Corporate Security Intelligence Just got Smarter<br />Security Intelligence = Intelligent Security<br />
Who Are We?<br />The DICSE course is a joint venture between Security & Intelligence Solutions Ltd and Sibylline Intellige...
What Do We Offer?<br />Intelligence Management Training<br />The Developing Intelligence in the Corporate Security Environ...
Our Training Philosophy<br />Interactive Learning<br />Pre- Course reading<br />Pre-Course exercise<br />Audio visual deli...
Our Intelligence Philosophy<br />Add Value<br />Generate intelligence that is timely, concise and relevant<br />Focus on l...
Intelligence Management Training<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights rese...
The DICSE Course Who Should Attend?<br />Course Modules<br />Concepts of Intelligence <br />Intelligence Architecture, Org...
Course Content<br />Concepts and principles of Intelligence; What is Intelligence, Definitions, the Aim of Intelligence, T...
Intelligence AnalysisTraining<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights reserve...
The Analysis Mechanics Course Who Should Attend?<br />Course Modules<br />What is Analysis?<br />Where does Analysis Fit i...
Course Content<br />What is Analysis?; Why do analysis, What do we analyse, Sources of Information, What does analysis del...
Intelligence Report WritingSkills Development<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />Al...
The Report Preparation Course Who Should Attend?<br />Course Modules<br />What is an Intelligence Report?<br />Formats<br ...
Course Content<br />What is an Intelligence Report:  Definitions, end user requirements, impact<br />Formats, Channels and...
Networked Information Elicitation Training<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All r...
The Networked Information Elicitation CourseWho Should Attend<br />Course Modules<br /> <br />Debriefing and Elicitation,<...
Course Content<br />Debriefing and Elicitation;   Systematic extraction of information from a willing subject in order to ...
Operating Principles<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights reserved.<br />T...
How We Operate<br />Flexibility:  S & I Solutions and Sybilline can offer the above courses in a number of modes including...
For Further Information Contact:<br />S & I Solutions Ltd<br />Sibylline Ltd<br />72 New Bond St, <br />Mayfair, <br />Lon...
Upcoming SlideShare
Loading in...5
×

Corporate Security Intelligence Just Got Smarter All Courses Linkedin

1,629

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,629
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Corporate Security Intelligence Just Got Smarter All Courses Linkedin

  1. 1. Corporate Security Intelligence Just got Smarter<br />Security Intelligence = Intelligent Security<br />
  2. 2. Who Are We?<br />The DICSE course is a joint venture between Security & Intelligence Solutions Ltd and Sibylline Intelligence Solutions.<br />Stephen Phelps CPP MSyI is the owner and founder of Security & Intelligence Solutions Ltd. He specialises in security intelligence with particular strengths in analysis and reporting, systems integration, solution design and capacity building. With more than 30 years experience in both the government and private sectors, he currently focuses on Africa, maritime security and oil and gas. He has direct operational experience in designing, developing and managing intelligence in a range of challenging security environments in 20 countries spanning 4 continents and is an established conference speaker on West African maritime security. <br />Justin Crump is CEO of Sibylline Ltd, a specialist intelligence consultancy. Formerly he was Director of Threat Intelligence at Stirling Assynt. His experience has been gained from corporate finance, management consultancy, seventeen years in the British Army (mostly as a specialist reconnaissance officer) and roles in support of the security services. He has worked in over thirty countries and is an expert on global jihadism, with regular exposure in the media, including a dedicated role with al-Jazeera. He is also a regular conference speaker and trainer<br />
  3. 3. What Do We Offer?<br />Intelligence Management Training<br />The Developing Intelligence in the Corporate Security Environment Course<br />This course is unique in the training environment. <br />It allows managers to develop and exploit a capability that will generate significant improvements in delivery of security threat and risk mitigation. <br />It achieves this through promoting the concepts of Early Warning of threats and Intelligence-led solution design and delivery in a cost-effective manner which is compliantwith all relevant regulation, policy and standards<br />Intelligence Practitioner Training <br />The cutting edge Analysis Mechanics Course and the associated Intelligence Report Writers Course<br />These courses are designed to be complementary to the DICSE course.<br />They focus on the operators who deliver intelligence capability to the business.<br />They are aimed at improving the delivery of both analysis and products in support of the business decision maker.<br />They are built around more than 50 years of cumulative experience across military, government agency and commercial sector activity<br />
