SECURITY TRAINING 2015 Agenda - IS-Sovereign

Transcription

SECURITY TRAINING 2015 Agenda - IS-Sovereign
AY
2015
nljmmNB
VENUE:
IS-SOVEREIGN-DS LTD
INTERNATIONAL SECURITY CONSULTANT & INTEGRATOR
Security Training
2015
HOMELAND SECURITY:
Corporate Concepts and Procedures
h
IS-Sovereign-DS, an international security consultant and
integrator in conjunction with a consortium of 28 world
renowned corporate security and defense experts - ISDS Israel
as the lead company - presents a 3-day training program.
This training is designed to help participants experience tried
and tested security concepts and strategies.
This program has been jointly developed by IS-Sovereign-DS
Ltd and ISDS Israel. The 3-day security program provides a
comprehensive review of current security threats as it relates
to critical infrastructure, safe school and Safe city concepts,
border and costal protection, present terrorism threats and
methods to counter them, internet banking security, among
others.
Participants will be expected to present relevant case studies
such that applicable solutions can be proffered during the
sessions. The program is thus designed to equip participants
with the knowledge and tools required to prioritize scenarios,
assess consequences and vulnerabilities and structure proper
mitigation strategies.
By using case studies, participants will be able to take with
them the tools to apply to their unique environments.
Well over 50 participants from different sectors of the Nigerian
economy, representing the Oil and Gas, Banking and Financial
Institutions, Aviation industry, Maritime, Armed forces, Nigeria
Prison Service, The Nigeria Immigration Service, Nigeria
Customs Service, Tertiary institutions, Hospitality Industry,
Security Organizations, Private School owners would attend
the training program.
This 3-Day training program is not only an effective business
network platform, but also a forum for sharing knowledge and
expertise to deal with present and future threats.
FOR MORE
INFORMATION:
contact:
Peyton: +2347061683705
Visit our website:
www.is-sovereiegn-ds.com
Security Training
2015
HOMELAND SECURITY:
Corporate Concepts and Procedures
h
FULL 3-DAY TRAINING PROGRAM INCLUDES
1. Key security briefing on major Industrial sub-sector
2. Breakout Sessions
3. Presentations and Table Top Exercises
4. Training Materials
5. Certificate of participation
6. Meals (Breakfast and Lunch)
7. Visit to security and historical sites
DAY 1
I.
-
Welcoming and General Presentation
This presentation will provide participants with an overview of global security trends with particular
reference to the African Continent and the West African Sub- region.
Introduction to the topics to be presented during the training and a rationale for the program selection.
Breakout Sessions
II.
Counter-terrorism
Measures against terrorism are founded in the right knowledge and intelligence of the different
organizations, their modus operandi, and the analysis made out of them. This portion of the training
aims to provide participants with the precise knowledge and tools.
- Intelligence: Current Situation and Threats
- Case: Northeast of Nigeria
- Difference between Crime, high levels of Criminality and Terrorism
- CBRN Threats
- Terrorists as Immigrants
- Anti-terror Concepts and Strategies
III.
Safe City and Safe School
This presentation will give participant a thorough knowledge about Safe City concepts and solutions
as well as the information to adapt these to different sites and areas, such as schools, campuses,
small neighborhoods and municipalities, among others. Participants will be given, as well, an
exposure to the different aspects of Safe City: concepts, technologies, training required, among
others.
- Concept and Solutions
- Applications for Schools, Campuses, Prisons, Churches and Mosques.
IV. Information security risks and responses
We will examine how your organization has been impacted by security incidents, using case studies to;
- Provide measures on how to manage information security risks
- Provide telecommunication operator security initiatives
DAY 2
I.
Border Protection and Coastal Protection
This presentation will address some of the most pressing transnational threats such as organized
crime, drug trafficking, terrorism, human trafficking, and smuggling, among others. Participants will be
exposed to the concept of proactive measures and solutions for dealing with these issues.
Case: Border with Cameroon and Chad
Critical Infrastructure
II.
This seminar workshop will be led by our experienced security experts and will provide hands-on work
and methodology on securing different sites. Emphasis will be given on the Energy sites as these are
of core importance. Our instructors will discuss decade long experience and provide information on all
aspects of infrastructure security: concept, planning, technology, people.
-
III.
Oil and Gas
Electricity
Water sources
Airport Protection
Case studies and lesson learnt are the meat of what operators need to know.
We will provide you with techniques and practical methods used in protecting passengers, staff
and aircraft which use the airports from accidental/malicious harm, crime and other threats.
IV.
Mega Event Security
This part of the seminar will expose security experts and Chief Security Officers to the different steps
required to achieve security in mega events (sport events, large Seminars, religious gatherings,
entertainment events etc.). Additionally, our seminar team will include security experts involved in
some of the largest past and present Large Sport Events who will share their experience and tools.
-
Risk Analysis
Crowd Control
Elements of Security Plans
DAY 3
I. Internet Banking Security
Using real life case studies and past events we will examine;
- How exposed Nigerian Banks stand
- Crime and Fraud- The way out
As well as proffer solutions for cyber security skill improvement and information security investment.
II. Emergency Management
This training module will include correct measures to efficiently deal with emergencies within the
constraints posed by the crisis or situation. The module will encompass both conceptual, practical
knowledge and methodology; and will look at Emergency Management from both a security
management viewpoint and a medical viewpoint.
Additionally, the module will include a special presentation on tactical medicine.
-
-
Security and medical aspects
Manmade disasters
Natural disasters
Table Top Exercises
Technologies and equipment
III. How to upscale
This Game Changer is specifically designed for Security Companies.
IV. Historical Site Visit

Similar documents

LETTER TO THE CHIEF OF ARMY STAFF NIGERIAN ARMY REQUESTING OFFICIALLY FOR THE SERVICES OF TWO MILITARY PERSONNEL IN OSUN STATE, NIGERIA By Professor (Grandmaster) Adefioye Sunday Adewumi

LETTER TO THE CHIEF OF ARMY STAFF NIGERIAN ARMY REQUESTING OFFICIALLY FOR THE SERVICES OF TWO MILITARY PERSONNEL IN OSUN STATE, NIGERIA By Professor (Grandmaster) Adefioye Sunday Adewumi This letter was sent to the Chief of Army Staff of the Nigerian Army on 25th of January, 2017 to officially request for the services of two undercover military personnel in Ile Ife, Osun State, “Nigeria”. The Chief of Army Staff have the apex and highest authority over ALL Military affairs that involve ALL Nigerians within the Nigerian border including making independent military decisions and embarking on independent intelligent military operations inside "Nigeria". The letter is presented exactly as it was sent via the Nigerian Army website to the Nigerian Military Number One Person and Chief raw and unedited.

More information