
CSO 2008
Offering the CSMP - Certified Security Management Professional distance-learning award www.ismi.org.uk
In 2009 ARC Training will be offering two new courses on the protection of critical infrastructure:
Protecting Critical Infrastructure, 17-21 August, is intended for security managers who manage the security of critical infrastructure - typically, energy, communications, water, finance, food, health and transport sectors. It will examine the range of threats to designated critical infrastructure, including external physical attacks, sabotage, terrorism, IT-based attacks and insider-assisted attacks, and includes strategies for risk management. For details click on the link below:
http://www.arc-tc.com/pages/other_accredited_sm.asp#s5
Managing Security Risks in the Oil & Gas Sector, 24-28 August, is a sector-specific programme intended for security managers or consultants in the oil and gas industry, or those seeking work in this sector. Drawing on case studies from around the world, it addresses some of the more complex risks associated with oil and gas operations in various environments and includes many practical exercises. Participants should have a baseline level of security management knowledge, such as that covered in Security Management Stage 1. For details click on the link below:
http://www.arc-tc.com/pages/other_accredited_sm.asp#s1
For details on any ARC course, or to discuss an on-house requirement, contact Janet.
The UK Human Rights Act 1998 is based on the European Convention on Human Rights. The Act makes it unlawful for a public authority in the UK to act incompatibly with the Convention rights and allows for a case to be brought in a UK court or tribunal against the authority if it does so.
Privatised utilities such as water, gas and electricity companies have functions that will probably count as "public" under the Human Rights Act. If a body of this type has breached Convention rights, a claim under the Act is possible only if the act or decision complained about is in the public sphere. If it is a wholly private matter (for example where such a person, body or company is acting as an employer or in a commercial capacity), a claim under the Human Rights Act will not be possible.
For a detailed explanation of the guide, click below:
A Guide to the Human Rights Act 1998
The International Finance Corporation (IFC) publishes a set of Performance Standards to manage social and environmental risks and impacts and to enhance development opportunities in its private sector financing in its member countries eligible for financing. The Performance Standards may also be applied by other financial institutions electing to apply them to projects in emerging markets.
On a recent ARC Training on-site course, the CEO of a leading oil and gas company addressing security management delegates underscored his belief that within the context of oil and gas operations in developing countries corporate social responsibility and security management we “two sides of the same coin”.
To download the standards go to:
http://www.arc-tc.com/pages/resources_publications.asp#C
and scroll down to the heading Corporate Social Responsibility.
The relationship between Corporate Social Responsibility and security management will be one of the topics covered in detail in the new Managing Security Risks in the Oil & Gas Sector, 24-28 August. Click on
http://www.arc-tc.com/pages/other_accredited_sm.asp#s1
For details on any ARC course, or to discuss an on-house requirement, contact Janet.
The United States can expect a terrorist attack using nuclear or more likely biological weapons before 2013, reports a bipartisan commission in a study being briefed Tuesday to US Vice President-elect Joe Biden.
"The United States should be less concerned that terrorists will become biologists and far more concerned that biologists will become terrorists," the report states. The report is due for release today.
Click on the link below for the full story:
http://www.usatoday.com/news/washington/2008-12-02-terrorist-attacks-report_N.htm
“There is a pressing need to do more to prevent and prepare for violent conflict, state failure, nuclear proliferation, bioterrorism and global pandemics."
Contact David for a copy of the report, or sign up for a copy at http://www.ippr.org/security/publicationsandreports.asp?id=636&tid=2656
Security Management Stage 1 (Postgraduate University Accredited)
“The course is EXCELLENT content & procedure wise. A MUST for the Security Manager.”
Corporate Security Manager, Manufacturing Company
18 – 29 January, Bahrain
9 – 20 March, Cape Town
23 March – 3 April, UK
http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1
***
Security Management Stage 2 (Postgraduate University Accredited)
“The SM2 was challenging ….overall a very successful
programme and highly recommended for security professionals..”
Security Manager, Multinational Oil Company
9 – 20 February, UK
http://www.arc-tc.com/pages/university_acredited_sm.asp#sm2
***
Security Management Stage 3 (Postgraduate University Accredited)
“Excellent presentation of topics. Leant a lot, especially when focussing on the more strategic elements.”
Security Manager, Logistics Company
9 – 20 February, Kuala Lumpur
11 – 22 May, UK
http://www.arc-tc.com/pages/university_acredited_sm.asp#sm3
***
Security Coordination and Management
“Not only a learning experience, but one of the most enjoyable courses I’ve been on.”
