Phil Wood gave a very well received presentation to the Berlin ASIS European Security Conference on the value of aligning security with best practices in risk management on Monday 26th March. The conference, at which ARC trainers are regular speakers, attracted 500 security professionals from all over Europe, the USA and beyond.
The increasing importance of rooting security management programmes in the fundamentals of risk analysis was reflected this week also in the concurrent activities of David and Peter. David has spent the week in Houston as a guest of one the world's largest and best-known private sector energy companies to facilitate a workshop on the global roll-out of this company's new risk security risk assessment methodology. A derivative of a methodology developed by the American Petroleum Institute, the security risk assessment tools and processes now being introduced by this company are truly world standard, against which other companies are sure to benchmark.
Peter, meanwhile, was left in the UK where he has been consulting to a major multinational pharmaceutical company to develop new security management systems and protocols, which includes the provision of a best practice security risk management methodology.
The increasing importance of rooting security management programmes in the fundamentals of risk analysis was reflected this week also in the concurrent activities of David and Peter. David has spent the week in Houston as a guest of one the world's largest and best-known private sector energy companies to facilitate a workshop on the global roll-out of this company's new risk security risk assessment methodology. A derivative of a methodology developed by the American Petroleum Institute, the security risk assessment tools and processes now being introduced by this company are truly world standard, against which other companies are sure to benchmark.
Peter, meanwhile, was left in the UK where he has been consulting to a major multinational pharmaceutical company to develop new security management systems and protocols, which includes the provision of a best practice security risk management methodology.