Field Incident Command course will enable you to:
- Manage & communicate effectively in emergency crisis situations
- Prevent loss of life and damage to critical infrastructure
- Comply with international OSHA requirements
- Utilise latest technologies for better emergency response
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
To register, kindly contact Kris at kris@360bsi.com
Field Incident Command 18 - 20 November 2012 Dubai, UAE360 BSI
ย
Field Incident Command course will enable you to:
- Manage & communicate effectively in emergency crisis situations
- Prevent loss of life and damage to critical infrastructure
- Comply with international OSHA requirements
- Utilise latest technologies for better emergency response
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
To register, kindly contact Kris at kris@360bsi.com
Field Incident Command 24 - 26 April 2012 Jakarta, Indonesia360 BSI
ย
Field Incident Command course will enable you to:
- Manage & communicate effectively in emergency crisis situations
- Prevent loss of life and damage to critical infrastructure
- Comply with international OSHA requirements
- Utilise latest technologies for better emergency response
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
To register, kindly contact Kris at kris@360bsi.com
Advanced Certificate in Field Incident Command, 18 - 20 December 2011, Dubai UAE360 BSI
ย
The Field Incident Command Course is specifically designed for those persons who may be called upon to attend or manage an emergency or disaster situation and meets OSHA requirements.
With the increase in natural disasters across the world and the higher risks associated with expanding industry there is a real need for more people to be trained in field emergency management to prevent the loss of life and damage to infrastructure.
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
The Incident Command System (ICS) is an internationally accepted tool used for the command, control, and coordination of emergency response.
The ICS allows people to work together and communicate effectively in emergency situations especially when they may be drawn from multiple agencies that do not routinely work together.
WHO SHOULD ATTEND
Security Professionals, Risk Management specialists, Emergency Response Team, Emergency Dispatch Personnel, Plant Security Heads, Former and serving police investigators, Investigation officers & Facility Managers
Advanced Certificate in Field Incident Command, 09 - 11 October 2011, Dubai UAE360 BSI
ย
The Field Incident Command Course is specifically designed for those persons who may be called upon to attend or manage an emergency or disaster situation and meets OSHA requirements.
With the increase in natural disasters across the world and the higher risks associated with expanding industry there is a real need for more people to be trained in field emergency management to prevent the loss of life and damage to infrastructure.
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
The Incident Command System (ICS) is an internationally accepted tool used for the command, control, and coordination of emergency response.
The ICS allows people to work together and communicate effectively in emergency situations especially when they may be drawn from multiple agencies that do not routinely work together.
WHO SHOULD ATTEND
Security Professionals, Risk Management specialists, Emergency Response Team, Emergency Dispatch Personnel, Plant Security Heads, Former and serving police investigators, Investigation officers & Facility Managers
Effective Technical Report Writing 2 - 3 September 2015 Kuala Lumpur / 7 - 8 ...360 BSI
ย
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Field Incident Command 18 - 20 November 2012 Dubai, UAE360 BSI
ย
Field Incident Command course will enable you to:
- Manage & communicate effectively in emergency crisis situations
- Prevent loss of life and damage to critical infrastructure
- Comply with international OSHA requirements
- Utilise latest technologies for better emergency response
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
To register, kindly contact Kris at kris@360bsi.com
Field Incident Command 24 - 26 April 2012 Jakarta, Indonesia360 BSI
ย
Field Incident Command course will enable you to:
- Manage & communicate effectively in emergency crisis situations
- Prevent loss of life and damage to critical infrastructure
- Comply with international OSHA requirements
- Utilise latest technologies for better emergency response
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
To register, kindly contact Kris at kris@360bsi.com
Advanced Certificate in Field Incident Command, 18 - 20 December 2011, Dubai UAE360 BSI
ย
The Field Incident Command Course is specifically designed for those persons who may be called upon to attend or manage an emergency or disaster situation and meets OSHA requirements.
With the increase in natural disasters across the world and the higher risks associated with expanding industry there is a real need for more people to be trained in field emergency management to prevent the loss of life and damage to infrastructure.
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
The Incident Command System (ICS) is an internationally accepted tool used for the command, control, and coordination of emergency response.
The ICS allows people to work together and communicate effectively in emergency situations especially when they may be drawn from multiple agencies that do not routinely work together.
