Você está na página 1de 5

Installations, Assets and Facilities Security

with focus on Terrorist Threats


Secure Lockdown and Protection Measures for Vital Installations

Kuala Lumpur, Malaysia | 9 th - 11th April 2019

COURSE FACILITATOR

EVENTS
2 0 1 9

Noel G Whelan
International Counter Terrorism Advisor, Leadership Trainer, Author
• More than 25 years of experience in the field of anti and counter-terrorism
• Retired former member of a counterterrorism training wing, known as DG1
• Trained international police, armed forces and other government agencies globally in counter-terrorism tactics and skills
• Author of “Aviation Terrorism & Security” & “Where Demons Dread”

TESTIMONIALS
“Noel is an excellent communicator and strategist, his knowledge on Security is second to none and in the field he inspires people
to achieve more than they would expect.
Noel also has a unique way of teaching, instantly putting students at ease, I would point out that he really can do what he says he
can.”
- Stephen G Bailey, Senior Security Consultant at IK9 Security Services (UK) Ltd

“His ability to instruct specific skills that are 'not in the book' are skills you can only get from experience. Noel comes highly
recommended in knowledge and ability or in a team he has trained”.
- Steven England, CEO, Mannin Security & Investigation Services

?
“Noel's field experience and academic qualifications provide a unique combination of knowledge and practical understanding on
security issues as well as the complicated issues that surround the phenomenon of terrorism.”
- Trevor Calafato, Lecturer, University of Malta

WHY INSTALLATIONS AND ASSETS PROTECTION?


• From 2010 to 2014, Thailand has faced over 30 attacks on its Energy Assets, United Nations Security Council
• “Pipelines and power grids prime targets for terrorist attacks.” Oil and Gas Journal, February 1, 2016
• March 22, at least 34 people were killed and 190 wounded. Zaventem airport and one at a subway station near the headquarters
of the European Union. World News, Time 2016

KEY BENEFITS OF ATTENDING


• Design infrastructure that is protected against discrete and well-defined threats
• Minimise organisation’s vulnerabilities, reduce threat to a tolerable limit and make it difficult (if not impossible) for the threat to
materialise
• Respond effectively in a crisis and to restore normalcy rapidly
• Implement proactive measures to secure physical infrastructures
• Enhance the safety and security of your organisation’s systems

INSTALLATIONS, ASSETS AND FACILITIES SECURITY WITH FOCUS ON TERRORIST THREATS


WORKSHOP OVERVIEW
This 3-day workshop will take those with assets and installations responsibilities and duties through mitigation strategies to protect
their organisation against attacks. Attendees will learn the approach in assessing and managing risks that could lead to disruption to
their organisations. This workshop also teaches how to evaluate your own capability to respond rapidly to an incident and quickly
recover operations.

Day One

1. Multi deterrence layers & 3-dimensional planning for protection of Assets and Installations deemed critical
infrastructure
%FGFOTJWFPòFOTJWFQMBOOJOHBOEPòFOTJWFEFGFOTJWFQMBOOJOHJTFYBNJOFEJOUIJTQBSUPGUIFXPSLTIPQ"MMQSPGFTTJPOBM
DSJNFTBSFUIFQSPEVDUPGFòFDUJWFTVSWFJMMBODFBOEDPNNVOJDBUJPOPOCFIBMGPGBQPUFOUJBM5FSSPSJTUHSPVQ5IFZXJMMUSZBOE
JEFOUJGZZPVSDSJUJDBMJOGSBTUSVDUVSFTDFOUSFPGHSBWJUZ XIBUIPMETFWFSZUIJOHUPHFUIFS FHQFSTPOOFMPSQIZTJDBM
5PEFUFSBO
BUUBDL ZPVSQMBOOJOHIBTUPCFVOEFSUBLFOJOBUISFFEJNFOTJPOBMXBZUPEFUFDU SFQFMBOEEFUFSQPUFOUJBMBUUBDLT

