Risk Management Training and Seminars

Security and Loss Prevention

Risk Management Training Classes Risk Management, Risk Assessment, Health and Safety
Some important terms: risk management, risk assessment, health, safety security and loss prevention.
Risk Management Training Seminars and Classes
From Lifelong Learning International
Fraud Prevention and Detection instructor led trainingon-line e-learning cbt (computer based)study at homegroup study and discussioncoursewareself directede-bookDVDbookworkshop / seminar To provide the knowledge and skills required to prevent and detect fraud in large organisations. This course will include: What fraud is Types of fraud Where fraud generally occurs Why fraud occurs How to conduct fraud risk assessments Fraud prevention measures How to detect fraud quickly How to investigate and deal with fraud  more...
From Bureau Veritas Training
ISO 27001 Lead Auditor training - IRCA accredited course A17207 instructor led traininggroup study and discussioncoursewareworkshop / seminartrain the trainer This ISO 27001 Auditor / Lead Auditor course is IRCA certified (course number A17207). Upon successful completion of this course, students will be able to audit a company's information security management system and determine whether it meets the requirements of the ISO 27001: 2013 standard UPCOMING PUBLIC COURSE LOCATIONS AND DATES: Jun 06-10, 2016 - Houston, TX Jul 25-29, 2016 - Denver,  more...
From Termark Technical Institute
Intelligent Network Video Camera Course This two day ground breaking course is a MUST for any security contractor, electrician, installer, technician and engineer. Some topics covered include: Basic Digital Technology including GATES, FLIP-FLOPS, Multiplexers, Conversion Techniques, Memory Devices, and CPU / I/ O Devices. Further, we cover the efolution of video, Network Video components; Types of Network Cameras and how each  more...
From World Institute for Security Enhancement
Airport Aviation Safety - Balancing Security Issues with the Terrorist Threat instructor led traininggroup study and discussioncoursewareworkshop / seminar Using the most qualified expertise available, the World Institute for Security Enhancement provides practical programs designed to improve security at the National, State and Local level to those who want to respond effectively to issues following the tragedies of September 11, 2001. The issues are tailored specifically to meet the needs of Airport Security Officials and Officers, Law Eenforcement  more...
Technical Surveillance CounterMeasures instructor led traininggroup study and discussioncoursewareworkshop / seminar To acquaint the security director and the Technical Surveillance CounterMeasures (TSCM) inspector with the nature of the eavesdropping threat and the ways that it can be countered. To provide the attendee with information that he can apply to his own situation when designing and maintaining his eavesdropping defense. METHOD of PRESENTATION The subject is presented in a series of class  more...
Competitive Counter-Intelligence instructor led traininggroup study and discussioncoursewareworkshop / seminar As international business competition increases and the need for information becomes essential to success and survival, U. S. Corporations must understand how they can protect themselves and collect information at the same time. Now more than ever global competition demands accurate and timely business intelligence. Also foreign intelligence organizations who previously targeted government  more...
Countering Terrorism the Asset Threat Spectrum instructor led traininggroup study and discussioncoursewareworkshop / seminar The primary objectives of this program are to equip the attendees with an understanding of the current international politico-economic climate which impacts on diplomacy and business, and addresses the prospects for the short and medium term. When the Berlin Wall came tumbling down in November, 1989 it affected more than the traffic flow through the once divided city. It marked the end of the  more...
Design Application of Industrial Security Systems instructor led traininggroup study and discussioncoursewareworkshop / seminar Experience indicates that most Facility Protection Systems are poorly designed and easily breached. The integrity of Industrial Security depends on the conceptual design philosophy, including a thorough Requirements Document and a complete Facility Development Plan (FDP) prior to the selection, placement, and utilization of detection equipment. A Threat Assessment must first ask the questions  more...
Homeland Security - Protecting the Nations Critical Infrastructure instructor led trainingcourseware In light of September 11, 2001, the President of the United States of America proposed and was granted the creation of the Department of Homeland Security. This is the most significant transformation of the U. S. government in over a half-century. The creation of this cabinet-level agency was an important step in the President's national strategy for homeland security. The mission of the  more...
Harbor Maritime Security - Protecting the World's Ports instructor led traininggroup study and discussioncoursewareDVDworkshop / seminar To train personnel to ensure that all attendees can apply a standard level of adequate and timely security within the Harbor & Maritime Security environments. This course is intended to exceed the training requiremenets set forth by the International Maritime Organization's (IMO), 'Port Facility Security Officer' and the United States Maritime Transportation Security Act of 2002. Using the most  more...
Securing Mass Transit - Enhancing Passenger Safety instructor led traininggroup study and discussioncoursewareworkshop / seminar Using the most qualified expertise available, the World Institute for Security Enhancement provides practical workshops designed to improve security at the feceral, municipal, state and local level to those who want to respond effectively to issues following the tragedies of September 11, 2001. This program is tailored specifically to meet the needs of Mass Transit System personnel, security  more...
