SlideShare a Scribd company logo
1 of 8
Download to read offline
Experience,
D
edication, and Leadership in Security EDUCATION
Assets Protection Course I:
Concepts and Methods
November 16-19, 2009
Philadelphia, Pennsylvania
Begin by establishing a solid foundation,
then move to practical applications, and
conclude with functional management.
From network security to convergence, workplace
violence to terrorism, intrusion detection to executive
protection, today’s security professionals have a lot to
deal with. Why go it alone?
Gain a broad, in-depth perspective of the demands of
assets protection at APC I. Don’t miss this opportunity
to exchange ideas, discover new techniques, and identify
strategies that will energize you in today’s challenging
security environment.
Once you’ve mastered the fundamentals, you’re
prepared to learn how to put those solutions to work.
APC II continues the security principles presented in
APC I, but now you’re ready to explore the more complex
aspects. You’ll get the vital information you need for
security planning and meeting operational requirements.
Join some of the most experienced professionals in the
security industry in discussing the latest crime
detection, prevention, and intervention techniques,
while reviewing the importance of relevant
laws and legal issues.
Don’t miss the opportunity to
advance in your profession.
Take the first step now and register today.
The APC Series provides professionals with broad-based
knowledge to keep their personnel and assets protection
a step ahead of today’s risks and threats. From beginning
through advanced topics, the APC programs expose you
to proven techniques and give you a solid understanding
of all aspects of assets protection.
Introduction to Assets Protection
Review the basics of commercial
and industrial security, and then
put together a comprehensive
assets protection plan.
	
Security Surveys and
Vulnerability Assessments
Learn how to assess and reduce
security loss and risk exposure by
using surveys and assessments.
Crime Prevention Through
Environmental Design
Gain an appreciation of this
passive, low-cost, effective crime
prevention technique.
Locking Concepts
Discover the pros and cons of
various locking devices and learn
how to integrate them into your
program.
Barriers
Evaluate the cost-effectiveness and
uses of structural barriers.
Access Control
Examine the purpose, theory, and
technology behind access control.
Review what’s in general practice
today.
Intrusion Detection—Interior and
Exterior Sensors
Review the advantages and
vulnerabilities of the major sensor
types and current protection
system strategies.
Security Lighting and Video
Surveillance
Extend the value of surveillance
by learning how to match your
security lighting objectives to
functional solutions.
Deception Detection
Discuss behavioral analysis
and preparation for successful
interviews. Explore proven
deception detection techniques.
Professional Security
Management and SOPs
Apply practical management
principles and methods for
improved results. Learn how to
consistently incorporate best
practices into your standard
operating procedures.
Investigations
Examine the investigative process
and learn to conduct thorough,
complex workplace investigations.
Review techniques, resources, and
procedures used by experienced
investigators and fact-finders.
Security and the Law
Examine the legal framework in
which a security organization
operates. Explore constitutional
immunities, civil areas of tort
and contract liability, civil and
consumer rights, administrative
procedures, and ethical
considerations.
Ethics
Evaluate the implications and
dilemmas inherent in real-life
ethical decision-making.
Workplace Violence
Develop detection, prevention,
and intervention strategies for
violent behavior and workplace
aggression. Analyze recent
workplace violence cases and
learn how to defuse the most
challenging situations.
Emergency Planning
Understand what constitutes
a disaster situation and then
establish procedures to prevent,
control, and recover from all types
of disasters.
APC I: Concepts and Methods
March 16–19, 2009
New Orleans, Louisiana
November 16–19, 2009
Philadelphia, Pennsylvania
Program Overview
APC I, the cornerstone of ASIS’ educational programming, is essential
for all professionals involved in the protection of assets. Not only does
it provide a solid basis for advanced development, but it goes beyond
to give you the broad view and in-depth perspective you need to
succeed in today’s challenging security landscape. Register today and
climb to the top faster than you thought possible.
Studying for your
CPP certification?
APC I can serve
as an additional
source of study in
preparation for the
CPP exam.For updates, check www.asisonline.org
• Master the fundamentals of assets protection.
• Familiarize yourself with methods to recognize, detect, and prevent
fraud and employee theft.
• Identify ways to conduct incident, background, and undercover
investigations.
• Obtain proven methods of analyzing and assessing security loss/risk
exposure.
• Learn steps to help you develop emergency/disaster plans and
procedures.
• Explore the various components of integrated security systems.
• Acquire a comprehensive understanding of contemporary legal issues.
Immediate Benefits
Fast Facts: APC I
Registration Hours
Sunday			
5:00 pm–6:00 pm
Monday			
7:00 am–8:00 am
Program Hours
Monday–Wednesday
8:00 am–5:00 pm
Thursday
8:00 am–4:00 pm
				
