Agenda


Draft Agenda Overview

This is a “draft agenda” providing an overview of the symposium platform and lends on providing a general structure of topics, presentations, discussions, and panels. We are in progress of adding additional content and guest speakers. Register early, secure your seat and make your travel plans. Don’t miss this event, there is no other like it.

SYMPOSIUM – DAY 1

Tuesday, 23 January  2018

Timings Topic
8:00 AM REGISTRATION DESK OPEN
Pick up your registration package and Name Tag
9:00 AM OPENING ADDRESS
9:30 AM KEY NOTE: UNDERSTAND TOMORROW TODAY
Providing actionable intelligence analysis and insight on global security, technology, and business issues that impact public safety. Looking to inform on decision-making process to understand and navigate global and local threats, risks and opportunities.
10:00 AM PROACTIVE vs REACTIVE
Most if not all the reactions of acts of terror have been reactive. Implement a proactive approach to the internal and external terrorist threats. The concept of Haves versus Have Nots has been popularized in social sciences, however, we know the luck is not a strategy.
10:30 AM Coffee & Networking
11:00 AM BILLION DOLLAR LESSONS
Economics reminds us that resources are always limited, and that resources allocated to X are not available for Y. The challenge in dealing with terrorist threats—whether to a nation, a sector such as aviation transportation, or a sub-sector—is always one of deciding where to invest scarce resources to maximum benefit. This inevitably requires difficult choices to be made, and the premise of this event is that risk assessment provides an essential framework for making such choices and should be applied more consistently to aviation security.
11:30 AM PROTECTING THE PEOPLE, REDUCING THE RISK
The human cost (most importantly) as well as the economic costs can hardly be justified.
12:00 PM INSIDER THREAT
The New System on credentialing and identification, crew, and aviation employees, as well as onsite visitors. Aligned with TSA insider threat initiative.
12:30 PM Lunch & Networking
1:30 PM Part I – REDEFINING GLOBAL TERRORISM
The Dynamics of Counter-Terrorism. Where do Terrorist Groups come from. Domestic versus International Terrorism and why it’s important to know the difference.
Part 2 – DRIVERS OF TERRORISM and MEASURING AND UNDERSTANDING
The link between political terror, human rights and terrorism. Terrorism and ongoing conflict.
• Global Terrorism Index map
• Terrorism today and future
• Ten countries most impact by terrorism
2:30 PM CRISIS MANAGEMENT & COMMUNICATION STRATEGY
Strategic crisis management, business continuity, infrastructure protection and intelligence analysis. Communication strategy and responding to mainstream media.
3:00 PM DISASTER READINESS AND RESPONSE FOR ALL VENUES
A general campaign overview aiming to reach all resources that are involved with the movement of people, crowds, and public safety.
3:30 PM Coffee & Networking
4:00 PM COUNTER TERRORISM: THE ROLES OF FEDERAL, STATE, and LOCAL AGENCIES
Each nation has the right to protect itself and its citizens.
• achieving maximum awareness of potential threats;
• deterring, intercepting, and defeating threats at a safe distance;
• achieving mission assurance, securing critical infrastructure, and ensuring continuity of operations
• improve national and international capabilities for homeland defense and homeland security (principally through active, layered defense).
4:30 PM WEAPONIZATION UNCONVETIONAL WARFARE
Theory, principals, tactics, techniques and components of resistance.
5:00 PM EXPERT PANEL DISCUSSION – Terrorism: Do We Have It Right?
Bringing together a group of subject matter experts for a panel discussion and audience engagement Q & A and discussions. Expanding on topics of interest. Lean and Learn.

Draft Agenda Overview

This is a “draft agenda” providing an overview of the symposium platform and lends on providing a general structure of topics, presentations, discussions, and panels. We are in progress of adding additional content and guest speakers. Register early, secure your seat and make your travel plans. Don’t miss this event, there is no other like it.