Bomb Threat Planning Management instructor led traininggroup study and discussioncoursewareworkshop / seminar Bombings, attempted bombings and bomb threats can cause extreme disruption, fear, and even panic in organizations whose personnel are not trained to handle such situations. Inappropriate and costly management decisions are often made due to a lack of organizational planning and a methodology for handling bomb threats, suspicious packages, and actual devices. This Bomb Threat Planning and  more...
Technical Surveillance Countermeasures-Tactical instructor led traininggroup study and discussioncoursewareworkshop / seminar PROGRAM OBJECTIVES To acquaint the Technical Security Specialist and the Technical Surveillance CounterMeasures (TSCM) "Sweeper" with the nature of the eavesdropping threat and the ways that it can be countered. To provide the attendee with information and an operational approach that he can apply to his own situation when designing and maintaining his eavesdropping defense. To introduce the  more...
From eCPD.
Risk Analysis and the Security Survey Risk and Security Management are concerned with the protection and conservation of corporate assets and resources. Companies worldwide use Risk and Security Management to first prevent loss and then to minimise loss when an emergency situation occurs. One of the security managera ™s main tasks is to collect accurate and detailed information about what risks exist. Once the risks are  more...
Risk Management ...Risk Management is concerned with the protection and conservation of corporate assets and resources. Companies use risk management to first prevent loss and then to minimise loss when an emergency situation occurs or disaster strikes. Some organisations see risk management as simply complying with regulatory requirements rather than a process which can contribute to organizational  more...
Anti-Kidnapping Awareness This course on Anti-Kidnapping works to educate professionals on the risks of kidnapping and key measures for identifying potential risk of kidnapping and preventing the act. For professionals working in potentially hostile and high-risk environments, this training course is essential to the security of employees, contractors, volunteers and high-risk individuals.  more...
From Distance Learning College and Training
Risk Management Level 2 Certificate This short course examines the process of risk management, and helps to develop skills allowing students to become more effective managers and understand risk management procedures in the workplace.  more...
From Compliance Trainings
Webinar On Cyber Security Planning for Medical Devices on-line e-learning cbt (computer based) How you manage cyber security issues for medical device software raises serious concerns at FDA. Software is subject to a number of FDA requirements, such as the Quality System Regulation design control requirements. In adequate cyber security measures can lead to a risk to health that prompts other regulatory requirements, such as Medical Device Reports, Reports of Corrections and Removals and  more...
Webinar On 2015 HIPAA Changes This lesson will be addressing the major changes under the Omnibus Rule and any other applicable updates for 2015. There are an enormous amount of issues and risks for covered entities and business associates under Omnibus, first and foremost being the Feds have and increased budget and enforcement abilities using outsourcing. Attend this webinar to have better understanding of: HIPAA Omnibus -  more...
From GlobalCompliancePanel
International Trade Strategies to Enhance Financing and Operational Success - Seminar This training will help make you aware of the importance of your international trade (imports, exports, licensing), the very location(s) in which you make your product. Adam Smith lives for those who want to listen. Interfere as they may, governments create market disparities that can be monetized; inputs, production, every aspect of who you sell to flows from this. Contact Information:  more...
From Compliance Trainings
Webinar On How to Conduct a HIPAA Risk Assessment and Write Policies Have your done a HIPAA Risk Assessment? Do you know a risk assessment is the first thing the Feds will ask for in an audit? Is your risk assessment adequate? Do you have written policies in place for every single one of the implementation specification of the HIPAA Security Rule (even ones that dona ™t apply) a do you know this is required!! In this webinar we will see how to conduct  more...
From Certified Information Security
Fraud Prevention Detection and Investigation certification preparation seminars and web-based training instructor led trainingon-line e-learning cbt (computer based)study at home Fraud-control training and optional certificate exams. Internal fraud is costing your organisation big money. And in these times, more than ever. In a world fraught with personal and corporate financial insecurity, the need for skilled and knowledgeable fraud-control professionals has never been greater. Employees and management alike now face multiple layoffs - often eliminating employee  more...
From Supremus Group
Business Continuity / Resumption Plan Template with Examples cd rome-book This is one of the few packages that we have for Business Continuity / Resumption Plan. This package contain 12 documents which contains template, guide and samples. These templates can be used by any organization. These templates also help to comply with following rule and regulations: Health Insurance Portability and Accountability Act (HIPAA) of 1996 Food and Drug Administration  more...
Risk Assessment Template Bundle Complete package with Policies study at homeself directedcd rome-book Twelve Risk Assessment documents included in this bundle which includes documents like templates, guides, policies, checklist, form etc.  more...
From MIS
Auditing In Governments And Public Sector Identifying, validating and documenting public sector controls  more...
5th Annual Audit Risk Governance Africa Conference Accountability, transparency and governance  more...
Corporate Security Managers Academy Enhancing and developing the leadership role of the modern Corporate Security Manager a adding value across the business through excellence  more...
Establishing Governance Risk And Audit Controls in SAP R3 Setting up audit controls and establishing continuous auditing  more...
Do you teach Risk Management ?
Custom Search
tcw11-v473M-12/14/17-00:41:33-()[B]-[B]-[B]