Hotel Information
March 16-19, 2009
Be sure to mention ASIS when
requesting the special room rate of
$179 single/double (plus tax). This
price will be honored until February
20, 2009 or until the room block
is full.
Omni Royal Orleans Hotel
621 St. Louis Street
New Orleans, LA 70140
1-504-529-5333
1-800-the-Omni
	
November 16-19, 2009
Be sure to mention ASIS when
requesting the special room rate of
$179 single/double (plus tax). This
price will be honored until October
19, 2009 or until the room block is
full.
Hyatt Regency Philadelphia at
Penn’s Landing
201 S. Columbus Blvd.
Philadelphia, PA 19106
1-215-928-1234
1-800-233-1234
Registration Fees
ASIS member: 	 $1,100
Nonmember: 	 $1,300
Fees include daily continental
breakfast, a reception Monday
evening, refreshment breaks, and
a custom manual that includes
relevant chapters from the
Protection of Assets (POA) Manual.
Hotel costs are not included.
Attire
Business casual is recommended.
Program Advisor
Severin Sorenson, CPP
President and CEO
Sikyur.com
Faculty
Joseph P. Buckley III
John E. Reid & Associates
Michael A. Crane, CPP
IPC International Corporation
Eugene F. Ferraro, CPP, PCI
Business Controls, Inc.
Shannon J. Gregg, CPP
Gregg Services, Inc.
George E. Ronne, Jr., CPP
ASIS Lifetime Member
Frank W. Sulzer, CPP
Sulzer Enterprises
Faculty subject to change.
Updates will be posted online.
• Professionals new to security management
• Professionals needing an overview of security management functions
• Supervisors of security personnel
• Others with security responsibilities, including human resources, facilities,
and legal personnel
Who Should Attend
APC II: Practical Applications
May 4-7, 2009
San Francisco, California
Top experts share real-life cases, proven solutions, best practices, and
field-tested strategies at APC II: Practical Applications. Don’t miss this
unique opportunity to put your skills to the test, identify dangers
ahead, network with the best, and pick up ideas you can implement
right away—and use again and again.
For updates, check www.asisonline.org
Financial Investigation and the
Badges of Fraud
Revolutionize your ability to
conduct financial investigations
by making the most of the vast
amount of public information
available via commercial databases
on the Web. Get information
on the “badges of fraud,” learn
how to recover fraudulently
conveyed assets, and protect your
organization from fraud.
Effective Interrogation
Videotapes of actual interviews
and interrogations will be used
to: discuss the interrogation
process, beginning with how to
initiate the confrontation; develop
the interrogational theme; stop
denials; overcome objections; and
use the alternative question to
stimulate an admission.
	
Investigative Law
Keep the law on your side and
get answers to questions that
matter. Understand the law’s
impact on internal, EEOC, workers’
compensation, and corporate
investigations. Get updates on
legal decisions affecting security
professionals and their work,
compensation, and corporate
investigations.
Executive Communication: The
Key to Developing and Selling
Your Ideas
Learn how to strengthen your
executive communication skills
by writing more powerful letters,
creating compelling proposals,
developing eye-catching
presentations, and presenting
yourself like a CEO.
Advanced Violence Risk
Assessment
Gain insights into the issue of
violence in the workplace. Learn
techniques and best practices for
evaluating and mitigating threats
and violence in the workplace.
Conclude with case studies.
Executive Protection
Learn how to efficiently conduct
a comprehensive site survey,
distinguish probable threats from
unlikely threats, effectively use
organizational resources, and
design and craft a comprehensive
executive and employee protection
plan.
New Internal Controls
Examine the motivation and
rationalization of those who
commit fraud against their
employers as well as the amazing
assortment of fraud schemes they
use. Review an array of internal
controls, and demonstrate how
they are used to reduce fraud and
expose those who commit it.
New Investigative Strategies and
Techniques
Examine investigative strategies,
techniques, resources, and
missteps. Broaden your vision, gain
concrete investigative applications,
and incorporate the essentials
of reporting and recording
investigative activities.
ASIS Standards and Guidelines:
An Update and Overview
Gain a comprehensive overview
of the exciting new developments
in ASIS International Standards
and Guidelines. Learn how to get
involved.
Corporate Response to Terrorism:
Practical solutions
Convince senior management of
terrorism’s impact. Learn practical
solutions to the reality that
terrorism affects the way we think,
feel, and behave. Appreciate its
powerful impact on productivity
and ultimately profitability.
Program Overview
Why stop now?
Develop leadership
and management
skills vital for
senior security
professionals
at APC III.
June 15-18, 2009
About ASIS International
ASIS International (ASIS) is the largest organization for security professionals, with more
than 36,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing
the effectiveness and productivity of security professionals by developing educational
programs and materials that address broad security interests, such as the ASIS Annual
Seminar and Exhibits, as well as specific security topics. ASIS also advocates the role
and value of the security management profession to business, the media, governmental
entities, and the public. By providing members and the security community with access
to a full range of programs and services, and by publishing the industry’s number one
magazine—Security Management—ASIS leads the way for advanced and improved
security performance. For more information, visit www.asisonline.org.
• Design and manage an effective executive protection program that will
properly protect high-risk employees and personnel.
• Examine the complex problem of global terrorism and how to prevent it
from affecting your organization and its bottom line.
• Detect white-collar criminal frauds and schemes, and recover losses
when they occur.
• Identify and safely address workplace threats and violent behavior.
• Learn how to sell your security program to top management and
communicate like an executive.
• Consistently obtain admissions through practicing the Reid Technique.
Immediate Benefits
Fast Facts: APC II
Registration Hours
Monday			
7:00 am–8:00 am
Program Hours
Monday–Wednesday
8:00 am–5:00 pm
Thursday
7:30 am–11:45 am
				