  4. 4. Our Training Philosophy<br />Interactive Learning<br />Pre- Course reading<br />Pre-Course exercise<br />Audio visual delivery mode<br />Responsive instruction<br />Discussion sessions<br />Modular delivery<br />Confirmation exercises<br />Fireside session with guest speaker (UK Only)<br />Bespoke content (In-house courses only)<br />Support to Delegates<br />Extensive Course Manual<br />Memory stick with relevant opens source documents<br />Invitation to join DICSE Alumni group on Linkedin<br />Continuous learning through the Alumni Group<br />Option of post course consultancy support to clients<br />
  5. 5. Our Intelligence Philosophy<br />Add Value<br />Generate intelligence that is timely, concise and relevant<br />Focus on loss prevention and reduction (Mitigation)<br />Support loss recovery (Investigation)<br />Deliver a Return on Investment (Loss Prevention / Reduction)<br />Demonstrate value for money<br />Support Operations<br />Reduce uncertainty by generating Situational Understanding<br />Provide intelligence that will drive the risk mitigation strategy<br />Inform solution design and delivery<br />Notify the business of changes in the operating environment<br />
  6. 6. Intelligence Management Training<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights reserved.<br />This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only.<br />The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited.<br />This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.<br />
  7. 7. The DICSE Course Who Should Attend?<br />Course Modules<br />Concepts of Intelligence <br />Intelligence Architecture, Organising and Positioning Direction and the Management Interface <br />Intelligence Function in the Business <br />Intelligence Support to Corporate Decision Makers<br />Risk Analysis and Crisis Management <br />Collection Management & Intelligence Sources <br />Collation, Assessing / Grading Information <br />Databases and Processing Tools<br />Principles, Processes and Psychology of Analysis <br />Dissemination Principles and Report Writing <br />Operational Management – The legal dimension (RIPA, Corporate, national and VPSHR) <br />Operational Management – OPSEC and Intelligence Liaison <br />Exercises <br />This programme is intended for security managers or security operators and advisors in a range of industry sectors which face significant threats from adversarial elements.<br />It is designed to deliver capability enhancement and understanding of the advantages to be gained by using high-grade intelligence relating to threats to the People, Assets, Operations and Reputation of a company. <br />Using realistic scenarios drawn from experience gained in the corporate environment, the course will impart understanding of the value and effective employment of a security intelligence capability in the routine execution of business operations and corporate decision making. <br />Participants will benefit from having a thorough understanding of the full range of security threats facing business and also an insight into the manner in which security supports enterprise wide decision making. Pre Course materials will be provided.<br />
  8. 8. Course Content<br />Concepts and principles of Intelligence; What is Intelligence, Definitions, the Aim of Intelligence, The Development of Intelligence, The Data Intelligence Transition, Why Have Intelligence, Who Needs Intelligence, What Can Intelligence Deliver, What Intelligence Cannot Deliver, Factors, Constraints and Principles, Intelligence in a Hostile Security Operating Environment, The Intelligence Cycle. <br />Intelligence Architecture; Positioning the Intelligence Team in the Business, Lines of Authority and Reporting Chains, Doctrine, Standard Operating Procedures, Reporting Vehicles, Technological Infrastructure, The Human Element. <br />Direction and the Management Interface; Management Input - Direction, Resourcing, Intelligence Requirements, Requests for Information, The Intelligence Appreciation <br />The Intelligence Function in the Business; Mission Statements, Executive Decision Making, Intelligence Products, Corporate Constraints, <br />Intelligence Support to Corporate Decision Makers Risk Analysis and Crisis Management: Generation of Early Warning, The value of Intelligence to Security Managers, Support to Operational Decision Makers, The interface with Corporate Social Responsibility, Support