2. Denying terrorists their golden hour in resilience planning


t0CTFrvaUJPOJntFrvFntion
t%JvFSTJPOBrZaUUBDLTPOyPVSDrJUJDBMJOGrBTUSVcturF
tPTychologJDBMBOEQhyTJDBMEFtFrrFOcF
tTIFDBrPVTFMBQQrPBDIPGFntrZtPyPVSDrJUJDBMJOGrBTUSVcturF
tPTychologJDBMQVSTVJUUIrPVHIDrJUJDBMJOGrBTUSVcturFT
tTFrrorJTUknoXMFEHFPGyPVSJOGrBTUSVcturF
t%JTUBOcFTQFFEovFSUJNFtPrFNovFQPtFnUJBMaUUBDLFSTGrPNyPVSGBDJMJUJFT
tAcUJPOvTrFBction

3. Human factors in protection


t)VNBOJntFracUJPOBOEUIFDrJUJDBMMJOL
t)BDkJOHBOEIoXDrJNJOBMTDBOPCUBJODrJUJDBMJOGorNaUJPOXJUIPVUFntFrJOHyPVSQrotFctFEBrFBT
t&xtFrOBMQFSTPOOFMBOEJOGorNaUJPOHaUIFring
t)PTUJMFBOEQBTTJvFJntFrOBMrFcPOOBJTTBOcF
tIntFMMJHFOcFHaUIFrJOHBOEUIFDrJUJDBMFEHF
t0QQPrtunitZMFBEJOHtPFYQMPJUaUJPOPGyPVSDrJUJDBMJOGrBTUSVcturFGBDJMJUJFT
t4UBòWJTJtPSvFUUJOH

4. Critical infrastructure protection & security through obscurity


tCountFrJOHIPTUJMFTVrvFJMMBOcF
tTarHFUIBrEFOJOH
tPrFTFnUJOHQPtFnUJBMaUUBDLFSTXJUIUIFQJcturFyPVwanUUIFNtPTFF
tTakJOHcontrPMPGUIFQPtFnUJBMaUUBDLFr’TJNBgination

5. Improvised explosive devices search & recognition


t4FBrDIJOHyPVSGBDJMJUJFTBOEPUIFSTUratFgJDMPDaUJPOTGPSJNQroWJTFEFYQMPTJvFEFWJcFT
t&YBNJOFUIFtZQFT VTFTBOEFòFcUTPGFYQMPTJvFEFWJcFT
tCPNNVOJDaUJOHTBGFMZBOEFòFctivFMZJOFNFrHFODJFTBOEFvacuaUJPOT
tWhaUtPEPBOEXIaUOPUtPEPPOEJTcovFrZPGFYQMPTJvFNatFrJBMTXJUIJOyPVSDrJUJDBMJOGrBTUSVcturF
t%FtFrrJOHJNQroWJTFEFYQMPTJvFaUUBDLT

6. Protecting key critical infrastructure resources


tProtFcUJOHyPVSTUBò
tProtFcUJOHyPVSCrBOEBOEJnvFTUNFnt
t%FTJgOJOHJOQrotFctivFMayFSTaUNJDrPBOENBDrPMFvFM
t*EFnUJGZJOHyPVSoXODrJUJDBMJOGrBTUSVcturF’TcFntrFPGgravity

7. The critical infrastructure protection cycle


t%FTJgOJOHtFDIOJRVFT UBcUJDTBOETUratFgJFTGPSyPVSDrJUJDBMJOGrBTUSVcturFQrotFcUJPOcyDMF
tRFvFSTFFOgJOFFrJOHPGtFrrorJTUQMBOOJOHBOEPCKFctivFT
t4FDVritZNPOJtorJOHvTJnvFntivFJODVSTJPOTtPyPVSDrJUJDBMJOGrBTUSVcturF
tProtFcUJPOcyDMFBOEPQQPrUVOJUJFTGPSIPTUJMFJODVSTJPOT
t&MFctrPOJDGorcFNVMUJQMJFST

INSTALLATIONS, ASSETS AND FACILITIES SECURITY WITH FOCUS ON TERRORIST THREATS


Day Two Day Three

8. Critical Assets vs critical infrastructure resilience 12. Roles and responsibilities of managing critical
rganisa r c o y facilities (joining up the thinking and deterrence)
rganisa a rating? L t work
r r c r a rit r c M r
D k t
9. Threat analysis & risk resolutions of threats to key
personnel and facilities 13. Emergency management and incident response
management

installations.

10. Malicious intent guided by inside knowledge


(Common characteristics and indicators associated with
malicious insiders) Communica - c f re
y tw G r r a r communica
i s gr rganisa a r
nt rnational Con a n control
Intr r riat ective counter measures to v ction
protect people and property rgenc rvic
Watching the internal watchers surveying your critical Preven r r c t
infrastructure as a potential target rmality
D
11. Insider threats, what to do and what not to do 15. Crisis Communications
Unknown threats from people working inside your critical
infrastructure can seriously undermine your operations.
This section of the workshop looks at what you should do if Practical Exercise
you discover a potential threat within your working called
environments. All professional crimes are the product of Deterrence” a
surveillance and communication on behalf of a to encourage dynamic critical
potential Terrorist group. Therefore, all professional crimes deterring criminal and to reinforce
begins with some forms of surveillance. This section of the
seminar will aid your employees to identify suspicious
activities in a timely manner to alert the appropriate Session Wrap
authorities and take necessary actions.
Topic breakdown and key learning takeaways revised,
Practical Exercises & Review of Surrounding Premises as a reviewed and revisited to ensure students are bringing
Case Example home essential concepts and lessons learnt from

?
Students will be brought just outside the classroom to classroom and practical exercises.
detect and explore current loopholes in facility’s security.
They will assess and brainstorm any practical remedies Certificate of Attendance Presentation
which can be put in place.

WHO SHOULD ATTEND


Personnel with assets, installations and critical infrastructure responsibilities from the following sectors:
Aviation Plant and public utilities
Embassies of foreign governments Power station
Government agencies Security and defence
Maritime and shipping Tourism and hospitality
Oil and gas infrastructure Transportation

WHY YOU SHOULD ATTEND


One key aspect of an organisation’s security strategy against terrorism is protection of its infrastructure. With proper implementation,
it is possible for any infrastructure to minimise its vulnerabilities against threats and targets.

Through this workshop, attendees will get a chance to listen and study with a world leading advisor on anti and counter-terrorism
techniques and strategies. Noel G. Whelan will guide attendees through the need for well-planned and ective critical infrastructure
protection and the challenges we now face in maintaining our nations critical infrastructures in the post 9/11 international and
domestic security environment.

INSTALLATIONS, ASSETS AND FACILITIES SECURITY WITH FOCUS ON TERRORIST THREATS


ABOUT OUR COURSE FACILITATOR

NOEL G WHELAN
International Counter Terrorism Advisor, Leadership Trainer, Author

Noel G Whelan is a world-renown Trainer, International Counter Terrorism Advisor, and Author
specialising in Dynamic Leadership, European and International Policy Making.

Mr Whelan has started his career as an International Security Operator working on various transnational missions for more than 25
years United Kingdom, Russia and the Middle East. His work has taken him to
countries such as Russia, Ukraine, Kazakhstan, Latvia, Bulgaria, Turkey, Greece, Italy, Singapore, Malaysia, Tunisia and Lebanon. He has
worked with and advised leading organisations and agencies like Department of Homeland Security United States, British
Armed Forces, Interior Ministry of Russia, United States Federal Agencies, HM Prisons and British Airways to name but a few.

He was awarded a degree of MA in Terrorism and Security from the University of Leeds in 2007. He has been a lecturer at Park
Lane College, Leeds on Risk Management and higher education programs and also a guest lecturer at the Department of
Homeland Security and Criminal Justice Programs at Lamar Institute of Technology Beaumont Texas.

Being an author of two books including his autobiography Where Demons Dread, Mr Whelan has also been numerously
interviewed in magazines and leading international TV networks such as BBC, Sky TV and ITV.

Mr Whelan currently focuses on teaching and training internationally on subjects like: Change Management, Risk Management,
Leadership with Consequences, Combating Radicalisation by Community Leadership Programs, Innovation through
Leadership.

In 2018 Mr Whelan has launched an E-learning Training Academy, International Counter Terrorism Training (ICCT) focusing on
educating people on anti- and counter terrorism techniques tactics and strategies.

Mr Whelan has also worked on and consulted movie productions such as 13 Hours in Benghazi directed by Michael Bay and A
Terrible Beauty by Tile Films Dublin, Ireland.

Noel has been conducting extensive research in terrorism related fields. His main areas of research include:
- Terrorism and Security - The Role of the Military in Middle Eastern Politics
- Republican Regime-Class and Ideology
- Contemporary Politics of the Middle East - Gulf Security and the Rentier State
- Arab Nationalism, Pan-Arabism and Statism - European Defense and Security Analysis
- Fundamentalism and Radicalism - Nuclear defense strategy

- British Armed Forces


- British Energy
- Department of Homeland Security, Texas
- Eggbororugh Power Station, UK
- HM prisons, Lindholme Doncaster, UK
- Interior Ministry Police Russia, Poland, Ukraine, Kazakhstan
- Irish Defense Forces

- Marriott Hotels
- Park Lane College Leeds, UK
- Police Force of Malta
- United States Armed Forces
- United States Coast Guard
- University of Hull, UK
- University of South East Texas, USA
- Wackenhut International, Ecuador
- White Rose Shopping Centre, UK

INSTALLATIONS, ASSETS AND FACILITIES SECURITY WITH FOCUS ON TERRORIST THREATS


INSTALLATIONS, ASSETS AND FACILITIES SECURITY WITH FOCUS ON TERRORIST THREATS
Kuala Lumpur, Malaysia | 9 th - 11th April 2019

SALES CONTRACT
DELEGATES NAME
1 Name: WŽƐŝƟŽŶ͗ Email:

2 Name: WŽƐŝƟŽŶ͗ Email:

3 Name: WŽƐŝƟŽŶ͗ Email:

COMPANY DETAILS
KƌŐĂŶŝƐĂƟŽŶ͗ Telephone: Fax:

Address:

Address 2: Post Code:

Nature of Business: Company Size:

AUTHORISATION
^ŝŐŶĂƚŽƌLJŵƵƐƚďĞĂƵƚŚŽƌŝƐĞĚƚŽƐŝŐŶŽŶďĞŚĂůĨŽĨĐŽŶƚƌĂĐƟŶŐŽƌŐĂŶŝƐĂƟŽŶ͘

Name: Signature Company Stamp

WŽƐŝƟŽŶ͗

Date: / /
( DD / MM / YYYY ) *This sales contract is invalid without signature & company stamp

WORKSHOP FEE PAYMENT METHOD


SGD 3,995 per delegate Visa/Master^ Giro

SGD 3,795 per delegate if 2 or more delegates sign up Telegraphic Transfer Cheque

* The above amount payable is net withholding taxes or any other taxes, if any.

TRAINING DEPARTMENT CONTACT DETAILS CONTACT PERSON

Please complete this form immediately and email to:


Name:
Contact: Eileen Yeo
WŽƐŝƟŽŶ͗ General Line: (65) 6256 3278
Direct Line: (65) 6256 3278 #114
Email:
Email: eileen@miceglobal.com.sg
Contact Number: Event code: MGS283

CANCELLATION / SUBSTITUTION POLICY


IF you are unable to attend, a substitute delegate is welcomed at no additional charge. All bookings carry a 50% liability after a fully completed sales contract has been received by
M.I.C.E Global. An o ter of the cancellation must be received via email or fax 3 weeks prior to the event date in order for the balan ce of the event fee as a credit to be applied
against another M.I.C.E Global workshop or conference. Cancellation of any event with less than 3 weeks notice prior to the event date carry a 100% liability. M.I.C.E Global reserves the
right to cancel or make any other changes to the content and timing of the events or speakers for reasons beyond its control. If for any reason M.I.C.E Global decide to amend these
workshops or conferences, M.I.C.E Global is not responsible for covering airfare, hotel or other costs incurred by registrants. In the event that M.I.C.E Global cancel the event, M.I.C.E
reserves the right to transfer the booking to another event or to provide a credit of an equivalent amount to another event to be held within the following twelve months.

INDEMNITY: Should for any reason outside the control of M.I.C.E Global, the venue or speakers change, or the event be cancelled due to an act of terrorism, extreme weather conditions
or industrial action, M.I.C.E Global shall endeavour to reschedule but the client hereby indemnifies and holds M.I.C.E Global harmless from and against any and all costs, damages and
expenses, including attorney fees, which are incurred by the client. The construction, validity and performance of this Agreement shall be governed in all respects by the laws of
Singapore to the exclusive jurisdiction of whose Courts the Parties hereby agree to summit.

Você também pode gostar