Hotel Information
Be sure to mention ASIS when
requesting the special room rate of
$195 single/double (plus tax). It will
be honored until April 11, 2009 or
until the room block is full.
Hyatt Fisherman’s Wharf
555 North Point Street
San Francisco, CA 94133
1-415-563-1234
Registration Fees
ASIS member: 	 $1,100
Nonmember: 	 $1,300
Fees include daily continental
breakfast, a reception Monday
evening, refreshment breaks, and
a custom manual that includes
relevant chapters from the
Protection of Assets (POA) Manual.
Hotel costs are not included.
Attire
Business casual is recommended.
Updates will be posted online.
Program Advisor
F. Mark Geraci, CPP
Sr. Director Corporate Security
Bristol Myers Squibb Company
New York, New York
Faculty
Joseph P. Buckley III
President
John E. Reid  Associates
Chicago, Illinois
Joe Henry Dickerson
President
Dickerson and Associates
Denver, Colorado
Jerome M. Gatto
JM Gatto Consulting, LLC
Sedona, Arizona
Glenn Massie, CPP
Principal
Protective Services Group
Encino, California
Ed McDonough, CPP
Director of Global Security
TYCO International
Boca Raton, Florida
Shirley A. Pierini, CPP, PCI
CSO  Director
Jackson Family Enterprises
Santa Rosa, California
Judy Spain, Esq.
Spain  Spain
Richmond, Kentucky
Faculty subject to change.
• Security executives and managers
• Individuals with direct or indirect responsibility for security, particularly
human resources, facilities, and legal personnel
• Supervisors of security personnel and proprietary operations
• Professionals moving into security management positions regardless of
experience
• Individuals transitioning from the public to the private sector
Who Should Attend
Name:		 		
ASIS member #:
q New member (Membership application and dues payment must be attached.)	 	
q Change of address
Title:
Company:			
Address:
City:				 State/Province:
Country:			 ZIP/Postal code:
Phone:				 Fax:
E-mail:
Web
www.asisonline.org/
profdev.html
Fax
703-518-1473
Phone
703-519-6200
Mail
ASIS International
P. O. Box 17673
Baltimore, MD
21297-1673
How to
Register
Register Here. Register now.
Please register me for:
Meeting #	Program					Fee member/nonmember
		 989	 APC I	 March 16-19, 2009	 			 $1,100/$1,300
		1000	 APC I	 November 16-19, 2009	 	 $1,100/$1,300
		 977	 APC II	 May 4-7 2009	 			 $1,100/$1,300
		 978	 APC III	 June 15-18 2009	 			 $1,100/$1,300
	Membership (attach application) www.asisonline.org/application.pdf	 	 $
	 Subtotal						 $
	CPPs, PCIs, PSPs receive a $25 discount per program				 $ ( )
	Total (Registration will not be processed unless paid in full)			 $
Method of Payment
	 q Check (drawn on a U.S. bank in U.S. dollars and made payable to ASIS)
	 q MasterCard          q Visa          q American Express          q Discover
	Account #:	 			 Expiration date:
	Amount: $
	Name (as it appears on card):
	Cardholder signature:
PHOTO ID
REQUIRED FOR
ADMISSION
ON-SITE.
Acceptable IDs
include a valid
driver’s license,
passport, or
military ID.
JOIN ASIS AND SAVE!
Programming, schedule, locations, and pricing are subject to change.
PERTINENT INFORMATION
Certificates of completion: ASIS
reserves the right to withhold
certificates if attendance requirements
are not met.
Continuing Professional Education
(CPE): Each 50-minute instruction hour
is worth one CPE.
Confirmation: Will be issued upon
receipt of full payment and should be
brought to the program to expedite
processing and ensure admission. If
confirmation is not received within
three business days prior to the start
date, call 703-519-6200, fax
703-519-6299, or e-mail
asis@asisonline.org.
On-site programs: All of ASIS’
educational programs can be brought
to your facility or customized to meet
specific needs. Call 703-518-1429 for
details.
Member rate: You must be an ASIS
member in good standing at the time
of registration. Badges are
non-transferable.
Team discounts: If registering three
or more attendees from the same
organization, call 703-518-1434.
Cancellations: For a full refund,
written cancellations must be received
by ASIS at least 10 business days
before the start date. Those received
less than 10 days prior will be charged
$100 per person. No refunds are
made for cancellations received on
or after the start date. Fax to ASIS
Member Services at 703-519-6298.
Last-minute registrations: While we
welcome all registrations, including
those on-site, the availability
of handout materials cannot be
guaranteed.
Solicitation: Selling products or
services during the program is
prohibited.
Rental car discount: Call AVIS at
800-331-1600 or visit www.avis.com	
—reference AWD-D005038.
Returned check fee: $25.
RegisterNow.
Buildyourcareeronasolidfoundation
ofassetsprotectionbyattendingAPCI,II,
andIII.Uponcompletionoftheseries,youwill
bepresentedacertificate.
APCI:ConceptsandMethods
	March16-19,2009•NewOrleans,Louisiana
	November16–19,2009•Philadelphia,Pennsylvania
APCII:PracticalApplications
	May4–7,2009•SanFrancisco,California
APCIII:FunctionalManagement
	June15-18,2009•NewOrleans,Louisiana
AssetsProtectionCourseI:
ConceptsandMethods
November16-19,2009
Philadelphia,Pennsylvania
Non-Profit
USPostage
PAID
ASIS
1625PrinceStreet
Alexandria,VA22314-2818
USA
Formoreinformation,gotowww.asisonline.org