to Corporate Communications Strategies, <br />Collection Management and Intelligence Sources; Information Requirements Management, Formulating the Collection Plan, Sources – Human Sources, Open Sources, Technical Sources, Corporate Data. <br />Collation, Assessing and Grading of Information; Data formats, Recording Principles, Data Management Tools, Data Entry Principles, Grading the Reliability and quality of the Information, Circular Reporting, Corroboration <br />Databases; Types of Databases, Spreadsheets, Relational Databases, Links and Relationships, Data Accuracy and Integrity <br />Principles, Processes and Psychology of Analysis; Cognitive Processes, Evaluation, Grading, Comparison, Integration, Synthesis, Generation of Hypotheses, Inference Development, The Importance of Challenging Hypotheses and Objectivity, Judgement, Experience, Group Think. <br />Dissemination Principles and Report Writing; Reporting Vehicles and Formats, Visualisation Platforms, Style, Content, Classifications, Sanitisation, Customer Portals and Dashboards, Layered Delivery <br />Operational Management – The Legal Dimension; VPSHR and Intelligence Operations, RIPA and Regulatory Environment, Corporate Constraints, The Host Nation and Espionage, Data Protection and Privacy Laws <br />Operational Management – OpSec and Intelligence Liaison; Responsibility of Managers and Recipients, Dissemination Management, Control Strategies & Auditing of delivery / Receipt, Briefing Customers, Intelligence Liaison Outside the Corporate Environment. <br />Exercises; Information Gathering, Extraction of Essential Elements of Information, Grading, Analysis, Report Writing and Briefing Preparation <br />
  9. 9. Intelligence AnalysisTraining<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights reserved.<br />This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only.<br />The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited.<br />This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.<br />
  10. 10. The Analysis Mechanics Course Who Should Attend?<br />Course Modules<br />What is Analysis?<br />Where does Analysis Fit into the Intelligence Cycle?<br />Structured Analytical techniques <br />Unstructured Analytical Techniques <br />Developing and Testing Hypotheses <br />Scenario Generation<br />Making Sense of Results – Presentation Options<br />Exercises <br />This programme is intended for security intelligence operators who have direct responsibilityfor managing diverse and multiple sources of information in support of the security function. It is suitable for operators from a range of industry sectors which face significant threats from adversarial elements.<br />The course is designed to deliver capability enhancement in the field of activity associated with analysing and fusing all-source material that arrives in diverse formats. The course will generate a capability enhancement for both new and more established analysts. <br />The course will draw on both real world examples of material and fictional information in order to illustrate and practice the principles studied on the course. <br />
  11. 11. Course Content<br />What is Analysis?; Why do analysis, What do we analyse, Sources of Information, What does analysis deliver, Who needs analysis, When should we do analysis, Who should do analysis (functional roles), What equipment and resources do we need. <br />Where Does analysis fit into the Intelligence Cycle; Tasking, collection management, Collation, reporting and product generation, responsiveness, feedback. <br />Structured Analytical Techniques; Taxonomies, Decomposition, Link Analysis Pattern analysis, Trend Analysis, Anticipation analysis, Probability Analysis, Anomaly Analysis, Cultural analysis, Semiotics analysis, Aggregation analysis, Statistical Analysis, Recomposition, Visualisation, Synthesis, Selection of structured techniques, <br />Unstructured Analytical Techniques; Fusion, Learning, Objective Reasoning, Logic, Judgement, Assumption, Probability, Separating fact from fiction, Creative thinking, Hypotheses Testing, Variables, Quantitative / Qualitative research, Variation Analysis <br />Developing and Testing of Hypotheses: Brainstorming, Identifying Cause and Effect, Critical Thinking, Challenge Analysis, Force Field analysis, Analysis of competing hypotheses<br />Scenario Generation; <br />Making Sense of Results: Mind mapping, Concept mapping, Mental mapping, Semantic networks, Topic mapping, Spider diagrams, Swot analysis, PESTEL, Fishbone analysis, Pattern analysis (Temporal, Spatial and behavioural)<br />Masking Analysis Useful - Visualisation and Dissemination; Graphs, Tables, Diagrams, Maps, Brevity, Relevance, Credibility, Comprehensiveness<br />Enabling Analysis: Selecting and Training Analysts, Skills and Qualities of an Analyst, Traps to avoid<br />