WHO SHOULD ATTEND
Security Professionals, Risk Management specialists, Emergency Response Team, Emergency Dispatch Personnel, Plant Security Heads, Former and serving police investigators, Investigation officers & Facility Managers
Advanced Certificate in Field Incident Command, 09 - 11 October 2011, Dubai UAE360 BSI
ย
The Field Incident Command Course is specifically designed for those persons who may be called upon to attend or manage an emergency or disaster situation and meets OSHA requirements.
With the increase in natural disasters across the world and the higher risks associated with expanding industry there is a real need for more people to be trained in field emergency management to prevent the loss of life and damage to infrastructure.
Participation in this course will train you to effectively manage and take control of emergency situations using International ICS 100, 200 and 300 standards.
The Incident Command System (ICS) is an internationally accepted tool used for the command, control, and coordination of emergency response.
The ICS allows people to work together and communicate effectively in emergency situations especially when they may be drawn from multiple agencies that do not routinely work together.
WHO SHOULD ATTEND
Security Professionals, Risk Management specialists, Emergency Response Team, Emergency Dispatch Personnel, Plant Security Heads, Former and serving police investigators, Investigation officers & Facility Managers
Effective Technical Report Writing 2 - 3 September 2015 Kuala Lumpur / 7 - 8 ...360 BSI
ย
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Information Governance & Records Management in the Age of Big Data360 BSI
ย
22 - 26 July 2019 Kuala Lumpur, Malaysia
29 Sept - 03 Oct 2019 Dubai, UAE
This training consists of two workshops:
Workshop 1: Governance, Document & Records Management in the Age of Big Data (Day 1 - Day 3)
Workshop 2: Tools & Skills for Information Managers (Day 4 - Day 5)
Upon completing Workshop 1, you will be able to:
Understand how data (and Big Data), documents, records and information are created and managed as information and knowledge
Understand different models of Information Governance and how to create good Governance in your organisation
Know how to improve the quality of your data, documents and records
Understand why and how to find out what information you hold
Ensure that your Information Governance is fit for purpose
Create or update retention schedules, business classification schemes, and file plans
Operate a regular information review & disposal process to comply with laws & regulations and to reduce costs & risks to your organisation
Manage your organisationโs archives
Ensure that paper and digital documents are managed to the same standards
Reduce and manage the flood of email and social media
Upon completing Workshop 2, you will be able to:
Design and manage an Information Management Project
Identify, assess and manage Risks to your Project, to your Information, or to your Information Quality
Understand and manage Changes to your Information processes and systems
Select software, hardware and suppliers using a transparent, objective process
Manage suppliers (contractors, consultants) to ge the best value for your money
Communicate to your stakeholders throughout the organisation
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
ย
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 5.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Contact kris@360bsi.com to register.
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
ย
This training consists of two workshops:
Workshop 1: Document & Records Management in the Age of Big Data (Day 1 - Day 3)
Workshop 2: Tools & Skills for Information Managers (Day 4 - Day 5)
Document & Records Management in the Age of Big Data is a complete program and will give you understanding, tools and templates to manage information according to laws and regulations. Tools and Skills for Information Managers introduces practical learning of Project Management, Risk Management, Change Management, Procurement, Supplier Management, and Communications.
Upon completing Workshop 1, you will be able to:
- Understand how data (and Big Data), documents, records and information are created and managed as information and knowledge
- Know how to improve the quality of your data, documents and records
- Ensure that your Information Governance is fit for purpose
- Understand why and how to find out what information you hold
- Create or update retention schedules, business classification schemes, and file plans
- Operate a regular information review and disposal process to comply with laws and regulations and to reduce risk to your organisation
- Use templates and workflows to improve user compliance
- Manage your organisationโs archives
- Ensure that paper and digital documents are managed to the same standards
- Reduce and manage the flood of email and social media
Upon completing Workshop 2, you will be able to:
- Design and manage an Information Management Project
- Identify, assess and manage Risks to your Project, to your Information, or to your Information Quality
- Understand and manage Changes to your Information processes and systems
- Select software, hardware and suppliers using a transparent, objective process
- Manage suppliers (contractors, consultants) to get the best value for your money
- Communicate to your stakeholders throughout the organisation
To register, contact kris@360bsi.com
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
ย
This training consists of two workshops:
Workshop 1: Document & Records Management in the Age of Big Data (Day 1 - Day 3)
Workshop 2: Tools & Skills for Information Managers (Day 4 - Day 5)
Document & Records Management in the Age of Big Data is a complete program and will
give you understanding, tools and templates to manage information according to laws
and regulations.