More Related Content

What's hot

Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Lessons learnt from the 2012 cyber security audit of Western Australian State...
Lessons learnt from the 2012 cyber security audit of Western Australian State...Lessons learnt from the 2012 cyber security audit of Western Australian State...
Lessons learnt from the 2012 cyber security audit of Western Australian State...Edith Cowan University
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
fund-managers-on-the-hunt-1
fund-managers-on-the-hunt-1fund-managers-on-the-hunt-1
fund-managers-on-the-hunt-1Yigal Behar
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic ManagementMarcelo Martins
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security InvestmentRoger Johnston
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Tom Coyle
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachRotary International
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityJorge Sebastiao
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through SecurityEnergySec
 
Xevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityXevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityMichael Xevgenis
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degreesERAUWebinars
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksDavid Chase
 

What's hot (20)

Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Lessons learnt from the 2012 cyber security audit of Western Australian State...
Lessons learnt from the 2012 cyber security audit of Western Australian State...Lessons learnt from the 2012 cyber security audit of Western Australian State...
Lessons learnt from the 2012 cyber security audit of Western Australian State...
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
fund-managers-on-the-hunt-1
fund-managers-on-the-hunt-1fund-managers-on-the-hunt-1
fund-managers-on-the-hunt-1
 
Information Security Strategic Management
Information Security Strategic ManagementInformation Security Strategic Management
Information Security Strategic Management
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Making the Business Case for Security Investment
Making the Business Case for Security InvestmentMaking the Business Case for Security Investment
Making the Business Case for Security Investment
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
The New Security - Post "9/11"
The New Security - Post "9/11"The New Security - Post "9/11"
The New Security - Post "9/11"
 
Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)Talon Security Solutions - Sell Sheet (1)
Talon Security Solutions - Sell Sheet (1)
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
Cissp combined notes
Cissp combined notesCissp combined notes
Cissp combined notes
 
TG Brochure
TG BrochureTG Brochure
TG Brochure
 
A6 pragmatic journey into cyber security
A6 pragmatic journey into cyber securityA6 pragmatic journey into cyber security
A6 pragmatic journey into cyber security
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
Xevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityXevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information Security
 
Erau cybersecurity and security degrees
Erau cybersecurity and security degreesErau cybersecurity and security degrees
Erau cybersecurity and security degrees
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial Risks
 

Viewers also liked

Peligros de internet
Peligros de internetPeligros de internet
Peligros de internetsolo_catta
 
EPC Dec 2015 Corporate Exec Protection Management
EPC Dec 2015 Corporate Exec Protection ManagementEPC Dec 2015 Corporate Exec Protection Management
EPC Dec 2015 Corporate Exec Protection ManagementBrian Jantzen
 
Relevant Bangsamoro Basic Law Provisions on Local Governance, Policing and L...
Relevant Bangsamoro Basic Law Provisions on Local Governance, Policing  and L...Relevant Bangsamoro Basic Law Provisions on Local Governance, Policing  and L...
Relevant Bangsamoro Basic Law Provisions on Local Governance, Policing and L...Ram Toledo
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012Margolis Healy
 
