AY 2015 nljmmNB VENUE: IS-SOVEREIGN-DS LTD INTERNATIONAL SECURITY CONSULTANT & INTEGRATOR Security Training 2015 HOMELAND SECURITY: Corporate Concepts and Procedures h IS-Sovereign-DS, an international security consultant and integrator in conjunction with a consortium of 28 world renowned corporate security and defense experts - ISDS Israel as the lead company - presents a 3-day training program. This training is designed to help participants experience tried and tested security concepts and strategies. This program has been jointly developed by IS-Sovereign-DS Ltd and ISDS Israel. The 3-day security program provides a comprehensive review of current security threats as it relates to critical infrastructure, safe school and Safe city concepts, border and costal protection, present terrorism threats and methods to counter them, internet banking security, among others. Participants will be expected to present relevant case studies such that applicable solutions can be proffered during the sessions. The program is thus designed to equip participants with the knowledge and tools required to prioritize scenarios, assess consequences and vulnerabilities and structure proper mitigation strategies. By using case studies, participants will be able to take with them the tools to apply to their unique environments. Well over 50 participants from different sectors of the Nigerian economy, representing the Oil and Gas, Banking and Financial Institutions, Aviation industry, Maritime, Armed forces, Nigeria Prison Service, The Nigeria Immigration Service, Nigeria Customs Service, Tertiary institutions, Hospitality Industry, Security Organizations, Private School owners would attend the training program. This 3-Day training program is not only an effective business network platform, but also a forum for sharing knowledge and expertise to deal with present and future threats. FOR MORE INFORMATION: contact: Peyton: +2347061683705 Visit our website: www.is-sovereiegn-ds.com Security Training 2015 HOMELAND SECURITY: Corporate Concepts and Procedures h FULL 3-DAY TRAINING PROGRAM INCLUDES 1. Key security briefing on major Industrial sub-sector 2. Breakout Sessions 3. Presentations and Table Top Exercises 4. Training Materials 5. Certificate of participation 6. Meals (Breakfast and Lunch) 7. Visit to security and historical sites DAY 1 I. - Welcoming and General Presentation This presentation will provide participants with an overview of global security trends with particular reference to the African Continent and the West African Sub- region. Introduction to the topics to be presented during the training and a rationale for the program selection. Breakout Sessions II. Counter-terrorism Measures against terrorism are founded in the right knowledge and intelligence of the different organizations, their modus operandi, and the analysis made out of them. This portion of the training aims to provide participants with the precise knowledge and tools. - Intelligence: Current Situation and Threats - Case: Northeast of Nigeria - Difference between Crime, high levels of Criminality and Terrorism - CBRN Threats - Terrorists as Immigrants - Anti-terror Concepts and Strategies III. Safe City and Safe School This presentation will give participant a thorough knowledge about Safe City concepts and solutions as well as the information to adapt these to different sites and areas, such as schools, campuses, small neighborhoods and municipalities, among others. Participants will be given, as well, an exposure to the different aspects of Safe City: concepts, technologies, training required, among others. - Concept and Solutions - Applications for Schools, Campuses, Prisons, Churches and Mosques. IV. Information security risks and responses We will examine how your organization has been impacted by security incidents, using case studies to; - Provide measures on how to manage information security risks - Provide telecommunication operator security initiatives DAY 2 I. Border Protection and Coastal Protection This presentation will address some of the most pressing transnational threats such as organized crime, drug trafficking, terrorism, human trafficking, and smuggling, among others. Participants will be exposed to the concept of proactive measures and solutions for dealing with these issues. Case: Border with Cameroon and Chad Critical Infrastructure II. This seminar workshop will be led by our experienced security experts and will provide hands-on work and methodology on securing different sites. Emphasis will be given on the Energy sites as these are of core importance. Our instructors will discuss decade long experience and provide information on all aspects of infrastructure security: concept, planning, technology, people. - III. Oil and Gas Electricity Water sources Airport Protection Case studies and lesson learnt are the meat of what operators need to know. We will provide you with techniques and practical methods used in protecting passengers, staff and aircraft which use the airports from accidental/malicious harm, crime and other threats. IV. Mega Event Security This part of the seminar will expose security experts and Chief Security Officers to the different steps required to achieve security in mega events (sport events, large Seminars, religious gatherings, entertainment events etc.). Additionally, our seminar team will include security experts involved in some of the largest past and present Large Sport Events who will share their experience and tools. - Risk Analysis Crowd Control Elements of Security Plans DAY 3 I. Internet Banking Security Using real life case studies and past events we will examine; - How exposed Nigerian Banks stand - Crime and Fraud- The way out As well as proffer solutions for cyber security skill improvement and information security investment. II. Emergency Management This training module will include correct measures to efficiently deal with emergencies within the constraints posed by the crisis or situation. The module will encompass both conceptual, practical knowledge and methodology; and will look at Emergency Management from both a security management viewpoint and a medical viewpoint. Additionally, the module will include a special presentation on tactical medicine. - - Security and medical aspects Manmade disasters Natural disasters Table Top Exercises Technologies and equipment III. How to upscale This Game Changer is specifically designed for Security Companies. IV. Historical Site Visit
© Copyright 2024