Tools and Skills for Information Managers introduces practical learning of Project
Management, Risk Management, Change Management, Procurement, Supplier Management, and
Communications.
Upon completing Workshop 1, you will be able to:
- Understand how data (and Big Data), documents, records and information are created
and managed as information and knowledge
- Know how to improve the quality of your data, documents and records
- Ensure that your Information Governance is fit for purpose
- Understand why and how to find out what information you hold
- Create or update retention schedules, business classification schemes, and file
plans
- Operate a regular information review and disposal process to comply with laws and
regulations and to reduce risk to your organisation
- Use templates and workflows to improve user compliance
- Manage your organisationโs archives
- Ensure that paper and digital documents are managed to the same standards
- Reduce and manage the flood of email and social media
Upon completing Workshop 2, you will be able to:
- Design and manage an Information Management Project
- Identify, assess and manage Risks to your Project, to your Information, or to your
Information Quality
- Understand and manage Changes to your Information processes and systems
- Select software, hardware and suppliers using a transparent, objective process
- Manage suppliers (contractors, consultants) to get the best value for your money
- Communicate to your stakeholders throughout the organisation
To register, contact kris@360bsi.com
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing,
professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and
professional report?
Effective Technical Report Writing will provide you with the exact skills to write
technical reports and proposals that are informative, persuasive, clear and
professional.
Contact Kris at kris@360bsi.com for further details.
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
ย
This training consists of two workshops:
Workshop 1: Document & Records Management in the Age of Big Data (Day 1 - Day 3)
Workshop 2: Tools & Skills for Information Managers (Day 4 - Day 5)
Document & Records Management in the Age of Big Data is a complete program and will give you understanding, tools and templates to manage information according to laws and regulations.
Tools and Skills for Information Managers introduces practical learning of Project Management, Risk Management, Change Management, Procurement, Supplier Management, and Communications.
Upon completing Workshop 1, you will be able to:
- Understand how data (and Big Data), documents, records and information are created and managed as information and knowledge
- Know how to improve the quality of your data, documents and records
- Ensure that your Information Governance is fit for purpose
- Understand why and how to find out what information you hold
- Create or update retention schedules, business classification schemes, and file plans
- Operate a regular information review and disposal process to comply with laws and regulations and to reduce risk to your organisation
- Use templates and workflows to improve user compliance
- Manage your organisationโs archives
- Ensure that paper and digital documents are managed to the same standards
- Reduce and manage the flood of email and social media
Upon completing Workshop 2, you will be able to:
- Design and manage an Information Management Project
- Identify, assess and manage Risks to your Project, to your Information, or to your Information Quality
- Understand and manage Changes to your Information processes and systems
- Select software, hardware and suppliers using a transparent, objective process
- Manage suppliers (contractors, consultants) to get the best value for your money
- Communicate to your stakeholders throughout the organisation
To register, contact kris@360bsi.com
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...360 BSI
ย
To succeed in todayโs challenging environment, for-profit and non-profit organizations alike must operate with efficiency and economy in mind.
Operational Auditing explores current and emerging trends and issues across industry sectors. You will learn proven techniques to audit an organization's operations; verify the alignment of people, processes and systems; and through exercises learn how to apply the new skills acquired.
Course Participants will learn how to:
โข Collect and analyze operational information and data
โข Audit an organizationโs operations
โข Communicate with audit teams
โข Identify problem areas & assess risk
โข Eliminate wastage & operational redundancies
โข Develop solutions & recommend best courses of action
โข Detect quality issues
โข Avoid conflicts of interest & overcome resistance to change
Contact kris@360bsi.com to register today!
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
ย
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. This course covers effective strategies, techniques, systems, policies, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
Course Participants will:
- Develop strategies and ways of working to improve detection of cyber security treats and improve information compliance
- Understand the security-related international information compliance and regulations, including industry specific standards
- Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cyber security, which will enable teams to become more effective
- Align cybersecurity, cybercrime and information compliance within the organization with related initiatives, including HR training and legal departments
- Help managers gain more confidence in cyber security awareness and understand information compliance in their industries
- Improve the overall process for secure working and reducing risk when dealing with different kinds of information such as confidential and sensitive data
Contact kris@360bsi.com to register.