Historic Injustice: Root cause of armed conflict in the Bangsamoro
Historic Injustice: Root cause of armed conflict in the BangsamoroHistoric Injustice: Root cause of armed conflict in the Bangsamoro
Historic Injustice: Root cause of armed conflict in the BangsamoroArmi Beatriz Bayot
 
Bangsamoro Basic Law
Bangsamoro Basic LawBangsamoro Basic Law
Bangsamoro Basic LawKaryll Mitra
 
CQB Dino
CQB DinoCQB Dino
CQB Dinogum9wv
 
Executive Protection Training For Security Personnel and LE
Executive Protection Training For Security Personnel and LEExecutive Protection Training For Security Personnel and LE
Executive Protection Training For Security Personnel and LEjerrymaccauley
 
Car Vip Protection presentation
Car Vip Protection presentationCar Vip Protection presentation
Car Vip Protection presentationriskis
 
Close quarters battle (cqb ).ppt
Close quarters battle (cqb ).pptClose quarters battle (cqb ).ppt
Close quarters battle (cqb ).pptjosecoco1
 
Lesson 15 British And American Governments
Lesson 15 British And American GovernmentsLesson 15 British And American Governments
Lesson 15 British And American GovernmentsPatrickwolak
 

Viewers also liked (18)

Peligros de internet
Peligros de internetPeligros de internet
Peligros de internet
 
Práctica de seguridad 1
Práctica de seguridad 1Práctica de seguridad 1
Práctica de seguridad 1
 
Trabajo de investigacion GPS
Trabajo de investigacion GPS Trabajo de investigacion GPS
Trabajo de investigacion GPS
 
EPC Dec 2015 Corporate Exec Protection Management
EPC Dec 2015 Corporate Exec Protection ManagementEPC Dec 2015 Corporate Exec Protection Management
EPC Dec 2015 Corporate Exec Protection Management
 
Relevant Bangsamoro Basic Law Provisions on Local Governance, Policing and L...
Relevant Bangsamoro Basic Law Provisions on Local Governance, Policing  and L...Relevant Bangsamoro Basic Law Provisions on Local Governance, Policing  and L...
Relevant Bangsamoro Basic Law Provisions on Local Governance, Policing and L...
 
MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012MHA URMIA Conference Presentation 2012
MHA URMIA Conference Presentation 2012
 
Historic Injustice: Root cause of armed conflict in the Bangsamoro
Historic Injustice: Root cause of armed conflict in the BangsamoroHistoric Injustice: Root cause of armed conflict in the Bangsamoro
Historic Injustice: Root cause of armed conflict in the Bangsamoro
 
Bangsamoro Basic Law
Bangsamoro Basic LawBangsamoro Basic Law
Bangsamoro Basic Law
 
A New Nation
A New NationA New Nation
A New Nation
 
CQB Dino
CQB DinoCQB Dino
CQB Dino
 
Executive Protection Training For Security Personnel and LE
Executive Protection Training For Security Personnel and LEExecutive Protection Training For Security Personnel and LE
Executive Protection Training For Security Personnel and LE
 
Executive Protection
Executive ProtectionExecutive Protection
Executive Protection
 
Suts2 sample
Suts2 sampleSuts2 sample
Suts2 sample
 
Car Vip Protection presentation
Car Vip Protection presentationCar Vip Protection presentation
Car Vip Protection presentation
 
Mout Close Qtrs Combat Class[1]
Mout Close Qtrs Combat Class[1]Mout Close Qtrs Combat Class[1]
Mout Close Qtrs Combat Class[1]
 
Close protection
Close protectionClose protection
Close protection
 
Close quarters battle (cqb ).ppt
Close quarters battle (cqb ).pptClose quarters battle (cqb ).ppt
Close quarters battle (cqb ).ppt
 
Lesson 15 British And American Governments
Lesson 15 British And American GovernmentsLesson 15 British And American Governments
Lesson 15 British And American Governments
 

Similar to Assets Protection Course_I_BR_1109

Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxbagotjesusa
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14Jock ANDRE
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingSwati Gupta
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
Explanation of the most common types of administrative risks
Explanation of the most common types of administrative risksExplanation of the most common types of administrative risks
Explanation of the most common types of administrative risksPrathitha cb
 
2015 trainingprogram(1)
2015 trainingprogram(1)2015 trainingprogram(1)
2015 trainingprogram(1)Nuhu John
 
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERSPROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERSRuth Jones
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke PatchlinkBen Rothke
 
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, OmanSerious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman360 BSI
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Building your social engineering awareness program
Building your social engineering awareness programBuilding your social engineering awareness program
Building your social engineering awareness programsurferdave71
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE360 BSI
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAESerious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE360 BSI
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 

Similar to Assets Protection Course_I_BR_1109 (20)

Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docx
 
Csmp overview may 14
Csmp overview may 14Csmp overview may 14
Csmp overview may 14
 