Company Fire Prevention & Security Manager, Manufacturer
23 – 27 February
http://www.arc-tc.com/pages/other_accredited_sm.asp#s1b
***
Retail and Supply Chain Management
New Course - Conducted by Barry Vincent MSc, MA and Mike Goodman MSc - former heads of security with leading international retailers and specialists in supply chain and distribution
27 – 29 January
http://www.arc-tc.com/pages/other_accredited_sm.asp#s6
For details on any ARC course, or to make a booking, contact Janet.
Many more courses can be found at www.arc-tc.com
A law criminalising denial of service attacks and the supply of hacking tools has been brought into force in England and Wales after a number of delays. The law was already in force in Scotland.
Denial of service (DoS) attacks involve the simultaneous sending of millions of messages or page requests to an organisation's servers. The sudden, massive deluge of information can render website and email servers inoperable.
Read the full story at:
The BBC’s technology reporter discusses was to protect ships and other offshore facilities against criminal threats, such as piracy, at:
http://news.bbc.co.uk/1/hi/technology/7735685.stm
Offshore and maritime security is one of a range of subjects covered in the new Managing Security Risks in the Oil & Gas Sector, which will be taking place in the UK, 24-28 August 2009.
For details, go to:
http://www.arc-tc.com/pages/other_accredited_sm.asp#s1
To make a provision booking and reserve a place, contact Janet Ward.
Employers in the UK who negligently fail to prevent bribery by their employees or agents could face up to 10 years in prison under a new law proposed by the Law Commission today, reports Out-Law.com.
The Law Commission recommends that it should be an offence for a company "negligently to fail to prevent bribery where someone (A) performing services on that organisation’s behalf bribes another person, the bribe was in connection with the business of that organisation, and someone (other than A) connected with or employed by the organisation, who has responsibility for preventing bribery, negligently fails to prevent A bribing the other person."
"We recommend that it should be possible to hold directors, managers, secretaries or similar officers of a body corporate individually liable if they consent to or connive at the commission of bribery by the body corporate," said the Law Commission.
Full story at:
http://www.out-law.com/page-9613
For a link to the story click below.
http://news.bbc.co.uk/1/hi/technology/7697704.stm
The internationally recognised ASIS Physical Security Professional Certification programme has arrived in Nigeria! Over a dozen security managers attended an ARC Training five day review course in Lagos recently to prepare them for the examination to achieve this prestigious award.
The PSP certification is offered by ASIS International, the world’s leading security professional organisation. It requires candidates to have a detailed knowledge of security risk assessment, design and installation as well as other areas supporting the successful planning and implementation of physical security management systems.
ARC Training's preparation programme for this prestigious examiantion is a blend of distance learning, on-site training and self-study. It will terminate in a further review session early in 2009, followed by the final, independently adjudicated exam. Facilitated by ARC International’s Peter Horsburgh CPP, PSP, attendees can be seen here hard at work in preparation for their daily test.
For more information on how to bring this training to you, contact Janet.
Key Points
ARC has a wide selection of forthcoming courses that will allow you to demonstrate competence in security management. Each year the ARC International Academy trains literally hundreds of security managers from all over the world.
Security Management Stage 1 (17 – 28 November) is the “A to Z” of core security management skills. It is very interactive, fast paced and includes a challenging and engaging course project. It has been attended by hundreds of security managers from around the world, and many of the world’s top multinational companies consider it a benchmark in core-skills security management proficiency. Moreover, the course constitutes part of a work-based studies MSC with Middlesex University. For more details click here: http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1
Security Management Stage 2 (9 – 20 February) is intended for experienced security managers, typically those who have undertaken a core skills security management training programme, or certification such as the CPP. Picking up where Security Management Stage 1 finishes, it tackles the more complex issues in security management. The course constitutes part of a work-based studies MSC with Middlesex University. For more details go to: http://www.arc-tc.com/pages/university_acredited_sm.asp#sm2
Security Management Stage 3 (9 – 20 February) Kuala Lumpur, Malaysia is an advanced-level security management programme that focuses on the skills necessary to manage security at a strategic, regional level. Much emphasis is placed on broadening participants’ ability to contribute effectively to top-level management teams. If you are a CPP holder, this course offers an opportunity to earn all of your necessary recertification credits in one programme. For more details contact Janet.