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...360 BSI
ย
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
ย
The Advanced Certificate in Live Streaming & Tracking is specifically designed to train Security and Incident Response team in managing and responding to incidents and emergencies in real time.
One of the biggest present day issue facing security and incident response managers is the ability to have accurate and first-hand information quickly so that decisions can be made to respond effectively.
Security and Incident Response Managers often rely on third-hand information and it is not until much later in the response that they fully understand the actual situation.
Course participants will be able to :
โข develop skills in using various new technologies in communication during a critical situation and emergencies
โข learn the best strategy in sending real-time information to control centre,headquarters and among team members
โข using powerful tracking and streaming tool during routine, patrolling, observation, surveillance and evenmonitoring suspect etc.
โข communicate effectively in emergency situations
โข effectively using live streaming audio-video, tracking and messaging during major incidents
โข improve self-confidence in handling scenarios and day-to-day routine
โข develop their leadership skill
โข prevent loss of life and damage to critical infrastructure
WHO SHOULD ATTEND
- Security Professionals, Heads, Managers
- Risk Management specialists
- Emergency Response Team
- Emergency Dispatch Personnel
- First Responders
- Plant Security Head, Managers, Incharge
- Former and serving police investigators
- Facility Managers
- Investigation officers & others
Contact us to register today!
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In todayโs world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, peopleโs identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand todayโs and tomorrowโs cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and peopleโs identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia360 BSI
ย
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In todayโs world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, peopleโs identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand todayโs and tomorrowโs cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and peopleโs identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
Document Management, Security and Retention addresses the problems that all organisations have:
- Too much information
- Too much cost to store and manage emails, documents and data
- Hard to find the right information when you need it
- Information is lost, misplaced, or stolen
- Staff resign or retire, taking vital knowledge with them
This course will look at practical ways in document management, such as adding the right metadata to your documents, filing them in structured systems, securing them from loss, alteration or theft, and finding the right document when you need it.
Upon completing this course, you will be able to:
- Control access to documents, protect them from damage or loss, and detect any breaches of your system
- Label documents so that they can be found when they are needed
- File documents safely and securely
- Decide when and how to destroy obsolete documents
- Save significant costs in time and money
WHO SHOULD ATTEND
- CEOs, CFOs, CIOs, COOs
- Company Secretaries, Legal officers
- Finance & HR Managers
- Information and Knowledge officers
- Document controllers
- Quality and Risk managers
- Staff responsible for administering or managing documents, filing & information processes
- Staff responsible for documents in Case-related or Project-related organisations
Contact Kris at kris@360bsi.com for further details.
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...360 BSI
ย
Document Management, Security and Retention addresses the problems that all organisations have:
- Too much information
- Too much cost to store and manage emails, documents and data
- Hard to find the right information when you need it
- Information is lost, misplaced, or stolen
- Staff resign or retire, taking vital knowledge with them
This course will look at practical ways in document management, such as adding the right metadata to your documents, filing them in structured systems, securing them from loss, alteration or theft, and finding the right document when you need it.
Upon completing this course, you will be able to:
- Control access to documents, protect them from damage or loss, and detect any breaches of your system
- Label documents so that they can be found when they are needed
- File documents safely and securely
- Decide when and how to destroy obsolete documents
- Save significant costs in time and money
WHO SHOULD ATTEND
- CEOs, CFOs, CIOs, COOs
- Company Secretaries, Legal officers
- Finance & HR Managers
- Information and Knowledge officers
- Document controllers
- Quality and Risk managers
- Staff responsible for administering or managing documents, filing & information processes
- Staff responsible for documents in Case-related or Project-related organisations
Contact Kris at kris@360bsi.com for further details.
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia360 BSI
ย
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...360 BSI
ย
This 4 Day Program will help organizations to detect & control Fraud & utilize the COSO 2013 Framework to Improve Internal Controls and Organizational Effectiveness.
Part 1:
Fraud Control: Preventing & Detecting Fraud (Day 1 - Day 2)
Course participants will learn the fundamentals of fraud, identify troublesome conditions and be able to incorporate that knowledge into their process design, risk assessments and control activities.