403 9
403 9403 9
403 9
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Explanation of the most common types of administrative risks
Explanation of the most common types of administrative risksExplanation of the most common types of administrative risks
Explanation of the most common types of administrative risks
 
2015 trainingprogram(1)
2015 trainingprogram(1)2015 trainingprogram(1)
2015 trainingprogram(1)
 
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERSPROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
PROFESSIONAL CERTIFICATE IN SECURITY MANAGEMENT - FOR TODAY'S LEADERS
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, OmanSerious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
Serious Incident Prevention ™ 16 - 17 April 2014 Muscat, Oman
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
Building your social engineering awareness program
Building your social engineering awareness programBuilding your social engineering awareness program
Building your social engineering awareness program
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAESerious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
Serious Incident Prevention ™ 11 - 12 December 2013 Dubai UAE
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 

Assets Protection Course_I_BR_1109

  • 1. Experience, D edication, and Leadership in Security EDUCATION Assets Protection Course I: Concepts and Methods November 16-19, 2009 Philadelphia, Pennsylvania
  • 2. Begin by establishing a solid foundation, then move to practical applications, and conclude with functional management. From network security to convergence, workplace violence to terrorism, intrusion detection to executive protection, today’s security professionals have a lot to deal with. Why go it alone? Gain a broad, in-depth perspective of the demands of assets protection at APC I. Don’t miss this opportunity to exchange ideas, discover new techniques, and identify strategies that will energize you in today’s challenging security environment. Once you’ve mastered the fundamentals, you’re prepared to learn how to put those solutions to work. APC II continues the security principles presented in APC I, but now you’re ready to explore the more complex aspects. You’ll get the vital information you need for security planning and meeting operational requirements. Join some of the most experienced professionals in the security industry in discussing the latest crime detection, prevention, and intervention techniques, while reviewing the importance of relevant laws and legal issues. Don’t miss the opportunity to advance in your profession. Take the first step now and register today. The APC Series provides professionals with broad-based knowledge to keep their personnel and assets protection a step ahead of today’s risks and threats. From beginning through advanced topics, the APC programs expose you to proven techniques and give you a solid understanding of all aspects of assets protection.
  • 3. Introduction to Assets Protection Review the basics of commercial and industrial security, and then put together a comprehensive assets protection plan. Security Surveys and Vulnerability Assessments Learn how to assess and reduce security loss and risk exposure by using surveys and assessments. Crime Prevention Through Environmental Design Gain an appreciation of this passive, low-cost, effective crime prevention technique. Locking Concepts Discover the pros and cons of various locking devices and learn how to integrate them into your program. Barriers Evaluate the cost-effectiveness and uses of structural barriers. Access Control Examine the purpose, theory, and technology behind access control. Review what’s in general practice today. Intrusion Detection—Interior and Exterior Sensors Review the advantages and vulnerabilities of the major sensor types and current protection system strategies. Security Lighting and Video Surveillance Extend the value of surveillance by learning how to match your security lighting objectives to functional solutions. Deception Detection Discuss behavioral analysis and preparation for successful interviews. Explore proven deception detection techniques. Professional Security Management and SOPs Apply practical management principles and methods for improved results. Learn how to consistently incorporate best practices into your standard operating procedures. Investigations Examine the investigative process and learn to conduct thorough, complex workplace investigations. Review techniques, resources, and procedures used by experienced investigators and fact-finders. Security and the Law Examine the legal framework in which a security organization operates. Explore constitutional immunities, civil areas of tort and contract liability, civil and consumer rights, administrative procedures, and ethical considerations. Ethics Evaluate the implications and dilemmas inherent in real-life ethical decision-making. Workplace Violence Develop detection, prevention, and intervention strategies for violent behavior and workplace aggression. Analyze recent workplace violence cases and learn how to defuse the most challenging situations. Emergency Planning Understand what constitutes a disaster situation and then establish procedures to prevent, control, and recover from all types of disasters. APC I: Concepts and Methods March 16–19, 2009 New Orleans, Louisiana November 16–19, 2009 Philadelphia, Pennsylvania Program Overview APC I, the cornerstone of ASIS’ educational programming, is essential for all professionals involved in the protection of assets. Not only does it provide a solid basis for advanced development, but it goes beyond to give you the broad view and in-depth perspective you need to succeed in today’s challenging security landscape. Register today and climb to the top faster than you thought possible. Studying for your CPP certification? APC I can serve as an additional source of study in preparation for the CPP exam.For updates, check www.asisonline.org
