (2) Islamic Terrorism and the       Protecting Your People Overseas:
     West: Conflicting Mentalities   What to Do Before the Next Global
     and Missed Warnings             Crisis









 (3)                                 The Academic Practitioner
                                     Symposium: Security Education in
                                     a New Security Environment

                                     A New Recipe for Training--
                                     The Fruit Salad Approach




 (4) What is the Real Cyber Threat?  Handling International Cybercrime
                                     Investigations
     Utillzing the Internet and
     Computers for Information,      Holistic Risk Management:
     Research and Security           How to Assess Security Across
     Management                      the Organization



 (5)






 (6) Monitoring Employees in         The Diversity Distance!
     the Workplace




 (7) Anatomy of a Procurement Fraud  Managing the Media in Crisis
                                     Situations
     Culture and Security:
     Addressing America's Achilles'
     Heels

     Why Separate Security
     Departments Will No Longer
     Cut It

     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's    Cost-Effective Pre-Employment
     Hot, What's Not--What's         Screening
     Working, What's Not



 (9) Basis of Design                 Federal Antiterrorism Construction
                                     Standards and Their Impact on the
                                     Private Sector

                                     Case Studies of Achieving Physical
                                     Security Objectives by Designing
                                     and Negotiating Fire Code
                                     Variances

                                     Credential Technologies: What's
                                     What?

                                     Security Systems Management
                                     Procedures

(10) Mergers and Acquisitions:       Mergers and Acquisitions:
     A CPP's Survival Guide          A CPP's Survival Guide


                                            Wednesday, September 1
11:00 am                             11:00 am

 (1) Using Crime Risk Benchmarking   Protecting Houses of
     Increase Your Company's         Worship...The Next Step
     Success

     Home Health Nursing Security--  Operation Cooperation
     The Unforeseen Risk ad Danger
                                     Organized Retail Theft--
     Biometrics--The Coming of Age   The Pervasive Plague

     Business Applications of Crime
     and Risk Data in the Retail
     Banking Industry



 (2) Islamic Terrorism and the       Technology Enabled Terrorism
     West: Conflicting Mentalities
     and Missed Warnings             The Security Managers Guide to
                                     the incident Comman System

                                     Security's Role in Crisis
                                     Management

                                     Improving Security for Expatriates
                                     and Travelers in Asia--Lessons
                                     Learned From 9/11

 (3)









 (4) What is the Real Cyber Threat?  Real World Disaster Recovery:
                                     Ensuring Business Continuity
     Utillzing the Internet and      Through an Impact Event
     Computers for Information,
     Research and Security           You Know Who You Are and
     Management                      So Could I



 (5)                                 Automating the Investigations
                                     Process





 (6) Monitoring Employees in
     the Workplace




 (7) Anatomy of a Procurement Fraud  A Multi-National Approach to
                                     Combating Product Counterfeiting
     Culture and Security:
     Addressing America's Achilles'
     Heels                           Social Engineering: How to
                                     Minimize Your Risk
     Why Separate Security
     Departments Will No Longer
     Cut It

     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's
     Hot, What's Not--What's
     Working, What's Not



 (9) Basis of Design                 Federal Government Security
                                     Criteria--Finally Here

                                     What's New on the Floor?











(10) Mergers and Acquisitions:       CPP--What's Its Value to an
     A CPP's Survival Guide          Organization


                                            Wednesday, September 1
11:00 am                             1:30 pm

 (1) Using Crime Risk Benchmarking   I Spy...Covert Surveillance and
     Increase Your Company's         Workplace Privacy
     Success

     Home Health Nursing Security--  Managing Stalking Cases in
     The Unforeseen Risk ad Danger   the Workplace

     Biometrics--The Coming of Age

     Business Applications of Crime
     and Risk Data in the Retail
     Banking Industry



 (2) Islamic Terrorism and the       Developging a Fire Safety Program
     West: Conflicting Mentalities   From Scratch
     and Missed Warnings
                                     Crisis Management








 (3)









 (4) What is the Real Cyber Threat?  What Role Should ASIS Play in
                                     Promoting IT Security?
     Utillzing the Internet and
     Computers for Information,      Cyberterrorism, Infrastructure
     Research and Security           Protection, InfraGard, Information
     Management                      Sharing and Joint Task Forces



 (5)                                 When Imitation Is Not the
                                     Sincerest Form of Flatery

                                     Basics of Computer Forensics



 (6) Monitoring Employees in
     the Workplace




 (7) Anatomy of a Procurement Fraud  Managing in Turbulent Times

     Culture and Security:
     Addressing America's Achilles'
     Heels

     Why Separate Security
     Departments Will No Longer
     Cut It

     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's    Outsourcing for Success--
     Hot, What's Not--What's         Managing the Vendor Relational
     Working, What's Not
                                     Navigating the FCRA to Avoid
                                     Shark Infested Waters

 (9) Basis of Design                 Systems Design and
                                     Engineering--(SSD-Part II)

