Wednesday, October 29, 2008

Gaining Recognition as a Security Management Professional

ARC has a wide selection of forthcoming courses that will allow you to demonstrate competence in security management. Each year the ARC International Academy trains literally hundreds of security managers from all over the world.

Security Management Stage 1 (17 – 28 November) is the “A to Z” of core security management skills. It is very interactive, fast paced and includes a challenging and engaging course project. It has been attended by hundreds of security managers from around the world, and many of the world’s top multinational companies consider it a benchmark in core-skills security management proficiency. Moreover, the course constitutes part of a work-based studies MSC with Middlesex University. For more details click here: http://www.arc-tc.com/pages/university_acredited_sm.asp#sm1

Security Management Stage 2 (9 – 20 February) is intended for experienced security managers, typically those who have undertaken a core skills security management training programme, or certification such as the CPP. Picking up where Security Management Stage 1 finishes, it tackles the more complex issues in security management. The course constitutes part of a work-based studies MSC with Middlesex University. For more details go to: http://www.arc-tc.com/pages/university_acredited_sm.asp#sm2

Security Management Stage 3 (9 – 20 February) Kuala Lumpur, Malaysia is an advanced-level security management programme that focuses on the skills necessary to manage security at a strategic, regional level. Much emphasis is placed on broadening participants’ ability to contribute effectively to top-level management teams. If you are a CPP holder, this course offers an opportunity to earn all of your necessary recertification credits in one programme. For more details contact Janet.

Investigating and Interviewing Skills (3 – 6 November) is a course specifically prepared for security professionals investigating in a legal context based on English law. Delivered by full-time and vastly experienced investigators, the course is new for 2008 and already has received tremendous accolades, including this from an energy company security advisor: “An excellent course that met my needs very well…that is, to have sufficient understanding to conduct investigations, and to commission investigations by another party.” For details go to: http://www.arc-tc.com/pages/accredited_investigation.asp#f1

IT Security and Incident Response (12-13 November) is designed for security professionals who may be called upon to investigate an incident that involves the use of a computer in some way – an increasing factor in data loss incidents. The course, led by two full-time IT forensics investigators assumes no technical knowledge, but will equip the participant with the skills necessary to manage this type of investigation and, importantly, protect delicate digital evidence that might otherwise be corrupted. For details go to: http://www.arc-tc.com/pages/accredited_investigation.asp#f4

If the course you require isn't listed above, browse www.arc-tc.com for a complete list, or contact Janet to discuss your bespoke security, crisis management or business continuity management training requirement.

Tuesday, October 28, 2008

Best Wishes and Good Luck!


The staff of the ARC Training International Academy for Security Management sends wishes of good luck to the following security managers set to sit the CPP security management certification examination in Bangladesh.

Ahsan Habib; Masud Quader; Mashud Hasan; Nurul Bashir; Richard Jansen; Nurul Mannan; Aminul Islam; Abdullah Al Obaidi; Golam Murtaza; M Hasibur Rahman; Md Sagir Hossain Biswas; Raghu Bannerjee

We hope that the past six months of intensive preparation results in success for everybody.

Best wishes

David, Phil, Peter, Janet, Bev and Nicky.

White Powder Attacks Continue in the US – Where to Download Useful Advice

More than 30 threatening letters, most containing suspicious powder, were sent to financial institutions in eight US states and Washington, D.C, last week, according to USA Today:

http://www.usatoday.com/news/nation/2008-10-21-powder-banks_N.htm

For UK Government advice on how to proactively and reactively manage the risk of biological/chemical threats by post, go to:

http://www.hse.gov.uk/biosafety/diseases/anthrax.htm

If you are concerned about duty of care to employees and would like to turn this advice into concrete procedures for staff mail handling, and you don't have time to do it yourself, contact ARC Consultancy Services to be put in touch with an expert in this field.

Corporate Manslaughter

Good background notes on what the law states, and to whom it applies at:
http://www.justice.gov.uk/docs/manslaughterhomicideact07.pdf

Monday, October 27, 2008

Are You in Energy, Communications, Transportation or Utilities, or other Critical National Infrastructure? – This Free Publication Is for You

Critical infrastructures are understood as organizations and institutions of central importance for the country and its people whose failure or functional impairment would lead to severe supply bottlenecks, significant disruption of public security or other dramatic consequences.

Serious damage to the nation’s critical national infrastructure (much of which is in the corporate sector) may be caused by natural events, technical failure or human error, intentional acts of a terrorist or other criminal nature, and war.

A comprehensive new guide from the German government offers a management strategy to help operators of critical infrastructures, i.e. companies and government authorities, identify risks, implement preventive measures and deal with crises effectively and efficiently.

The guide can be downloaded by copying the following link into your browser or contacting David.

http://www.bmi.bund.de/Internet/Content/Common/Anlagen/Broschueren/2008/Leit
faden__Schutz__kritischer__Infrastrukturen__en,templateId=raw,property=publi
cationFile.pdf/Leitfaden_Schutz_kritischer_Infrastrukturen_en.pdf

In 2009 ARC will be offering two courses specifically to address security management in critical infrastructure:

Protecting Critical Infrastructure (17-21 August 2009) is intended for security managers who manage the security of critical infrastructure - typically, energy, communications, water, finance, food, health and transport sectors. It will examine the range of threats to designated critical infrastructure, including external physical attacks, sabotage, terrorism, IT-based attacks and insider-assisted attacks, and includes strategies for risk management.

Protecting Oil and Gas Infrastructure (24-28 August 2009) is intended for security managers or consultants in the oil and gas industry, or those seeking work in this sector. Drawing on case studies from around the world, it addresses some of the more complex risks associated with oil and gas operations in various environments and includes many practical exercises.

The courses assume a baseline knowledge level of security management, such as that addressed in the Security Management Stage 1 Course. For more information contact David.

Human Rights

Useful guidelines on the UK's Human Rights Act can be found at the following link:

http://www.justice.gov.uk/docs/act-studyguide.pdf

How To Plan an Investigation

If you want to read how to plan an investigation follow this link:

http://www.csoonline.com/article/221232/How_To_Plan_an_Investigation

But if you want to be able to plan an investigation, follow the this link:

http://www.arc-tc.com/pages/accredited_investigation.asp#f1