  • 4. • Master the fundamentals of assets protection. • Familiarize yourself with methods to recognize, detect, and prevent fraud and employee theft. • Identify ways to conduct incident, background, and undercover investigations. • Obtain proven methods of analyzing and assessing security loss/risk exposure. • Learn steps to help you develop emergency/disaster plans and procedures. • Explore the various components of integrated security systems. • Acquire a comprehensive understanding of contemporary legal issues. Immediate Benefits Fast Facts: APC I Registration Hours Sunday 5:00 pm–6:00 pm Monday 7:00 am–8:00 am Program Hours Monday–Wednesday 8:00 am–5:00 pm Thursday 8:00 am–4:00 pm Hotel Information March 16-19, 2009 Be sure to mention ASIS when requesting the special room rate of $179 single/double (plus tax). This price will be honored until February 20, 2009 or until the room block is full. Omni Royal Orleans Hotel 621 St. Louis Street New Orleans, LA 70140 1-504-529-5333 1-800-the-Omni November 16-19, 2009 Be sure to mention ASIS when requesting the special room rate of $179 single/double (plus tax). This price will be honored until October 19, 2009 or until the room block is full. Hyatt Regency Philadelphia at Penn’s Landing 201 S. Columbus Blvd. Philadelphia, PA 19106 1-215-928-1234 1-800-233-1234 Registration Fees ASIS member: $1,100 Nonmember: $1,300 Fees include daily continental breakfast, a reception Monday evening, refreshment breaks, and a custom manual that includes relevant chapters from the Protection of Assets (POA) Manual. Hotel costs are not included. Attire Business casual is recommended. Program Advisor Severin Sorenson, CPP President and CEO Sikyur.com Faculty Joseph P. Buckley III John E. Reid & Associates Michael A. Crane, CPP IPC International Corporation Eugene F. Ferraro, CPP, PCI Business Controls, Inc. Shannon J. Gregg, CPP Gregg Services, Inc. George E. Ronne, Jr., CPP ASIS Lifetime Member Frank W. Sulzer, CPP Sulzer Enterprises Faculty subject to change. Updates will be posted online. • Professionals new to security management • Professionals needing an overview of security management functions • Supervisors of security personnel • Others with security responsibilities, including human resources, facilities, and legal personnel Who Should Attend
  • 5. APC II: Practical Applications May 4-7, 2009 San Francisco, California Top experts share real-life cases, proven solutions, best practices, and field-tested strategies at APC II: Practical Applications. Don’t miss this unique opportunity to put your skills to the test, identify dangers ahead, network with the best, and pick up ideas you can implement right away—and use again and again. For updates, check www.asisonline.org Financial Investigation and the Badges of Fraud Revolutionize your ability to conduct financial investigations by making the most of the vast amount of public information available via commercial databases on the Web. Get information on the “badges of fraud,” learn how to recover fraudulently conveyed assets, and protect your organization from fraud. Effective Interrogation Videotapes of actual interviews and interrogations will be used to: discuss the interrogation process, beginning with how to initiate the confrontation; develop the interrogational theme; stop denials; overcome objections; and use the alternative question to stimulate an admission. Investigative Law Keep the law on your side and get answers to questions that matter. Understand the law’s impact on internal, EEOC, workers’ compensation, and corporate investigations. Get updates on legal decisions affecting security professionals and their work, compensation, and corporate investigations. Executive Communication: The Key to Developing and Selling Your Ideas Learn how to strengthen your executive communication skills by writing more powerful letters, creating compelling proposals, developing eye-catching presentations, and presenting yourself like a CEO. Advanced Violence Risk Assessment Gain insights into the issue of violence in the workplace. Learn techniques and best practices for evaluating and mitigating threats and violence in the workplace. Conclude with case studies. Executive Protection Learn how to efficiently conduct a comprehensive site survey, distinguish probable threats from unlikely threats, effectively use organizational resources, and design and craft a comprehensive executive and employee protection plan. New Internal Controls Examine the motivation and rationalization of those who commit fraud against their employers as well as the amazing assortment of fraud schemes they use. Review an array of internal controls, and demonstrate how they are used to reduce fraud and expose those who commit it. New Investigative Strategies and Techniques Examine investigative strategies, techniques, resources, and missteps. Broaden your vision, gain concrete investigative applications, and incorporate the essentials of reporting and recording investigative activities. ASIS Standards and Guidelines: An Update and Overview Gain a comprehensive overview of the exciting new developments in ASIS International Standards and Guidelines. Learn how to get involved. Corporate Response to Terrorism: Practical solutions Convince senior management of terrorism’s impact. Learn practical solutions to the reality that terrorism affects the way we think, feel, and behave. Appreciate its powerful impact on productivity and ultimately profitability. Program Overview Why stop now? Develop leadership and management skills vital for senior security professionals at APC III. June 15-18, 2009