                                     The First 90 Days After 9/11

                                     Using Communications Technology
                                     for Ingegrated Security Systems








(10) Mergers and Acquisitions:       Managing the Media in a Security
     A CPP's Survival Guide          Crisis


                                            Wednesday, September 1
11:00 am                             4:30 pm

 (1) Using Crime Risk Benchmarking   Crimes Against the Elderly
     Increase Your Company's
     Success                         Modern Video Covert Surveillance
                                     Solutions
     Home Health Nursing Security--
     The Unforeseen Risk ad Danger

     Biometrics--The Coming of Age

     Business Applications of Crime
     and Risk Data in the Retail
     Banking Industry



 (2) Islamic Terrorism and the       The Great SMU Escape
     West: Conflicting Mentalities
     and Missed Warnings             Disasters and Business
                                     Continuity--Two Concepts,
                                      One Plan







 (3)                                 Selling Security (Security Awarenes
                                     Training In the Information Age)

                                     Effective Training Programs for
                                     Loss Prevention

                                     Perfill Retos y Alternativas de
                                     Desarrollo Para el Administrator
                                     Professional de Segruidad

 (4) What is the Real Cyber Threat?  Computer Security for the Road
                                     Warrior
     Utillzing the Internet and
     Computers for Information,
     Research and Security
     Management



 (5)                                 Expense Fraud Investigations


                                     The Changing Face of Biometrics
                                     and Background investigations
                                     Post-9/11

 (6) Monitoring Employees in
     the Workplace




 (7) Anatomy of a Procurement Fraud  The Acquisition, Care and Feeding
                                     of Security Consultants
     Culture and Security:
     Addressing America's Achilles'
     Heels                           Information Security
                                     Management--Internatioal
     Why Separate Security           Standard ISO/IEC 17799
     Departments Will No Longer
     Cut It
                                     Walking the Corproate Talk
     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's    Substance Abuse Prevention in
     Hot, What's Not--What's         the Workplace
     Working, What's Not



 (9) Basis of Design                 It's All about Money!














(10) Mergers and Acquisitions:
     A CPP's Survival Guide


                                            Thursday, September 12
11:00 am                             11:00 am

 (1) Using Crime Risk Benchmarking   Money Laudering Today
     Increase Your Company's
     Success                         LEAPS--Law Enforcement and
                                     Private Security
     Home Health Nursing Security--
     The Unforeseen Risk ad Danger
                                     Telemarketing Fraud: Dialing for
     Biometrics--The Coming of Age   Dollars

     Business Applications of Crime  Distributed Real-Time Face
     and Risk Data in the Retail     Recognition
     Banking Industry
                                     Security Awareness for the
                                     Business Traveler

 (2) Islamic Terrorism and the       Security Lessons From the
     West: Conflicting Mentalities   Pentagon Attack
     and Missed Warnings
                                     Security's Role in the Environment
                                     of Care







 (3)                                 Joint Security Training Consortium:
                                     A New Security Education and
                                     Training Intiative







 (4) What is the Real Cyber Threat?  Incident Response Planning for
                                     the Corporate Environment
     Utillzing the Internet and
     Computers for Information,      IT Investigations--Following the
     Research and Security           Trail Using Computer Forensics
     Management



 (5)






 (6) Monitoring Employees in
     the Workplace




 (7) Anatomy of a Procurement Fraud

     Culture and Security:
     Addressing America's Achilles'
     Heels

     Why Separate Security
     Departments Will No Longer
     Cut It

     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's
     Hot, What's Not--What's
     Working, What's Not



 (9) Basis of Design                 Security System Design Part III;
                                     System Implementation

                                     How Easy Is it to Counterfeit
                                     Your ID Badge?

                                     Systems integration








(10) Mergers and Acquisitions:       Selling Your Security Program...
     A CPP's Survival Guide          It's Tool Time


                                            Thursday, September 12
11:00 am                             1:30 pm

 (1) Using Crime Risk Benchmarking   Child Safety
     Increase Your Company's
     Success                         Advance Fee Fraud: A Global
                                     Scourge?
     Home Health Nursing Security--
     The Unforeseen Risk ad Danger
                                     The Game of the Name:
     Biometrics--The Coming of Age   Identify Theft

     Business Applications of Crime  Intergrated Interrogation Technique
     and Risk Data in the Retail
     Banking Industry



 (2) Islamic Terrorism and the       The UK Response to Septembre 11
     West: Conflicting Mentalities
     and Missed Warnings             NBC Awareness: Meeting the
                                     Challenge

                                     Weapons of Mass Destruction:
                                     Biological and Explosive Terror--
                                     The Aftermath




 (3)









 (4) What is the Real Cyber Threat?  Confidentiality and Privacy for
                                     Industry and the individual
     Utillzing the Internet and
     Computers for Information,      IT Security International Panel--
     Research and Security           Threats and Resolutions to Global
     Management                      IT Security



 (5)                                 Casino Surveillance and the
                                     Investigative Process