Workshop Benefits:
-Identify Red Flags of Potential Fraud
-Key Tools for Fraud Detection
-Self Assessment of Existing Controls
-Fraud Auditing Procedures
-Proactive Techniques to Fraud Detection
-5 Key Pillars of Fraud Control
-Effective Ethics Training programs
-Develop Whistleblowing programs
-11 Key Steps to Fraud Prevention
Part 2:
The COSO 2013 Internal Control integrated Framework (Day 3 - Day 4)
Improving Internal Controls and Organizational Effectiveness
In this interactive two-day program, you will learn how this principles-based approach can be deployed successfully in your organization. Participants will examine the implications for business leaders, process owners, managers, and both internal and external auditors.
Workshop Benefits:
-Identify Control & Process weaknesses
-Key Tools to implement & evaluate COSO
-Improve Operational Efficiency
-Effective Corporate Governance
-4 Principles of Risk Assessment
-Design & Implement Internal Controls
-Improve Coordination & Communication
-3 Principles of Control Activities
-Develop Suitable Monitoring Activities
-Get handy reference checklists
WHO SHOULD ATTEND
-Company Chairman & Directors
-Business Directors
-Department heads
-Internal and external auditors
-Compliance officers
-Process Improvement specialists
-Government regulators
-Strategic planners
-Corporate Governance personnel
-Risk Managers
-HR Directors
-Legal Counsels & Advisors
-Fraud analysts
Contact kris@360bsi.com to register your seats.
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...360 BSI
ย
Document Management, Security and Retention addresses the problems that all organisations have:
- Too much information
- Too much cost to store and manage emails, documents and data
- Hard to find the right information when you need it
- Information is lost, misplaced, or stolen
- Staff resign or retire, taking vital knowledge with them
This course will look at practical ways in document management, such as adding the right metadata to your documents, filing them in structured systems, securing them from loss, alteration or theft, and finding the right document when you need it.
Upon completing this course, you will be able to:
- Control access to documents, protect them from damage or loss, and detect any breaches of your system
- Label documents so that they can be found when they are needed
- File documents safely and securely
- Decide when and how to destroy obsolete documents
- Save significant costs in time and money
WHO SHOULD ATTEND
- CEOs, CFOs, CIOs, COOs
- Company Secretaries, Legal officers
- Finance & HR Managers
- Information and Knowledge officers
- Document controllers
- Quality and Risk managers
- Staff responsible for administering or managing documents, filing & information processes
- Staff responsible for documents in Case-related or Project-related organisations
Contact Kris at kris@360bsi.com for further details.
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
ย
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Information Governance & Records Management in the Age of Big Data360 BSI
ย
22 - 26 July 2019 Kuala Lumpur, Malaysia
29 Sept - 03 Oct 2019 Dubai, UAE
This training consists of two workshops:
Workshop 1: Governance, Document & Records Management in the Age of Big Data (Day 1 - Day 3)
Workshop 2: Tools & Skills for Information Managers (Day 4 - Day 5)
Upon completing Workshop 1, you will be able to:
Understand how data (and Big Data), documents, records and information are created and managed as information and knowledge
Understand different models of Information Governance and how to create good Governance in your organisation
Know how to improve the quality of your data, documents and records
Understand why and how to find out what information you hold
Ensure that your Information Governance is fit for purpose
Create or update retention schedules, business classification schemes, and file plans
Operate a regular information review & disposal process to comply with laws & regulations and to reduce costs & risks to your organisation
Manage your organisationโs archives
Ensure that paper and digital documents are managed to the same standards
Reduce and manage the flood of email and social media
Upon completing Workshop 2, you will be able to:
Design and manage an Information Management Project
Identify, assess and manage Risks to your Project, to your Information, or to your Information Quality
Understand and manage Changes to your Information processes and systems
Select software, hardware and suppliers using a transparent, objective process
Manage suppliers (contractors, consultants) to ge the best value for your money
Communicate to your stakeholders throughout the organisation
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
ย
This 4 day training program combines advanced technology and relevant practical experience to develop your IT security policies & create a robust IT infrastructure.
Participants will develop key skills and core competencies that will allow them to meet the ever-changing security demands of the 21st century.
Course Participants will:
- Master the tools & techniques for effective information & network security.