SYMPOSIUM – DAY 2

Wednesday, 24 January 2018

Timings Topic
8:00 AM ROOM OPENS
Early seating opportunity, please make sure you wear your name tag at all times to access facility.
9:00 AM KEY NOTE: UNDERSTANDING FOREIGN POLICY
The link between terrorism and foreign policy isn’t simple.
9:30 AM ACTIVE SHOOTER INCIDENTS: LESSONS LEARNED
These so-called lone-wolf terrorists are especially difficult to detect in advance, and thus to stop. From lessons learn to Active shooters use firearms and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly. The key is to quickly locate and neutralize the active shooter.
10:00 AM VAPOR WAKE K9
The only patented, NCS4 lab tested method of detecting “BODY WORN EXPLOSIVES/WEAPONS” hidden in transit. Outside the box of conventional and traditional K9 explosive detection screening and search.
10:30 AM Coffee & Networking
11:00 AM UNOBTRUSIVE SCREENING – Safe is a wonderful feeling
The purpose of a video security system is to make you safe and feel safe. Period. That includes your person, your business, your property, your budget. It’s not about pixels or data rates or security cameras and software. It’s about how all those things, working together, add up to your safety net.
11:30 AM BEHAVIORAL ANALYSIS
Behavioral analysis includes: Profiles of unknown offenders, linkage analysis, investigative suggestions, threat assessment, interview strategies, media strategies, search warrant affidavit assistance, critical incident analysis, and geographic profiling.
12:30 PM Lunch & Networking
1:30 PM IMMIGRATION CONCERNS
Terrorism and immigration: A risk analysis. There are some legitimate concerns about terrorism and immigration. A new era of improved identity, cross borders process, and vigilance.
2:30 PM MONETARY IMPACT OF A TERRORIST ATTACK
Budgetary impact as the result of terrorism and heighten security. What does this translate to in Security Facilitation Fees to passenger, patrons, and everyone. An outlook towards the next 10 years on return on investment.
3:00 PM COUNTER TERRORISM TRAINING: DO YOU HAVE A TRAINED STAFF?
A general overview of counter terrorism training module following the Symposium and for those interested in training their staff. This presentation will outline and map out the design, development and delivery of high-quality training courses and programs relating to Terrorism Methodology, Threat Response, Threat Mitigation and Infrastructure Protection as the primary mission of counter terrorism.
• Classroom lecture, reinforced through various training aids, hands on laboratory exercises, and practical exercises ensuring students obtain a meaningful learning experience.
• IED replicas of Bombs and Explosives, First Response, Hazardous Materials, Physical Security, Weapons/Explosives Detection, Aircraft Countermeasures, Operations Security, and Man-Portable Air Defense Systems
3:30 PM Coffee & Networking
4:00 PM IN PROGRESS
4:30 PM IN PROGRESS
Theory, principals, tactics, techniques and components of resistance.
5:00 PM EXPERT PANEL DISCUSSION – Resiliency: Enhancing Coping with Crisis and Terrorism
Bringing together a group of subject matter experts for a panel discussion and audience engagement Q & A and discussions. Expanding on topics of interest. Lean and Learn.
7:00 PM Cocktail Reception – Sponsored by Emilio & Gloria Estefan at their New Restaurant called, Emilios Kitchen” — ONLY for registered delegates.

 

Register Now



How to register?

Click on the image above to go to registration form!

 

Draft Training Curriculum Overview

This is a “draft curriculum” providing an overview of the training platform and lends on providing a general structure of topics, presentations, discussions, and computer base image interpretation module.

This is typically a 4-day course, we have condensed into 2 days on intense educational and informational sessions. Participants are encouraged to bring in their own laptops for the CBT Session (computer simulation x ray image training). The final agenda may be modified with new or updated content.

Register early, secure your seat and make your travel plans. Don’t miss this event, there is no other like it.