  12. 12. Intelligence Report WritingSkills Development<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights reserved.<br />This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltdand is for limited use by the recipient and staff of the recipient company only.<br />The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited.<br />This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.<br />
  13. 13. The Report Preparation Course Who Should Attend?<br />Course Modules<br />What is an Intelligence Report?<br />Formats<br />Channels and Vehicles<br />Structure and content<br />Big 6 <br />Drafting Rules – Syntax and Style<br />Relevance and Clarity <br />Sanitisation and Security<br />Getting the Recipient to Read the Product<br />Layered Delivery<br />Getting Feedback and Product Development<br />Exercises <br />This programme is intended for security intelligence operators who have direct responsibilityfor generating a range of reports using various formats and vehicles. It is suitable for operators from a range of industry sectors which face significant threats from adversarial elements.<br />The course is designed to deliver capability enhancement in the field of activity associated with drafting and disseminating intelligence products to corporate decision makers. The course will generate a capability enhancement for both new and more established analysis that will ensure incisive and accurate reporting of intelligence to the right customer at the right time<br />The course will draw on both real world examples and fictional information in order to illustrate and practice the principles studied on the course. <br />
  14. 14. Course Content<br />What is an Intelligence Report: Definitions, end user requirements, impact<br />Formats, Channels and Vehicles: Audio, Video, Hard Copy, Electronic Copy, Web-based delivery<br />Structure and content: Headers, Serial Number, Date, Title, Executive Summary, Details, Comments, Assessment, Recommendations<br />Big 6: Who, What, Where, When, Why, How<br />Drafting Rules – Syntax and Style: Date formats, location names, personality names, grammar, sentence structure, paragraphs, size and readability<br />Relevance and Clarity: Business relevance, Impact on Operations, Justification of report, Cost effectiveness, Back-up reporting<br />Sanitisation and Security; Source Protection, Corporate reputation, Operational Priorities<br />Getting the Recipient to Read the Product: Visual impact, message impact, reading time demands<br />Layered Delivery; Optimisation of use, multiple version release<br />Getting Feedback and Product Development<br />Exercises <br />
  15. 15. Networked Information Elicitation Training<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights reserved.<br />This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only.<br />The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited.<br />This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.<br />
  16. 16. The Networked Information Elicitation CourseWho Should Attend<br />Course Modules<br /> <br />Debriefing and Elicitation,<br />Networking and Assessment, <br />Case Development,<br />Case Management, <br />Operational Foundation, <br />Basic Operational Tradecraft,<br />Advanced Operational Tradecraft, <br />Surveillance Awareness and Detection, <br />Situation Awareness<br />This programme is intended for persons in the Corporate Security function and Community Liaison Officers who have regular or occasional interaction with persons who might have information useful to the company.<br />The course is delivered by a strategic partner and is designed to generate a capability enhancement in the business in order to enable information gathering and exploitation in a manner that will enhance the security risk mitigation and stakeholder engagement strategies in the business.<br />The course is based on best practice developed over several decades of operating in hostile and harsh environments.<br />The course has been previously run extremely successfully in a major West African country for a global extractive industry major. <br />Courses can be designed from 1 day to 12 weeks in duration and bespoke to the client operating environment.<br />
