** Schedule is subject to change

Monday, June 1, 2020

7:00 AM – 5:00 PM: Successful Security Consultant Course

7:00 AM – 5:30 PM: Conference Registration Open

5:30 PM – 7:00 PM: Welcome Reception

Tuesday, June 2, 2020

7:00 AM – 5:00 PM: Conference Registration Open

7:00 AM – 8:00 AM: Breakfast

7:00 AM – 5:00 PM: Exhibit Hall Open

8:00 AM – 8:30 AM: Welcome Remarks

- Lynda L. Buel, CPP, CFE, CSC, CPTED Practitioner – President, IAPSC
- Al Zajic, CPP, CSP – Conference Committee Chair, IAPSC

8:30 AM – 9:30 AM: Keynote - ASIS 

- Darren Nielsen & Peter O’Neil
- Join ASIS International Global Board of Directors leader Darren Nielsen and CEO Peter O’Neil, as we discuss how ASIS supports and promotes the role of security consultants around the globe, and hear more about a new global governance structure that is being implemented that will bring us together as security management practitioners.

9:30 AM – 9:45 AM: Sponsor Presentation #1

9:45 AM – 10:45 AM: Finding Your Brand Magic

- Ryan Magada
- Many organizations never stop to think about what they are REALLY delivering to their clients. There’s something magical at the core of every brand, and if you don’t know what it is and how to talk about it, you’re missing your biggest brand asset. Your customers desire to connect on a human level, to feel known and heard, to know HOW to work with you, and to be led through an experience. These are all things that will set your brand apart from other organizations in your industry, and I can show you how. It’s time to get magical!

10:00 AM – 12:30 PM: Guest Activity

10:45 AM – 11:00 AM: Morning Break

11:00 AM – 12:00 PM: A Real World Look at Artificial Intelligence and How It Will Impact the Security Industry

- Robert Prady, CPP, PSP, CSP (AXIS)
- Today there is quite a bit of fervor and misinformation about machine learning and artificial intelligence. This session will explore what those two terms actually mean and how their development will affect how we protect people and property with technology. Privacy concerns and the unintended consequences will also be discussed. There will also be time reserved for Q&A on the subjects discussed.

12:00 PM – 12:15 PM: Sponsor Presentation #2

12:15 PM – 1:15 PM: Networking Lunch

1:15 PM – 2:15 PM: Management Strategies for When Subcontractors Go to the Dark Side

- Sean Ahrens
- If your organization subcontracts, or intends to subcontract, you have to listen to this discussion. Join Mr. Ahrens as he describes the humorous, yet factual elements of an engagement where a subcontractor failed his organization. In this session, Mr. Ahrens will review the learning lessons, which include the good, bad, ugly and really ugly parts of this engagement and how AEI was ultimately able to secure a positive nod from the client. Participants will obtain actionable tools for subconsultant on-boarding, management options, client communication, brand/image management, profit containment and liability protection from something that wasn’t your firms fault, but you are ultimately still responsible for.

2:15 PM – 2:30 PM: Afternoon Break

2:30 PM – 2:45 PM: Sponsor Presentation #3

2:45 PM – 3:45 PM: Using Research Methodology to Support Security Opinions and Assessments

- Christine Army
- This session will focus on the need for strong research methodology to assist experts in providing opinions in civil litigation cases. It will also focus on the use of published research and data to support security assessments as well as recommendations made to clients. Insight will be provided as to how to conduct research, how to assess the validity of studies, the many ways statistics can be helpful or hinder research, and how to analyze data to form a pattern.

3:45 PM – 4:00 PM: Sponsor Presentation #4

4:00 PM – 5:00 PM: Is This Fruit “Ripe For Picking (RFP)” – How to Evaluate & Respond to RFPs: The Do’s and Don’ts

- Harold Gillens
- This session will review and discuss pre-proposal marketing, proposal evaluation, proposal development, proposal submission and the post proposal process.