- Discover how to create a complete & sustainable IT security architecture.
- Gain knowledge on how to develop sound security policy together with your security architecture.
- Learn how to perform an IT governance assessment using CoBIT 5.0
- Learn how to perform smart security risk assessment within your organization.
- Gain valuable insights on implementing a proactive & robust security management system.
- Learn how to detect & prevent information security breaches due to inadequate IT security awareness within the organization.
Contact kris@360bsi.com to register.
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
ย
This training consists of two workshops:
Workshop 1: Document & Records Management in the Age of Big Data (Day 1 - Day 3)
Workshop 2: Tools & Skills for Information Managers (Day 4 - Day 5)
Document & Records Management in the Age of Big Data is a complete program and will give you understanding, tools and templates to manage information according to laws and regulations. Tools and Skills for Information Managers introduces practical learning of Project Management, Risk Management, Change Management, Procurement, Supplier Management, and Communications.
Upon completing Workshop 1, you will be able to:
- Understand how data (and Big Data), documents, records and information are created and managed as information and knowledge
- Know how to improve the quality of your data, documents and records
- Ensure that your Information Governance is fit for purpose
- Understand why and how to find out what information you hold
- Create or update retention schedules, business classification schemes, and file plans
- Operate a regular information review and disposal process to comply with laws and regulations and to reduce risk to your organisation
- Use templates and workflows to improve user compliance
- Manage your organisationโs archives
- Ensure that paper and digital documents are managed to the same standards
- Reduce and manage the flood of email and social media
Upon completing Workshop 2, you will be able to:
- Design and manage an Information Management Project
- Identify, assess and manage Risks to your Project, to your Information, or to your Information Quality
- Understand and manage Changes to your Information processes and systems
- Select software, hardware and suppliers using a transparent, objective process
- Manage suppliers (contractors, consultants) to get the best value for your money
- Communicate to your stakeholders throughout the organisation
To register, contact kris@360bsi.com
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
ย
This training consists of two workshops:
Workshop 1: Document & Records Management in the Age of Big Data (Day 1 - Day 3)
Workshop 2: Tools & Skills for Information Managers (Day 4 - Day 5)
Document & Records Management in the Age of Big Data is a complete program and will
give you understanding, tools and templates to manage information according to laws
and regulations.
Tools and Skills for Information Managers introduces practical learning of Project
Management, Risk Management, Change Management, Procurement, Supplier Management, and
Communications.
Upon completing Workshop 1, you will be able to:
- Understand how data (and Big Data), documents, records and information are created
and managed as information and knowledge
- Know how to improve the quality of your data, documents and records
- Ensure that your Information Governance is fit for purpose
- Understand why and how to find out what information you hold
- Create or update retention schedules, business classification schemes, and file
plans
- Operate a regular information review and disposal process to comply with laws and
regulations and to reduce risk to your organisation
- Use templates and workflows to improve user compliance
- Manage your organisationโs archives
- Ensure that paper and digital documents are managed to the same standards
- Reduce and manage the flood of email and social media
Upon completing Workshop 2, you will be able to:
- Design and manage an Information Management Project
- Identify, assess and manage Risks to your Project, to your Information, or to your
Information Quality
- Understand and manage Changes to your Information processes and systems
- Select software, hardware and suppliers using a transparent, objective process
- Manage suppliers (contractors, consultants) to get the best value for your money
- Communicate to your stakeholders throughout the organisation
To register, contact kris@360bsi.com
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing,
professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and
professional report?
Effective Technical Report Writing will provide you with the exact skills to write
technical reports and proposals that are informative, persuasive, clear and
professional.
Contact Kris at kris@360bsi.com for further details.
Document & Records Management in the Age of Big Data: Tools & Skills for Info...360 BSI
ย
This training consists of two workshops:
Workshop 1: Document & Records Management in the Age of Big Data (Day 1 - Day 3)
Workshop 2: Tools & Skills for Information Managers (Day 4 - Day 5)
Document & Records Management in the Age of Big Data is a complete program and will give you understanding, tools and templates to manage information according to laws and regulations.
Tools and Skills for Information Managers introduces practical learning of Project Management, Risk Management, Change Management, Procurement, Supplier Management, and Communications.