  17. 17. Course Content<br />Debriefing and Elicitation; Systematic extraction of information from a willing subject in order to answer specific Information Requirements (IRs), Active Listening, Questioning Techniques and Strategies, Non Verbal Communications (Body Language) Recording of information, Preparation and dissemination of reports and Case Documentation. <br />Networking and Assessment; Detailed analysis of Motivation, Access, Point of Contact and Capability, Identification of potential Human Sources, Persuading them to provide information of potential intelligence interest, How to deal with ‘Information Volunteers’.<br />Case Development; How to develop the Source Case over time, Ensuring the full potential of every Source to answer Intelligence Requirements is achieved, Focussing on the long term potential rather than just the short term.<br />Case Management; Management oversight of the Case - Operational Security, Case Security, Finance, Welfare, Training, Exploitation of the information, Provision of clear direction to the Handlers.<br />Operational Foundation; Application of debriefing skills in an operational environment, Dealing with Official/Liaison Contacts, Concealment of the collection activity within routine activity, Planning and executing a discreet reconnaissance meeting. <br />Basic Operational Tradecraft; Tactics required to minimise risk associated with meeting and debriefing Sources (primarily in a relatively benign environment).<br />Advanced Operational Tradecraft; Builds on the previous module, Encompasses the more complex tradecraft required to facilitate the conduct of discreet/covert Networked Information Elicitation operations in operational environments where either the physical or hostile intelligence threat is particularly high. <br />Surveillance Awareness and Detection; Theoretical and practical surveillance training, Understanding the Surveillance Cycle, Tactics employed by a surveillance team. How can surveillance be defeated, Correct application of Anti or Counter Surveillance drills. <br />Situation Awareness; Operations in hostile physical environments, Personal risk assessment, defensive driving, residence security, vehicle search and operational risk assessment. It can also include theatre specific, scenario based situation awareness training if required<br />
  18. 18. Operating Principles<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights reserved.<br />This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only.<br />The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited.<br />This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.<br />
  19. 19. How We Operate<br />Flexibility: S & I Solutions and Sybilline can offer the above courses in a number of modes including:<br />Open Courses with multiple companies attending<br />In House Training for individual clients<br />Through ARC Training International in UK<br />Through ARC Training International’s regional partners<br />Whatever your needs we will find a way to meet them.<br />Bespoke Service: If you opt for an in-house delivery, we will deliver training which includes scenarios and exercises that are specific to your company<br />Discretion: We will respect and protect the fact that your company is a recipient of these training courses. The relationship between our companies and their respective partners will remain known only to the relevant parties.<br />Integrity: Our delivery and materials will be of the highest standard and will meet all required legislation.<br />
  20. 20. For Further Information Contact:<br />S & I Solutions Ltd<br />Sibylline Ltd<br />72 New Bond St, <br />Mayfair, <br />London, W1S 1RR<br />www.sibylline.co.uk<br /> <br />Telephone: +44(0)203 411 0697 <br />Mobile: +44 (0)7766 330 615 <br />Skype: Justincrump<br />Email: Justin.crump@sibylline.co.uk<br />Delandale House, <br />37 Old Dover Road, <br />Canterbury, CT1 3JF<br />Telephone: +44(0)1227 740695 <br />Mobile: +44 (0)7841 432516 <br />Skype: Steve.Phelps52<br />Email: stephen.phelps@sisolutions.co.uk<br />Intellectual Property Rights, Copyright Notice and Terms of Use<br />All rights reserved.<br />This document and the information, methodologies and models is the intellectual property of Security & Intelligence Solutions Ltd and is for limited use by the recipient and staff of the recipient company only.<br />The recipient and members of staff of the recipient may use portions of the information in memoranda, and presentations provided that prior permission has been obtained from Security & Intelligence Solutions Ltd. and these portions are only made available in print or by secure electronic means to a limited number of individuals. Any unauthorised copying or distribution will constitute an infringement of copyright. Commercial copying, hiring, lending and distribution is prohibited. Selling or dissemination without prior written Security & Intelligence Solutions Ltd consent is prohibited.<br />This document is intended as an overview only. It should not be treated as a definitive guide, nor should it be considered to cover every area of concern, or be regarded as legal advice. It should not be used as a basis for corporate planning or risk management strategy development.Security & Intelligence Solutions Ltd is not liable for any losses, claims, damages, expenses or other liabilities inflicted upon the recipient or any third party as a result of use of information contained in this document.<br />

×