Professional Certification in Security and Risk Management

Area of Training : Security and Investigation

SkillsFuture Code: CRS-N-003284

risk-management

Professional Certification in Security and Risk Management

Complete Rapid Response Guide to Critical Incident Management and Security and Risk Management

AN OPERATIONS MANUAL FOR CRISIS INTERVENTION AND SECURITY RISK MANAGEMENT

The increase in terrorism threats through self-radicalisation and lone wolf attacks have heightened security alerts across the world. Counter-terrorism and Specialised Multi Agency Response Teams (SMART) are working closely with private sectors to establish critical incident management procedures to create a standardized and organizational structure towards managing these emergency incidents.

The key benefit of effective critical response management is the ability to communicate and co-ordinate response actions with other jurisdictions and across multiple emergency response agencies while sustaining business continuity.

This two-day course provides a comprehensive step-by-step guide to every aspect of a critical incident from taking initial scene command, managing resources, resolution, and to recovery and mitigation from the incident. The delivery is intensive, interactive and work-oriented, employing a variety of industry methodologies and including presentations and case studies as well as group discussions.

Drawing upon the extensive practical application of SRM and CIM techniques, it focuses on the overall security risk management (SRM) approach towards mitigation of risk, security planning, and critical incident management using evidence-based, tested, and proven methodologies applicable to a host of scenarios that may be encountered in both public and private settings.

9 KEY TAKEAWAYS

This course is filled with field-tested methodologies and tactical directions designed to prevent, contain, manage and resolve emergencies and critical incidents efficiently and effectively.

1.Critical Incident Phases – The phases of a critical incident response and tasks that must be implemented to stabilize the scene;

2.Assessing Current Security Risk – Understanding Security vulnerability assessment to test effectiveness of existing measures;

3.Leadership Style and Techniques – Required to manage a critical incident successfully;

4.Security Risk Management (SRM) Planning – Crime prevention strategies; situational crime prevention and environmental design prevention;

5.Critical Incident Stress Management for Responders –Roles of high-level personnel in setting policy and direction for the response and recovery efforts;

6.Policy and Strategy – International Standard 31000:2009 risk management in the context of security risk;

7.Maintaining Continuity of Business – Delivery of products or services in the face of a crisis;

8.Security Risk Mitigation and Controls – Apply risk assessments techniques in establishing strategies for the protection of organizational assets;

9.Presentation of Reports – Understanding of key industry and governmental security standards and its applications;

TRAINING METHODOLOGY

Combination of lectures, case studies, and group discussions

WHO MUST ATTEND?

  • Security Directors, Senior Executives, Operations Managers, Security professionals of hotels, places of interests, tourist attractions and security consultancy companies;
  • Working professionals such as managers and engineers in the IT, security and legal industries;
  • Security consultants, security analyst, trainers and advisors seeking to enhance their professional status and development will also benefit from this course.

TESTIMONIALS

“I have been very impressed with this course as there was a totally professional approach to class engagement and he very quickly identified our needs, offering a 1st class training course. There was excellent communication from him that gave us confidence in our work every step of the way. I would not hesitate to recommend him.”– Khalil Hamid, Senior Security Officer for CISCO

“Not only is the trainer very helpful and friendly, he has a good understanding of the subject due to his extensive practical experience; and even more importantly, a good understanding of how to work with us as participants during the two-day course.”– Roland Dermott, Systems Analyst for SGX Singapore

“Very professional and also very approachable. He kept in touch with everyone in class and made sure our needs were met. If I needed to chat about industry trends, he made time for me. Also, he has a very good understanding of my industry.” – Holly See, Security Training Manager, Singapore Customs

REGISTER NOW

Register today to avoid disappointment; all registrations are processed on a first-come, first-served basis.

To register, please download registration form and email/fax to clare@aventisglobal.edu.sg | 6720 2222

Venue: 100 Orchard Road, Concorde Hotel Singapore

Time: 9am to 5pm (14 Hours)

Fee: $680.00 (excluding GST)

Enquiries: Please contact @ 6720 3333 or email clare@aventisglobal.edu.sg

 

COURSE OUTLINE

DAY 1

  1. PURPOSE (9.00am – 10.00am)
  1. SCOPE (10.00am – 10.30am)

2.1       IT SECURITY DOCUMENT OVERVIEW

AM Break

  1. REFERENCE (10.45am – 12.20pm)

3.1       ISO 3100

LUNCH

  1. REFERENCE (Cont.) (1.20pm – 2.00pm)

3.1       ISO 3100

  1. DEFINITIONS AND CONVENTIONS (2.00pm – 3.15pm)

4.1       DEFINITIONS

4.2       CONVENTIONS

PM Break

  1. OVERVIEW OF IT SECURITY MANAGEMENT (3.30pm – 5.00pm)

5.1       OVERVIEW OF IT SECURITY MANAGEMENT

5.2       SECURITY RISK ASSESSMENT VS SECURITY AUDIT

5.2.1    What A Security Risk Assessment Is

5.2.2    What a Security Audit Is

DAY 2

  1. SECURITY RISK ASSESSMENT (9.00am – 10.30am)

6.1       BENEFITS OF SECURITY RISK ASSESSMENT

6.2       SECURITY RISK ASSESSMENT FREQUENCY AND TYPE

6.2.1    Security Risk Assessment Frequency

6.2.2    Security Risk Assessment Type

6.3       SECURITY RISK ASSESSMENT STEPS

6.3.1    Planning

6.3.2    Information Gathering

6.3.3    Risk Analysis

6.3.4    Identifying and Selecting Safeguards

6.3.5    Monitoring and Implementation

6.4       COMMON SECURITY RISK ASSESSMENT TASKS

6.5       DELIVERABLES

AM Break

  1. SECURITY AUDIT (10.45am – 12 30pm)

7.1       AUDIT FREQUENCY AND TIMING

7.1.1    Audit Frequency

7.1.2    Audit Timing

7.2       AUDITING TOOLS

7.3       AUDITING STEPS

LUNCH

  1. SERVICE PREREQUISITES & COMMON ACTIVITIES (1.30pm – 3.15pm)

8.1       ASSUMPTIONS AND LIMITATIONS

8.2       CLIENT RESPONSIBILITIES

8.3       SERVICE PREREQUISITES

8.4       RESPONSIBILITIES OF SECURITY CONSULTANT / AUDITORS

8.5       EXAMPLES OF COMMON ACTIVITIES

PM Break

  1. SECURITY RISK ASSESSMENT & AUDIT FOLLOW-UP (3.15pm – 5.00pm)

9.1       IMPORTANCE OF FOLLOW-UP

9.2       EFFECTIVE & QUALIFIED RECOMMENDATIONS

9.3       COMMITMENT

9.3.1    Security Consultants / Auditors

9.3.2    Staff

9.3.3    Management

9.4       MONITORING AND FOLLOW-UP

9.4.1    Set Up Monitoring and Follow-up System

9.4.2    Identify Recommendations & Develop Follow-up Plans

9.4.3    Perform Active Monitoring & Reporting

Find Out More Today – Download Free Brochure

Kindly fill in the simple form and download a FREE brochure

 

ASM.EDU.SG | SKILLSFUTURE COURSES





Need assistance with this form?