Upon completing Workshop 1, you will be able to:
- Understand how data (and Big Data), documents, records and information are created and managed as information and knowledge
- Know how to improve the quality of your data, documents and records
- Ensure that your Information Governance is fit for purpose
- Understand why and how to find out what information you hold
- Create or update retention schedules, business classification schemes, and file plans
- Operate a regular information review and disposal process to comply with laws and regulations and to reduce risk to your organisation
- Use templates and workflows to improve user compliance
- Manage your organisationโs archives
- Ensure that paper and digital documents are managed to the same standards
- Reduce and manage the flood of email and social media
Upon completing Workshop 2, you will be able to:
- Design and manage an Information Management Project
- Identify, assess and manage Risks to your Project, to your Information, or to your Information Quality
- Understand and manage Changes to your Information processes and systems
- Select software, hardware and suppliers using a transparent, objective process
- Manage suppliers (contractors, consultants) to get the best value for your money
- Communicate to your stakeholders throughout the organisation
To register, contact kris@360bsi.com
Operational Auditing: Principles and Techniques for a Changing World 07 - 08 ...360 BSI
ย
To succeed in todayโs challenging environment, for-profit and non-profit organizations alike must operate with efficiency and economy in mind.
Operational Auditing explores current and emerging trends and issues across industry sectors. You will learn proven techniques to audit an organization's operations; verify the alignment of people, processes and systems; and through exercises learn how to apply the new skills acquired.
Course Participants will learn how to:
โข Collect and analyze operational information and data
โข Audit an organizationโs operations
โข Communicate with audit teams
โข Identify problem areas & assess risk
โข Eliminate wastage & operational redundancies
โข Develop solutions & recommend best courses of action
โข Detect quality issues
โข Avoid conflicts of interest & overcome resistance to change
Contact kris@360bsi.com to register today!
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
ย
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. This course covers effective strategies, techniques, systems, policies, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
Course Participants will:
- Develop strategies and ways of working to improve detection of cyber security treats and improve information compliance
- Understand the security-related international information compliance and regulations, including industry specific standards
- Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cyber security, which will enable teams to become more effective
- Align cybersecurity, cybercrime and information compliance within the organization with related initiatives, including HR training and legal departments
- Help managers gain more confidence in cyber security awareness and understand information compliance in their industries
- Improve the overall process for secure working and reducing risk when dealing with different kinds of information such as confidential and sensitive data
Contact kris@360bsi.com to register.
Effective Technical Report Writing 05 - 06 February 2018 Kuala Lumpur / 06 - ...360 BSI
ย
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Advanced Certificate in Live Streaming & Tracking 07 - 09 Nov 2017 Dubai, UAE360 BSI
ย
The Advanced Certificate in Live Streaming & Tracking is specifically designed to train Security and Incident Response team in managing and responding to incidents and emergencies in real time.
One of the biggest present day issue facing security and incident response managers is the ability to have accurate and first-hand information quickly so that decisions can be made to respond effectively.
Security and Incident Response Managers often rely on third-hand information and it is not until much later in the response that they fully understand the actual situation.
Course participants will be able to :
โข develop skills in using various new technologies in communication during a critical situation and emergencies
โข learn the best strategy in sending real-time information to control centre,headquarters and among team members
โข using powerful tracking and streaming tool during routine, patrolling, observation, surveillance and evenmonitoring suspect etc.
โข communicate effectively in emergency situations
โข effectively using live streaming audio-video, tracking and messaging during major incidents
โข improve self-confidence in handling scenarios and day-to-day routine
โข develop their leadership skill
โข prevent loss of life and damage to critical infrastructure
WHO SHOULD ATTEND
- Security Professionals, Heads, Managers
- Risk Management specialists
- Emergency Response Team
- Emergency Dispatch Personnel
- First Responders
- Plant Security Head, Managers, Incharge
- Former and serving police investigators
- Facility Managers
- Investigation officers & others
Contact us to register today!
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In todayโs world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, peopleโs identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand todayโs and tomorrowโs cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and peopleโs identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
Effective Technical Report Writing 08 - 09 November 2017 Kuala Lumpur, Malaysia360 BSI
ย
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
This course covers effective strategies, techniques, systems, polices, and procedures to establish stronger cybersecurity and cybercrime controls, reduce operational risk, and improve online working whilst covering international best practices, ISO standards, compliance, audit, and industry regulations.