Investigating and Interviewing Skills (3 – 6 November) is a course specifically prepared for security professionals investigating in a legal context based on English law. Delivered by full-time and vastly experienced investigators, the course is new for 2008 and already has received tremendous accolades, including this from an energy company security advisor: “An excellent course that met my needs very well…that is, to have sufficient understanding to conduct investigations, and to commission investigations by another party.” For details go to: http://www.arc-tc.com/pages/accredited_investigation.asp#f1
IT Security and Incident Response (12-13 November) is designed for security professionals who may be called upon to investigate an incident that involves the use of a computer in some way – an increasing factor in data loss incidents. The course, led by two full-time IT forensics investigators assumes no technical knowledge, but will equip the participant with the skills necessary to manage this type of investigation and, importantly, protect delicate digital evidence that might otherwise be corrupted. For details go to: http://www.arc-tc.com/pages/accredited_investigation.asp#f4
If the course you require isn't listed above, browse www.arc-tc.com for a complete list, or contact Janet to discuss your bespoke security, crisis management or business continuity management training requirement.
http://www.bmi.bund.de/Internet/Content/Common/Anlagen/Broschueren/2008/Leit
faden__Schutz__kritischer__Infrastrukturen__en,templateId=raw,property=publi
cationFile.pdf/Leitfaden_Schutz_kritischer_Infrastrukturen_en.pdf
In 2009 ARC will be offering two courses specifically to address security management in critical infrastructure:
Protecting Critical Infrastructure (17-21 August 2009) is intended for security managers who manage the security of critical infrastructure - typically, energy, communications, water, finance, food, health and transport sectors. It will examine the range of threats to designated critical infrastructure, including external physical attacks, sabotage, terrorism, IT-based attacks and insider-assisted attacks, and includes strategies for risk management.
Protecting Oil and Gas Infrastructure (24-28 August 2009) is intended for security managers or consultants in the oil and gas industry, or those seeking work in this sector. Drawing on case studies from around the world, it addresses some of the more complex risks associated with oil and gas operations in various environments and includes many practical exercises.
The courses assume a baseline knowledge level of security management, such as that addressed in the Security Management Stage 1 Course. For more information contact David.
Source: Sunday Times Online
http://business.timesonline.co.uk/tol/business/career_and_jobs/recruiter_forum/article4836584.ece
Firewalls, passwords and high-tech entry systems are all very well but they cannot stop someone from leaving documents on a train or lending their pass to a work-experience student. With all the attention being given to hacking, identity theft and computer-related security recently, it is easy to forget the key role that staff play in corporate security.
“People are beginning to realise that the data-security leakages we have read about in the press are never down to technology – they are always due to people screwing up,” said Martin Smith, chairman and founder of The Security Company (International). “So many things have gone wrong; all of them could be solved with management and training.”
Information and IT security will be covered in ARC's upcoming Security Management Stage 1 course. If you are interested in this business critical area of security, go to the ARC Website, or contact Janet or any of the team for further information.
The ASIS Physical Security Professional (PSP) certification is specially designed for anybody whose job entails the specification, project management or just the management of physical (electronic) security systems. Examination preparation is through study of a series of set books, usually over a period of several months. The examination itself comprises 120 multiple choice questions, with a pass mark of 80%. Upon passing the examination, the successful candidate is entitled to use the letters PSP after his or her name.
ARC Training has developed a unique preparation programme for the PSP examination, combining both distance learning assignments and intensive classroom study. Presently, Peter Horsburgh CPP PSP is in Lagos, Nigeria, conducting an in-house PSP Examination Review Programme for an oil sector client with 14 hopeful examination candidates in attendance. Next week he returns to the UK to work with a further 18 hopeful candidates attending ARC’s open PSP Review Programme, which is run on behalf of the ASIS UK chapter. If last year's results are anything to go by, all candidates should pass the examination under Peter's expert guidance.
Earlier this year, ARC MD David Cresswell went to Bangladesh to begin the preparation of 14 candidates, members of the embryonic new Dhaka Chapter, for the ASIS CPP examination.
If your organisation has a number of potential PSP or CPP candidates and is interested in on-site training for the PSP or CPP exams worldwide, contact Janet. Alternatively, if you would like to attend the open preparation courses in the UK contact Janet also.
1. Employees able to access a database regardless of their need to do so, with sight of complete records including information that they do not necessarily need to see.
2. Unrestricted downloading of the data base to removable media.
3. Employees able to print individual records, or even the full database, in hard copy format.
4. Employees able to access records, in undefined quantities or for unlimited periods of time, providing the opportunity to make a written copy.
6. Records, or even the entire database, altered or deleted.
7. The full database, or individual files, emailed as an attachment.
8. The full database, or individual files, uploaded to an external storage facility/website or a hosted document storage and management solution.
9. Secure employment for the purpose of having unrestricted access to confidential data with criminal intent.
10. Existing employees being coerced into removing data for financial gain.
11. Ex-employees who have not had their access rights revoked.
12. Photocopy hard copies.
13. Over the shoulder screen theft from mobile workforce.
14. Writing down, or even sharing, passwords.
15. Loss of external or portable media (memory sticks, CDs, laptops, etc) that contain unencrypted information, often during travel.
16. Misplaced, or stolen, devices (laptops, BlackBerrys, etc) used as a back door to the corporate network.