TRAINING – DAY 1

Thursday, 25 January 2018

Timings Topic
8:00 AM REGISTRATION DESK OPEN
Pick up your registration package and Name Tag
8:30 AM Counter Terrorism Awareness Training – Part 1
The program provides education for all employee levels from security personnel, general staff and managers on awareness and appropriate levels of response. Recent events such as the Fort Lauderdale Airport attack and the San Bernardino shootings highlight the existing vulnerabilities.
This course will provide detailed explanation and discussion covering:
• Understanding the Adversary
• History and evolution of the IED
• Recognizing the stages of a Terrorist Attack
• Countermeasures to reduce being viewed as a soft target
9:30 AM Counter Terrorism Awareness Training – Part 2
• Active Shooter contingency planning
• IED Devices recognition and trigger mechanisms
• Working area – terrorism threat assessments
• Actions on Bomb Threat
• Situational Awareness training
• Suspicious package/behavior recognition
• Covert countermeasures planning
• Suicide bomber and Suicide Vehicle Bomber threat
10:30 AM Coffee & Networking
11:00 AM PREDICTIVE PROFILING (PROACTIVE)
Syndicate Exercise Planning (Reactive)
12:30 PM Lunch & Networking
1:30 PM COMPUTER BASED SIMULATION SCREENING X-RAY INTERPERTATION – PART 1
Intense x-ray screening training with replica props and other IED training aids.
Groups will be assigned to a live checkpoint x ray monitoring intense training. This portion of the training is conducted by a highly-trained instructor.
This course will provide detailed explanation and discussion covering:
• Walk through and hand-held metal detector
• Explosive detector operation/maintenance
• X-Ray interpretation of hand baggage and individual person
2:30 PM ADVERSARY METHODS OF ATTACK (PROACTIVE) PART 1
What is an AMO?
Adversary Methods of Operation represent proven and actionable terrorist and criminal operational plans. They represent the stages a terrorist or criminal will go through when attacking a target.
This process involves a series of steps:
• Broad Target Selection
• Intelligence & Surveillance
• Specific Target Selection
• Pre-Attack Surveillance & Planning
• Attack Rehearsal
• Execution
• Escape & Evasion
3:30 PM Coffee & Networking
4:00 PM ADVERSARY METHODS OF ATTACK (PROACTIVE) PART 2
In order to identify possible AMOs, we must look at what terrorists and criminals have done in the past. For example, terrorists often travel to countries such as Afghanistan and Pakistan for Training prior to their attack. Any person with this travel itinerary could potentially be stopped and questioned as their prior actions correlate with that of a proven AMO. While it will always be useful to identify possible AMOs from the past, as Terrorists are constantly updating their methods of attack, it is important that we identify what methods they may use in the future.
Methods of Operation:
• Knowing the method of operation of a criminal or terrorist helps us become more threat orientated.
• To be threat orientated means to constantly predict potential terrorist methods of operation and to recognize the possibility that an attack can happen at any moment.
• By knowing the method of operation, we can understand how a terrorist will act in order to successfully carry out their attack.
• In order to start profiling, you must identify and test all the possible methods of operation of criminals and terrorists within your protected environment.
5:00 PM WRAP UP – INTRODUCTION TO TRAINING KITS EXHIBITION ONSITE.

TRAINING – DAY 2

Friday, 26 January 2018

Timings Topic
8:00 AM ROOM OPENS
Early seating opportunity, please make sure you wear your name tag at all times to access facility.
8:30 AM SYNDICATE EXERCISE PLANNING (REACTIVE)
To reinforce course objectives through a simple planning exercise at the Strategic-Operational- Tactical levels.
Training staff who are involved in emergency planning and response is fundamental to an organization’s ability to handle any type of emergency.
• This session outlines the aims of training in this context, describes different types of training and points.
• Designed to equip people with the knowledge, skills and awareness necessary for their role in crisis management at the national strategic level.
• Emergency planning exercises: How to run exercises and training for emergency planning and preparedness, with an act of terrorism. Exercises have 3 main purposes:
• to validate plans (validation)
• to develop staff competencies and give them practice in carrying out their roles in the plans (training)
• to test well-established procedures (testing)
10:30 AM Coffee & Networking
11:00 AM ACTIVE SHOOTER (REACTIVE)
Planning and Response to an Active Shooter
12:30 PM Lunch & Networking
1:30 PM COMPUTER BASED SIMULATION SCREENING X-RAY INTERPERTATION – PART 2
Intense screening training with replica props and other IED training aids.
2:30 PM OPEN – IN PROGRESS OF ADDING NEW CONTENT
3:30 PM Coffee & Networking
4:00 PM SECURITY COUNTERMEASURES (REACTIVE)
4:30 PM EVALUATING THE RIGHT TRAINING KIT
During this session participants will be able to explore several types of “training kits” avaiable that fits their specific training needs and requirements.
• Our extensive selection of training materials offers superior capability and realism to enhance any training program. Wide varieties of training kits are produced based on client requests and current training requirements.
• Popular kits include ordnance, explosives, IEDs, HME labs, weapons caches, and narcotics. Any product we offer can be produced to your specific needs, combined, and assembled into a custom kit.
• The possibilities of customizing your products and kits are virtually endless. You will have the opportunity to discuss your specific training requirements.
5:00 PM WRAP UP – DAY 2
CERTIFICATE OF TRAINING WILL BE PROVIDED TO PARTICIPANTS

DON'T MISS ANY OF OUR SYMPOSIUMS

Register Now