5:00 PM: Adjourn for the Day – Open Evening

New Member Dinner – Details TBD

Wednesday, June 3, 2020

7:00 AM – 5:00 PM: Registration Open

7:00 AM – 5:00 PM: Exhibit Hall Open

8:30 AM – 9:30 AM: Special Interest Group Breakfast

- Security Design/Engineering
- Cyber Security
- Forensic/Security Management
- Business Development/Marketing

9:30 AM – 9:45 AM: Sponsor Presentation #5

9:45 AM – 10:00 AM: Morning Break

10:00 AM – 11:00 AM: Attorney Strategies for Taking Security Expert Depositions

- Steve Jaffe, Esq.
- The process of legal discovery in a litigation includes the taking of depositions of security experts by opposing counsel for various reasons. This partner with a large defense firm in Las Vegas, experienced in security litigation, will present different strategies used by attorneys during the deposition process and how it becomes important at the time of trial to include voir dire for qualifications and the attempt at impeachment of security experts during cross-examination. Common mistakes made by security experts during depositions that can result in motions to limit their testimony, be excluded or stricken, or damage credibility will be demonstrated.

10:00 AM – 11:00 AM: Technical Workshop Session Part I

- Frank Pisciotta
- Core topics will include development and trends in video surveillance, security in the cloud, and how detailed should technical recommendations be made in a security assessment.

11:00 AM – 11:15 AM: Sponsor Presentation #6

11:15 AM – 12:15 PM: Security Checks In: Trends in Lodging Security

- Chad Callaghan, CPP, CSC, CLSD, Brad Bonnell & Patrick Murphy
- The hotel/lodging industry has grown exponentially in the U.S and internationally over the past 25 years. On an average night in the U.S., over 5 million guests are staying in hotels – a population that would be equivalent to the third largest U.S. city. Securing those guests, employees and physical assets 24 hours a day/seven days a week creates some unique challenges and affects systems, processes and policies. This session will focus on where lodging security has come from and where it might be headed in the future, as well as anecdotal stories to keep things interesting. Audience participation and questions are encouraged!

12:15 PM – 12:30 PM: Sponsor Presentation #7

12:30 PM – 1:30 PM: Networking Lunch

1:30 PM – 2:30 PM: Human Trafficking 101: A Primer on the Emerging Law of Human Trafficking and its Security Implications

- Christian Shippee, J.D.
- While the federal Trafficking Victims Protection Act was enacted in 2000, there has been an unprecedented increase in human trafficking awareness and litigation in recent years. The continued evolution and application of human trafficking law may potentially impact business practices in the private sector. This session will provide a general overview of human trafficking law, the state of litigation today, and its potential implications for the security industry.

1:30 PM – 2:30 PM: Technical Workshop Session Part 2

- Frank Pisciotta
- Core topics will include development and trends in video surveillance, security in the cloud, and how detailed should technical recommendations be made in a security assessment.

2:30 PM – 2:45 PM: Sponsor Presentation #8

2:45 PM – 3:45 PM: Armed or Unarmed Security: A Thoughtful Discussion

- Mitch Fenton
- Join Mitch Fenton in this attendee interactive discussion on trends in gun violence, active shooters, liability exposures and how they relate to the decision to deploy armed or unarmed security personnel in an ever-changing world. The discussion will include some companies’ decisions to deploy selective armed Security Emergency Response Teams for dynamic incident immediate response, what internal safeguards should be in place, and the impacts on customers and employees.

3:45 PM – 4:45 PM: Diagnosing Healthcare Security: You May Need to See a Specialist

- Bryan Warren, MBA, CHPA, CPO-I
- This presentation will examine the unique challenges of conducting security related assessments and providing consulting services within the healthcare industry. Topics will include a review of the more common regulatory and accreditation agencies and their expectations, security issues that are most prevalent in today’s healthcare environment, security sensitive areas and special patient populations, and descriptions of frequently cited deficiencies and how to avoid them. Factors that can impact an effective physical or operational security assessment in this setting will also be discussed including how to assist healthcare security leaders in validating their requests for additional resources and recent legislative and regulatory changes can influence proposed security that enhancements.

4:45 PM – 5:50 PM: IAPSC Annual Business Meeting

- Lynda L. Buel, CPP, CFE, CSC, CPTED Practitioner – President, IAPSC
- (Elections)

6:30 PM – 7:30 PM: Reception

7:30 PM – 9:00 PM: Awards Dinner

9:00 PM: Conference Adjourns