  • 6. About ASIS International ASIS International (ASIS) is the largest organization for security professionals, with more than 36,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests, such as the ASIS Annual Seminar and Exhibits, as well as specific security topics. ASIS also advocates the role and value of the security management profession to business, the media, governmental entities, and the public. By providing members and the security community with access to a full range of programs and services, and by publishing the industry’s number one magazine—Security Management—ASIS leads the way for advanced and improved security performance. For more information, visit www.asisonline.org. • Design and manage an effective executive protection program that will properly protect high-risk employees and personnel. • Examine the complex problem of global terrorism and how to prevent it from affecting your organization and its bottom line. • Detect white-collar criminal frauds and schemes, and recover losses when they occur. • Identify and safely address workplace threats and violent behavior. • Learn how to sell your security program to top management and communicate like an executive. • Consistently obtain admissions through practicing the Reid Technique. Immediate Benefits Fast Facts: APC II Registration Hours Monday 7:00 am–8:00 am Program Hours Monday–Wednesday 8:00 am–5:00 pm Thursday 7:30 am–11:45 am Hotel Information Be sure to mention ASIS when requesting the special room rate of $195 single/double (plus tax). It will be honored until April 11, 2009 or until the room block is full. Hyatt Fisherman’s Wharf 555 North Point Street San Francisco, CA 94133 1-415-563-1234 Registration Fees ASIS member: $1,100 Nonmember: $1,300 Fees include daily continental breakfast, a reception Monday evening, refreshment breaks, and a custom manual that includes relevant chapters from the Protection of Assets (POA) Manual. Hotel costs are not included. Attire Business casual is recommended. Updates will be posted online. Program Advisor F. Mark Geraci, CPP Sr. Director Corporate Security Bristol Myers Squibb Company New York, New York Faculty Joseph P. Buckley III President John E. Reid Associates Chicago, Illinois Joe Henry Dickerson President Dickerson and Associates Denver, Colorado Jerome M. Gatto JM Gatto Consulting, LLC Sedona, Arizona Glenn Massie, CPP Principal Protective Services Group Encino, California Ed McDonough, CPP Director of Global Security TYCO International Boca Raton, Florida Shirley A. Pierini, CPP, PCI CSO Director Jackson Family Enterprises Santa Rosa, California Judy Spain, Esq. Spain Spain Richmond, Kentucky Faculty subject to change. • Security executives and managers • Individuals with direct or indirect responsibility for security, particularly human resources, facilities, and legal personnel • Supervisors of security personnel and proprietary operations • Professionals moving into security management positions regardless of experience • Individuals transitioning from the public to the private sector Who Should Attend
  • 7. Name: ASIS member #: q New member (Membership application and dues payment must be attached.) q Change of address Title: Company: Address: City: State/Province: Country: ZIP/Postal code: Phone: Fax: E-mail: Web www.asisonline.org/ profdev.html Fax 703-518-1473 Phone 703-519-6200 Mail ASIS International P. O. Box 17673 Baltimore, MD 21297-1673 How to Register Register Here. Register now. Please register me for: Meeting # Program Fee member/nonmember 989 APC I March 16-19, 2009 $1,100/$1,300 1000 APC I November 16-19, 2009 $1,100/$1,300 977 APC II May 4-7 2009 $1,100/$1,300 978 APC III June 15-18 2009 $1,100/$1,300 Membership (attach application) www.asisonline.org/application.pdf $ Subtotal $ CPPs, PCIs, PSPs receive a $25 discount per program $ ( ) Total (Registration will not be processed unless paid in full) $ Method of Payment q Check (drawn on a U.S. bank in U.S. dollars and made payable to ASIS) q MasterCard q Visa q American Express q Discover Account #: Expiration date: Amount: $ Name (as it appears on card): Cardholder signature: PHOTO ID REQUIRED FOR ADMISSION ON-SITE. Acceptable IDs include a valid driver’s license, passport, or military ID. JOIN ASIS AND SAVE! Programming, schedule, locations, and pricing are subject to change. PERTINENT INFORMATION Certificates of completion: ASIS reserves the right to withhold certificates if attendance requirements are not met. Continuing Professional Education (CPE): Each 50-minute instruction hour is worth one CPE. Confirmation: Will be issued upon receipt of full payment and should be brought to the program to expedite processing and ensure admission. If confirmation is not received within three business days prior to the start date, call 703-519-6200, fax 703-519-6299, or e-mail asis@asisonline.org. On-site programs: All of ASIS’ educational programs can be brought to your facility or customized to meet specific needs. Call 703-518-1429 for details. Member rate: You must be an ASIS member in good standing at the time of registration. Badges are non-transferable. Team discounts: If registering three or more attendees from the same organization, call 703-518-1434. Cancellations: For a full refund, written cancellations must be received by ASIS at least 10 business days before the start date. Those received less than 10 days prior will be charged $100 per person. No refunds are made for cancellations received on or after the start date. Fax to ASIS Member Services at 703-519-6298. Last-minute registrations: While we welcome all registrations, including those on-site, the availability of handout materials cannot be guaranteed. Solicitation: Selling products or services during the program is prohibited. Rental car discount: Call AVIS at 800-331-1600 or visit www.avis.com —reference AWD-D005038. Returned check fee: $25.