 (6) Monitoring Employees in
     the Workplace




 (7) Anatomy of a Procurement Fraud  Strategic Planning for Security

     Culture and Security:
     Addressing America's Achilles'
     Heels

     Why Separate Security
     Departments Will No Longer
     Cut It

     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's    When Domestic Violence Spills
     Hot, What's Not--What's         into the Workplace
     Working, What's Not



 (9) Basis of Design                 Risk Assessments for Critical
                                     Infrastructure Assurance

                                     The Math of CCTV











(10) Mergers and Acquisitions:
     A CPP's Survival Guide


                                            Thursday, September 12
11:00 am                             4:30 pm

 (1) Using Crime Risk Benchmarking   Collusion Detection: Catching the
     Increase Your Company's         Insider Threat Las Vegas Style
     Success

     Home Health Nursing Security--  Gang Culture From the School
     The Unforeseen Risk ad Danger   Yard to the Workplace

     Biometrics--The Coming of Age

     Business Applications of Crime
     and Risk Data in the Retail
     Banking Industry



 (2) Islamic Terrorism and the       Terrorism: The Case of Nigeria
     West: Conflicting Mentalities
     and Missed Warnings









 (3)                                 What Trainig Tells You About Your
                                     Security Systems Integrator








 (4) What is the Real Cyber Threat?  Security: Information vs. Physical-
                                     Where Are We Going?
     Utillzing the Internet and
     Computers for Information,      Smart Card Use in Enterprise
     Research and Security           Application Security Systems
     Management
                                     Cyber Crime, Cyber Fraud in
                                     Telecommunications

 (5)                                 Rogue Employees






 (6) Monitoring Employees in         Business Integrity and Compliance
     the Workplace




 (7) Anatomy of a Procurement Fraud  Thank You Very Much, the New
                                     Bottom Line
     Culture and Security:
     Addressing America's Achilles'
     Heels

     Why Separate Security
     Departments Will No Longer
     Cut It

     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's
     Hot, What's Not--What's
     Working, What's Not



 (9) Basis of Design                 Design Against Terror Using
                                     CPTED

                                     Moving From the Information
                                     Age to the Security Age:
                                     How Enhanced Security Will
                                     Change Principles and Practices
                                     of Physical Security

                                     Automated CCTV Through Digital
                                     Video Motion




(10) Mergers and Acquisitions:       Selling Your Security Program...
     A CPP's Survival Guide          It's Tool Time


                                     Friday, September 13
11:00 am                             8:00 am

 (1) Using Crime Risk Benchmarking   China in the World Trade
     Increase Your Company's         Organization (WTD): What Has
     Success                         Changed?

     Home Health Nursing Security--
     The Unforeseen Risk ad Danger   Protecting Energy Facilities
                                     From Terrorist Attack
     Biometrics--The Coming of Age

     Business Applications of Crime
     and Risk Data in the Retail
     Banking Industry



 (2) Islamic Terrorism and the
     West: Conflicting Mentalities
     and Missed Warnings









 (3)                                 Designing Scenario-Based Security
                                     Training

                                     Protecting Special Assets






 (4) What is the Real Cyber Threat?  Addressing the insider Threat:
                                     Cybercrime Law, Strategy and
     Utillzing the Internet and      Technology
     Computers for Information,
     Research and Security           Cybercrim: Understanding the Risks
     Management



 (5)                                 Deception Analysis in Written
                                     Statements and Multiple Suspect
                                     Elimination

                                     Internal Corporate Investigations:
                                     The Security and HR Partnership

 (6) Monitoring Employees in         Spitting Out the Bad Seeds Early
     the Workplace




 (7) Anatomy of a Procurement Fraud  Rules of Engagement--Organized
                                     Crime and Business in CIS
     Culture and Security:
     Addressing America's Achilles'
     Heels                           Managing the Security Employee
                                     for Success
     Why Separate Security
     Departments Will No Longer      Communicate to Be a More
     Cut It
                                     Effective Leader
     The Chief Security Officer
     in the New Millennium

 (8) Background Screening: What's
     Hot, What's Not--What's
     Working, What's Not



 (9) Basis of Design                 The New Era of Intelligent Security
                                     Systems

                                     Perimeter Protection: Theory and
                                     Technologies

                                     A Dose of Thermal Imaging for
                                     Pfizer







(10) Mergers and Acquisitions:
     A CPP's Survival Guide


(1) Crime & Loss Prevention

(2) Crisis/Emergency Management

(3) Education & Training

(4) Information Security

(5) Investigations

(6) Legal Issues

(7) Management

(8) Personnel

(9) Physical Security

(10) Certified Protection Professional Only

* Fundamental

# Intermediate

@ Advanced
COPYRIGHT 2002 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2002 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Security Management
Date:Jul 1, 2002
Words:2094
Previous Article:Exhibitor listing. (A - Y).
Next Article:Educational sessions.


Related Articles
Education Matrix.
Stimulant treatment guide.
Unpacking the loaded teacher matrix; negotiating space and time between university and secondary English classrooms.

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters