June - Sfasis.org
Transcription
June - Sfasis.org
San Francisco Bay Area Chapter Newsletter Q2-2009 Recession fuels worries of U.S. workplace violence By Ellen Wulfhorst NEW YORK, April 22 (Reuters) - A worker recently laid off by a U.S. financial services company grew so upset that the firm had him followed to be sure he didn't strike out violently at his former co-workers or bosses. Social 2" Defense against Social Engineering" Discover 5 methodologies to thwart social engineering, elicitations or establish legitimacy "Tough times will cause people to do crazy things," said Kenneth Springer, whose company Corporate Resolutions Inc. did the surveillance. "People are taking more precautions." Indeed, stories of workplace violence are filling headlines of late -- the San Diego bus mechanic who killed two co-workers or the unemployed man in upstate New York whose 12 shooting victims included a receptionist and a teacher. With such jarring tragedies, fears of violence fueled by financial worries are growing as the recession puts strain and stress on anxious workers, experts say. Job losses, job uncertainty and slashed budgets are all pressures that could push someone over the edge. "People are flat out concerned," said James Cawood, a security expert and author of "Violence Assessment and Intervention: the Practitioner's Handbook." "People that are staying in companies where there has been significant downsizing and there's also been major dislocation ... are worried at every level," he said. "Even in down economic times, I'm doing more training now than I've done in years." Events 11 Check on the inside for chapter events coming to a location near you. Workplace violence can range from harassment and intimidation to violence and homicides, experts say. While economic stress can make some people violent, it won't turn just anyone into a killer, said Laurence Miller, author of "From Difficult to Disturbed: Understanding and Managing Dysfunctional Employees." "People shouldn't be sitting around wondering if someone they've been working with for years who has been a regular guy and no real problem is going to suddenly snap and go ballistic on them," he said. "It's usually somebody that's had a long streak of problems." Members 8 Find out our committee members in bay area 3 Is background check applying an critical role in this tough economic? 4 What is 5 Free Ways to Track Online Leaks of Information? 13 To Know about The Foundation of Intelligence management Moreover, people prone to violence tend to reveal their intentions, experts say. "People aren't mushrooms sitting in a dark closet by themselves and all of a sudden one day explode," Cawood said. "If you listen and observe what they're actually doing and saying, they're communicating." Statistics on workplace violence in this recession will take years to compile and analyze, experts say. From 1997 to 2007, the most recent year for which data is available, there were more than 7,000 occupational homicides nationwide, according to the U.S. Bureau of Labor Statistics. While most involved robberies, more than 1,000 involved work associates, the government agency said. Whether or not the numbers will show a spike in economic-related violence, the fear is valid and significant, said Joel Shults, head of public safety at Adams State College in Alamosa, Colorado and an expert in safety awareness. Elevating the fear is the fact that so many perpetrators in recent workplace shootings seemed normal, he said. "It makes it hard to tell ourselves that we're safe because they seem like such ordinary people in such ordinary circumstances," Shults said. "It's hard for us to tell ourselves, no, that's not going to happen us." Ironically, he added, a heightened sense of fear can make matters worse. "That might potentially actually increase the number of people snapping. It's one more thing to worry about," he said. (Editing by Michelle Nichols) inbox Robert Dodge, CPP Vice President - West Region Pinkerton Consulting and Investigations Defense against Social Engineering Famous Hacker Kevin Mitnick helped popularize the term 'social engineering' in the 1990's, but the simple idea itself (tricking someone into doing something or divulging sensitive information) has been around for ages. Social Engineering can be accomplished via the phone, email, web and in person. The common theme is that Social Engineers use internal phone numbers, knowledge of procedures and even industry lingo to gain the trust of their intended victims. Ultimately they hope to gain access to sensitive information/intellectual properties that could strongly damage the organization if it becomes compromised. So how can we protect ourselves? Certainly organizations should provide training education and awareness seminars on the threat of Social Engineering to all of their employees and strong information protection practices, but in addition organizations should test themselves by running 'penetration tests' that employ social engineering attacks to see the level of vulnerability the organization has. But managers can employ the following methodology to thwart social engineering, elicitations or establish legitimacy: Who is this individual engaging me? What is their agenda and the goal of this conversation? Why did this individual pick me to talk to and why at this specific time? When will the true purpose of this conversation reveal itself, now or after it has ended? Where is this conversation going and where will it end (with me saying more than I intended to?) Robert Dodge [email protected] By posing these questions internally you will raise your level of personal awareness and limit your vulnerability to leaking sensitive information and as a result help to protect your organization. Do you know….Here are ten ideas from the National Institute for Occupational Safety and Health (NIOSH) for preventing violence against workers who have contact with the public: 1. 2. 3. Use physical barriers to protect yourself. Install silent alarm systems, panic buttons. Use mirrors, raised platforms and make sure that the area where money is exchanged can be seen. 4. Use bright and effective lighting. 5. Make sure that you have enough staff members. 6. Use drop safes so that there is only a limited amount of cash on hand. Make sure that you post signs telling people that you only have a limited cash supply. 7. Use height markers on exit doors. 8. Use video surveillance equipment so that activity is always being monitored. 9. Control or limit access to the facility. 10. Install locks on doors that lead to staff-only areas. Background you need to know.. To fracture Shakespeare: Tis nobler to equally background check all, than to suffer the slings and arrows of risk and focus on those with more keys to the Proprietary Information Kingdom. In this economy, is the Company Treasury requiring an increase in your level of acceptable risk? A real and complete background check is expensive. Aside from the obvious workplace violence issues, the more sensitive and proprietary the data that employee has access to; the more important a background check is for that position. The more important it is, the more difficult it is to do a complete check and the greater the vicarious liability is of missing something important. William Stepka CPP CISSP, Stepka & Associates 425-928-7105 A really smart criminal/social engineer/industrial spy would not soil his own territory. In profiling terms, an “organized offender” who is acting as a “commuter” outside his home territory will present a challenge to the standard criminal record/background check. Criminal Record checks are the weakest link in this process. Few US counties have complete and accurate online criminal databases. Therefore, in each county where that potential employee has lived requires that an individual record retriever go there and do an actual physical search. Since it takes little time to cross county lines, this must be done for all the counties that border the list of former home addresses. While this may be adequate for a “disorganized offender” who is “marauding” for criminal opportunities near his home, it does not help with our first profile. It is important to look at the formal profile of our greatest threat, the “Organized Offender.” A list of this profile’s characteristics according to FBI Psychiatrist Ann Burgess include: “Normal-tosuperior intelligence, socially adequate, prefers skilled employment, sexually adequate……….. high social standing, father in stable employment, inconsistent discipline in childhood, emotional control during a crime, may use alcohol during a crime, precipitates situational stress, lives with partner, uses a car in good condition, follows crimes in media and may change jobs or leave the city.” The “Disorganized Offender” has the polar opposite traits and will likely not venture as far from his home territory. For our prime threat profile we need to look far and wide, from the home territory, as well as from all previous work sites. This is a lot of work and expense if you go state wide including the nearest adjacent states. One way to shorten this is to emphasize the early addresses and worksites after the age of 18 and sealed juvenile records. Early criminal activity is less organized and nearer residences and worksites. As the organized offender commits more crimes that distance increases. It is also important to hold firms doing complete backgrounds to a high standard of information retrieval or be prepared to suffer the consequences of a superficial search. These days, companies often have catch, fire and release policies – even with workplace violence, so there may not even be consistent criminal records. It all goes back to that big question: What is the executive team’s definition of acceptable risk and how will that policy be implemented in a bad economy? Update Ways to Track Online Leaks of Information information online by accident and well after its too late. - Brandon Gregg Investigations Manager Seagate Technology As you know, there is a wide range of threats online from malware and bots, to phishing scams and viruses. While your security and IT department implement firewalls and virus protection programs to combat these threats, many companies are missing the most damaging threat to their business online: Intellectual Property posted online by their own employees, maliciously or not. Unfortunately a lot of companies are stumbling across their own IP Although a new market of brand protection companies like OpSec and BrandProtect have recently popped up and grown to fill a much needed market, the following tools offer free and easy to customize internet monitoring features to be seconds behind information leaks. Monitter.com. This simple to use website allows you to customize Twitter searches by keyword and location and save your searches as RSS feeds to have the data emailed or texted to you instantly. Start off slow with searches for your company name or a new product and monitor twitter for threats, disgruntle employees and internal leaks. You will be A best case scenario for undoing the damage is the data is quickly removed by the website and is never seen again to the seemingly more common worst case scenario of becoming a viral video on youtube! 1. Monitter.com Combine the word Monitor with the social networking tool Twitter and you have amazed to see how many employees actually post on Twitter about their own company or boss. Chapter Activity - ASIS 1st Annual Social Mixer (05/21/09) 2. Limewire As many of you might know, Limewire is one of the most popular peer 2 peer file sharing programs on the internet, however its poor design (that Congress is actually demanding they change) opens the world up to any documents, photos or files on your computer. During a quick install of the program, most users overlook the details and approve the program to share the entire contents of their My Documents folder. Most recently President Obama’s new military helicopter designs for Marine One were tracked to Iranian computers after a defense contractor installed Limewire on his personal computer and shared his top secret company documents to the world. Simply download and install this program on your computer (make sure to disable all file sharing) and routinely search for your company’s name. Documents with “Acme” in the metadata or title will flag and you can actually see the user’s IP address and download the file. 3. Addictomatic.com While some search tools overlap with data and can lead to information overload, addictomatic.com provides a quick and easy way to search for your company or keywords across a wide selection of sites including news, blogs, youtube, even popular photo sharing site flickr. Countless unapproved videos and photos by employees can quickly be discovered. Left: Ray Cotton Right: Ray Madrigal Right: Tracy Gomez Mid: Andrea Savella Left: Vanessa Santucci 4. and 5. Google and Google Alerts No search for data would not be complete without Google. Their proprietary collection of websites and vast arsenal of tools give it the fourth and fifth place on the list. The power behind Google’s server farms full of processors crawling the web for information makes Google.com one of the first places to look for leaked information. However, unlike addictomatic, the information can easily be overwhelming without the right combination of search tricks. Right: Laura Armor Left: Greg Christian Using a recipe of basic and advanced search features can greatly narrow the number of results returned and give you better data. Instead of searching for Acme Company, use “Acme Company” in quotations or narrow your results with more details like “Acme Company” “Confidential Handling” to find any leaked company documents with “confidential handling” in the Group Picture metadata or headers for important company files. Check out Google advanced search or search for “Google Hack Lists” for by Gary Halverson more tricks from finding your companies IP CCTV cameras to ASIS Member password lists and much more with Google. Once you have narrowed your search and tested it out, use Google Alerts (www.google.com/alerts) to make Google work for you. In this example I have setup two searches in Google Alerts, the first a simple search to find specifically search Myspace users posting about our company, ACME : “Acme Company” site:profile.myspace.com and a second more complex search looking for any Acme file on free file sharing websites: Acme (rapidshare. | megaupload. | sharebee. | mediafire. | slil. | sendspace. | turboupload. | speedshare. | depositfiles. | massmirror. com | ftp2share.com| zshare.net). To setup, make sure to search narrow or specific topics, Acme alone might provide too much invaluable data. After you have picked a good search simply paste in your term(s), select Comprehensive, select how often Google should search (I use As-It-Happens), enter your email and soon you will be getting information sent directly to you. -Brandon Gregg Greg Schneider, CPP Understanding Intelligence Management “ Jet Liner Goes Down” “ Labor Strike in France” “Underground Explosion in San Francisco” reputations can be saved by knowing what the intelligence needs of an organization are first and then designing a plan to capture the intelligence. The Intelligence Process These headlines are examples of what we read, watch, or hear through open media sources. For some people and organizations, these incidents may directly impact their business process or livelihoods requiring them to act (intelligence), and for others these headlines are considered simple news items. A common problem facing many senior security managers is the feeling of being overwhelmed with the constant influx of information via the Internet, broadcast media, the corporate intranet, and coworkers. There is also the unspoken added pressure the chief security officer puts on him or herself to be the guy or gal who is expected to know everything that is happening anywhere in the world at any given time. Unfortunately, some managers, fall into a trap of subscribing to every conceivable security oriented e-mail list possible, with the hope of finding something “actionable”. Casting a wide net in the hope of catching a single nugget of actionable intelligence will tax corporate or organizational resources, demand many hours of analysis, and clog up the security department’s communication infrastructure. How does one actually assess what it is considered intelligence and what is non-essential news to that organization’s business continuity or security? How does one navigate through a plethora of information sources? The answers to these questions and other’s can be found by understanding how to manage the intelligence process. Valuable time, money and even Intelligence like the security apparatus can be applied on the macro level (strategic) or on the micro level (tactical). Dependent on the situation on hand, a strategic intelligence plan has goals that will enable corporate or organizational decision makers to take appropriate action in order to grow the company, i.e. business intelligence and to ensure long term business continuity. Strategic intelligence as applied to business normally falls under the responsibility of the business development or sales and marketing divisions. The security department is often tasked with developing a tactical intelligence plan geared toward situations or scenarios where more immediate action is needed to protect the organization’s assets. In some global business circles a tactical intelligence plan is carried out to limit the advantage of a competitor or adversary. To manage an intelligence plan, whether strategic or tactical, one should establish a consistent process to ensure that decision makers are getting the right information at the right time. There are certain innate phases of intelligence that when harnessed and used correctly help managers leverage corporate or organizational resources to either promote or protect the company or organization. Phases of an Intelligence Plan 1. Defining the Intelligence Requirement(s) – information needed to determine actions 2. The Collection Plan – how the intelligence will be gathered 3. Analysis – understanding what the intelligence means and its criticality to the organization 4. Dissemination – delivering the right intelligence to the right people at the right time Greg Schneider, CPP The first step in managing intelligence is to first identify what the Intelligence Requirement(s) (IR) that are needed so a decision or action can be executed by management. IRs can be strategic in nature or tactical but the intelligence process is the same. It is important to distinguish that IRs will differ from department to department even within the same organization. For example, in a corporation, the sales and marketing division will have Business Intelligence Requirements that will direct actions to help the organization grow and the security department will have IRs for the purpose of protecting the company. For our purposes we will focus on the latter. The IRs are generally comprised of a number of questions as it applies to a given situation(s). The questions usually start with “who, what, when, where, how, and why.” A potential scenario that will spawn IRs: “A large commercial development company in South San Francisco has received menacing phone calls from anonymous callers; pamphlets calling for the developer to stop building have littered the jobsite, and corporate executives have had the tires of their cars slashed.” IRs: Who are on record of opposing this development project? What is their motive in disrupting company operations? When do threatening calls, graffiti, or other nuisance crimes occur? Where do groups with grievances against the company congregate? How does this person or group fund their operations? Why is this activity happening now? The IRs give the security executive a game plan so he or she can dedicate the appropriate resources to acquire the needed intelligence. Phase II: Collection Plan Once the IRs have been generated and evaluated for criticality, the next step is designing a collection plan. The collection plan will identify the methods, means, and assets needed to acquire the desired intelligence. [email protected] Possibly much intelligence can be gathered via open source intelligence OSINT (internet, print, and broadcast news sources) or through human sources (HUMINT). Examples of human sources could be local law enforcement, journalists, subject matter experts, or even a person that can infiltrate an organization and report real time intelligence developments back to his or her handler. Other intelligence may need to be collected through technical means. Video surveillance, a derivative of photo intelligence (PHOTINT) generally considered a tool for deterrence, has the ability of capturing images and giving descriptions of individuals or vehicles near or in a company’s property. Electronic Intelligence (ELINT), listening devices; has long been a valuable method to gain intelligence but legally is questionable. IT networks and databases can of course be targeted in order to find a treasure trove of intelligence, though this method isn’t advocated for legal reasons within the private sector. Embedded into the collection plan are timelines for when the selected intelligence is needed by decision makers to act. Also of paramount importance is the need to define how the collected intelligence will be communicated back to the security or project manager. Some means of communication can be overt others may need to be covert to protect the source of the intelligence. A third necessity is creating due diligence procedures to ensure that the intelligence collected is accurate. Sources of intelligence must be vetted to ensure that the collector of the intelligence is not receiving misinformation or forwarding rumors onward to analysts. By knowing how to develop and manage an intelligence plan, security and business executives will be empowered to control the flow of information and not have information control them. (Look for Part II in the Q3 2009 Issue of the Newsletter....) Members Annual Seminar & Exhibits Chairperson Curtis M Given, CPP Visa 650-432-5551 650-554-5167 (fax) [email protected] Certifications Chairperson Rudolph A DuBord III, CPP COBHAM Defense Electronics Systems-M/A-COM, Inc. 408-624-3328 408-624-3902 (fax) ASIS Foundation Chairperson Brenda M Knox Acufacts Inc 408-286-5880 408-286-6817 (fax) [email protected] Golf Tournament Chairperson Doyle B Minnis, CPP Juniper Networks Inc 408-747-4898 408-745-8945 (fax) [email protected] [email protected] Historian Chairperson William F Stepka CPP William F Stepka & Associates 415-928-7105 415-928-5293 (fax) [email protected] I.B. Hale Chairperson John H Speicher Strategic Security, Inc. 510-623-2355 510-623-2353 (fax) [email protected] Library Chairperson Gary E Sepulveda Tippit Group 408-257-0605 408-564-4461 (fax) [email protected] Public Relations / Publicity Chairperson David J Gibbs, CPP Safir Rosetti 510-250-6224 510-839-4791 (fax) [email protected] Legislative Liaison Chairperson Lewis A Schatz CPP [email protected] Membership Chairperson Rebecca E Clevenger AlliedBarton Security Services 408-954-8274 x2 408-954-8452 (fax) [email protected] Member Profile….. Placement Chairperson Andrea Savella Steve K. Brown Silver Shield Security 408-435-1111 408-435-1122 (fax) [email protected] Hospitality / Events Chairperson Andrea Savella Securitas Security Services 408-571-1000 [email protected] Web Committee Chairperson / Webmaster Alex Dourov Utkaduck Design 925-443-8852 [email protected] St. Patrick's Day (Law Enforcement Appreciation Day) Co-Chairperson Pete Maddox OSH/Sears 209-640-2514 209-833-3199 (fax) [email protected] St. Patrick's Day (Law Enforcement Appreciation Day) Co-Chairperson Art Lesser Merit Security 650-366-0100 [email protected] Name: Andrea Savella Occupation: National Accounts Administration Specialist Securitas Security Services 1. Are you a morning or night person? Ans: Night 2. Favorite food? Ans: Mexican 3. What's your favorite color? Ans: Purple 4. What was your favorite television program? Ans: Seinfeld 5. If you could have any superpower, what would it be? Ans: Stop Time! 6. Favorite Music? Ans: All types but Country 7. Favorite Movie? Ans: Office Space 8. Favorite Hobby? Ans: Exercising OFFICER PROFILE Chapter Chairperson Raymond Cotton, CPP Orchard Supply Hardware 408-826-9834 (Ph) 866-723-4252 (fax) [email protected] Chapter Vice Chairperson Laura Armour RFI Communications and Security Systems 408-882-4377 (Ph) 408-882-4401 (fax) [email protected] Alert: In-Flight Internet... aka InfoButterfly.Net via Netragard, LLC... Airline passangers' personal computer information can be easily hacked while in flight. The wireless inflight airline internet access service, GoGo Inflight Internet ("GoGo"), which enables travelers to access the internet while in flight does not encrypt communications between users (passengers) and the Wireless Access Points on the aircraft. As a result of this lack of encryption it is easy to intercept and record all data sent and received by passengers. This poses significant risk to passengers and their respective businesses as sensitive information is sent over the air without encrtyption. This information can include emails, email attachments, email content, user names and passwords,credit card information, social security numbers, methods for accessing business networks, trade secrets, etc. Chapter Secretary Threats in Terminations: Michael Delamere Pinkerton Consulting & Investigations 408-232-3546 (Ph) 415-520-0109 (fax) [email protected] Chapter Treasurer Carlos Galvez Jr CPP Andrews International 408-516-4114 (Ph) [email protected] You are never more vulnerable to information abuse and theft than during a recession. Put your independent information security consultant into overdrive. Skimp on something else to save money. A cautionary tale... An insider at the California Water Service Company in San Jose broke into the company's computer system and transferred $9 million into offshore bank accounts and fled the country. Abdirahman Ismail Abdi, 32, was an auditor for the water company, which delivers drinking water throughout the state and is located in San Jose, Calif. Abdi resigned from his position on April 27. Allegedly, that night he went back to work and made three wire transfers totaling more than $9 million from the company's accounts to an account in Qatar. Abdi is not a U.S. citizen and was ordered deported to Somalia in 2005, the Mercury News reported. (Don't skimp on background checks either.) “The downturn in the economy is raising the internal security threat levels dramatically, as more and more disgruntled exemployees take advantage of the fact that their ex-employer did not decommission their access credentials,” Torsten George, vice president, worldwide marketing, ActivIdentity, told SCMagazineUS.com on Friday in an email. Event July Ray Pezolt, CPP Director of Operations Pinkerton Consulting & Investigations Denver, CO Topic: Internet Profiling Date: 07/16/2009 Time: 10AM PT to 11:30AM PT Location: Adobe 601 Townsend Street San Francisco, CA 94103 Ray Pezolt CPP joined Pinkerton Consulting and Investigations in 2002 after owning and operating his own private investigation and consulting company for 27 years. As Manager of Investigations for the Rocky Mountain region, his duties include supervising investigators assigned to Colorado and four other surrounding states. After four years in The US Navy, Mr. Pezolt went to work for a large security company and rapidly advanced to the investigation division. He worked for a short time as security director of a major food distribution company before starting his own investigation company. The company specialized in business and industrial investigations. Most recently he has specialized in the use of computers and the Internet to conduct "internet profiling" investigations. Mr. Pezolt has conducted internet profiling research and investigations on five continents. During his career, Mr. Pezolt has conducted investigations and consulting assignments for hundreds of clients including several US Fortune 100 companies, law enforcement agencies and media sources. Mr. Pezolt has assisted with several complex legal and business investigations, and has conducted training in computer research subjects for law enforcement agencies, private business and investigation agencies. Mr. Pezolt has assisted as technical advisor with three Emmy-award winning documentaries concerning investigative subjects. “I Know You.” A documentary for ABC news concerned the use and access of legal, public sources of information to learn supposedly "private" data about various individuals. Mr. Pezolt has been a teacher, author and featured subject of numerous television news stories and print media. Mr. Pezolt has been designated a Certified Protection Professional (CPP) by ASIS International. He graduated from Metro State College in Denver and is a graduate of the American Institute of Applied Science course Forensic Science "Civil and Criminal Identification and Investigation." Pre-Register: http://www.sfasis.org/Events/Details.asp?i=100 Cost: $0/per person August We are pleased to present the sixteenth annual Larry Marshall Memorial Golf Tournament, to be held on August 20th, 2009 at the Spring Valley Golf Course in Milpitas, CA. Larry Marshall Golf Tournament Look for the golf tournament to be another sellout this year! It is important to get your reservations in early for the golf tournament in order to secure your spot at this event. There will be lunch, a GREAT dinner, lots of beer and drinks on the course throughout the event, and of course, the company of your peers and friends from the security profession. Pre-Register: http://www.sfasis.org/Events/Details. asp?i=103 Annual Law Enforcement Appreciation Day. by: Dave Wood of OSH Ron Sathre, ASIS Region II VP Ray Cotton Chapter Chairman & OSH, and Detective Pat Ward of San Jose Police Department John Nobriga, JMN Investigations and Ron Sathre, CPP & Region II VP Greg Acton - Palm and Doyle B Minnis CPP Juniper Networks Keynote Speaker, James Molinari and Chapter Chairman, Ray Cotton. Greg Acton in front. On April 16, 2009 the San Francisco Bay Area Chapter of ASIS International hosted its 46th annual Law Enforcement Appreciation Day. 250 individuals were in attendance for the event hosted at the San Mateo Marriott. The event was kicked off with opening remarks by the Chapter Chairman, Ray Cotton of Orchard Supply Hardware, followed by an introduction by Chief of Police in the city of San Mateo, Susan Manheimer. The event was highlighted by a keynote speech from State Director of the Office of Senator Dianne Feinstein, James Molinari. More than a dozen police officers were recognized with individual awards for their outstanding performance in the preceding year. Larry Marshall Golf Tournament 2009 CPP, PCI & PSP Classroom Review Schedule Review Location September 18-19, 2009 Anaheim, California CPP Program #980 PCI Program #982 PSP Program #981 Hotel Information Contact the ASIS International Housing Bureau at 888-887-8072 (U.S. and Canada) or 972349-7452 (International) Review Schedule Thursday, September 17, 2009 5:00pm – 6:30pm Registration Friday, September 18, 2009 7:00am – 8:00am Registration 8:00am – 5:00pm Review Program Saturday, September 19, 2009 8:00am – 2:00pm Review Program Prior to ASIS International Seminar and Exhibits Location: TBD Septiembre 18-19, 2009 Anaheim, California Program CPP #983 Para reservar una habitación con la tarifa de descuento, contacte al ASIS Internacional Housing Bureau al 888-887-8072 Jueves, 17 Septiembre 5:00pm – 6:30pm Horario de inscripción Preliminar al seminario y exhibiciones de ASIS Viernes, 18 de Septiembre 7:00am – 8:00am Horario de inscripción 8:00am – 5:00pm Curso de Repaso Localidad: A ser acordada Sabado, 19 Septiembre 8:00am – 4:00pm Curso de Repaso San Francisco Bay Area Chapter Congratulations is hereby granted to George McClosky For Successfully A chieving The Designation of CPP ASIS San Francisco 2009 “The job board on the newly designed chapter website has increased capacity and offerings of open positions for hire. The job board is locked out to non ASIS SF Bay Area Chapter members. Please take the time to review the great positions available now!” http://www.sfasis.org/Career-Center/Job-Listings.asp June Position: Security/Facilities/Contracts Administrative Associate IV Location: San Jose Position: District Loss Prevention Manager Location: Bay Area - Stockton, Tracy, Milpitas area Position: Sr. Director, Security Location: Bristol, CT Position: Safety & Security Facility & Security Operations Center Supervisor Location: Sunnyvale, CA TEAM Michael Delamere [email protected] Ken Lu [email protected] William Stepka [email protected] Anders Noyes [email protected] Gary Halverson [email protected] Sponsors Diamond Sponsor Platinum Sponsor 2009 Bay Area Chapter Gold Sponsor Bronze Sponsor