In todayโs world and further into the digital future, all organizations face an ever-increasing number of information-related security challenges and risks against a backdrop of increasing national and global compliance, and audit standards and legislation.
Cybersecurity is the protection of data from theft and damage, business information, peopleโs identities, and how all businesses can be better equipped to work more safely in an increasingly online world where sensitive and personal information is stored, shared, and communicated.
This 4 day intensive training workshop addresses the latest concerns on IT infrastructure and cybersecurity. Participants will develop key skills and core competencies that will allow them to meet the ever-changing information security demands of the 21st century.
Course Participants will:
Understand todayโs and tomorrowโs cybersecurity and cybercrime threats, issues, and risks; how to set up policies, train users, create strategies, and implement systems and tools to help protect data, information and peopleโs identities
Manage the growing volume of confidential, sensitive business information and data to protect, keep safe, and communicate securely against a backdrop of increasing cyber threats, as well as privacy, legal, and compliance regulations
Develop strategies and ways of working to improve detection of cybersecurity threats and improve information compliance
Understand the security-related international information compliance and regulations, including industry specific standards
Expand the expertise of personnel involved in developing skills and knowledge in the latest techniques, processes, and systems on cybersecurity
Who should attend:
Vice Presidents, Directors, General Managers
Chief Information Officers
Chief Security Officers
Chief Information Security Officers
Chief Technology Officers
Heads of Departments in Information Security Management Information Systems, IT Infrastructure, IT Architecture, Network Operations, IT Operations, IT Data Center, DataBase Management, IT Deployment, IT Business Enterprise, IT Risk Management, IT Quality Assurance, IT Audit, Risk Management, Internal Audit, Business Continuity Planning
Document Management, Security and Retention addresses the problems that all organisations have:
- Too much information
- Too much cost to store and manage emails, documents and data
- Hard to find the right information when you need it
- Information is lost, misplaced, or stolen
- Staff resign or retire, taking vital knowledge with them
This course will look at practical ways in document management, such as adding the right metadata to your documents, filing them in structured systems, securing them from loss, alteration or theft, and finding the right document when you need it.
Upon completing this course, you will be able to:
- Control access to documents, protect them from damage or loss, and detect any breaches of your system
- Label documents so that they can be found when they are needed
- File documents safely and securely
- Decide when and how to destroy obsolete documents
- Save significant costs in time and money
WHO SHOULD ATTEND
- CEOs, CFOs, CIOs, COOs
- Company Secretaries, Legal officers
- Finance & HR Managers
- Information and Knowledge officers
- Document controllers
- Quality and Risk managers
- Staff responsible for administering or managing documents, filing & information processes
- Staff responsible for documents in Case-related or Project-related organisations
Contact Kris at kris@360bsi.com for further details.
Document Management, Security & Retention 08 - 09 March 2017 Kuala Lumpur, Ma...360 BSI
ย
Document Management, Security and Retention addresses the problems that all organisations have:
- Too much information
- Too much cost to store and manage emails, documents and data
- Hard to find the right information when you need it
- Information is lost, misplaced, or stolen
- Staff resign or retire, taking vital knowledge with them
This course will look at practical ways in document management, such as adding the right metadata to your documents, filing them in structured systems, securing them from loss, alteration or theft, and finding the right document when you need it.
Upon completing this course, you will be able to:
- Control access to documents, protect them from damage or loss, and detect any breaches of your system
- Label documents so that they can be found when they are needed
- File documents safely and securely
- Decide when and how to destroy obsolete documents
- Save significant costs in time and money
WHO SHOULD ATTEND
- CEOs, CFOs, CIOs, COOs
- Company Secretaries, Legal officers
- Finance & HR Managers
- Information and Knowledge officers
- Document controllers
- Quality and Risk managers
- Staff responsible for administering or managing documents, filing & information processes
- Staff responsible for documents in Case-related or Project-related organisations
Contact Kris at kris@360bsi.com for further details.
Effective Technical Report Writing 08 - 09 March 2017 Kuala Lumpur, Malaysia360 BSI
ย
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Have you had a formal or professional training on Technical Report writing before?
Have you experienced any difficulties to put your work, ideas & proposals in writing, professionally?
Have you had any of your reports being rejected or not understood?
Have you always wanted to impress your readers & superiors with a clear and professional report?
Effective Technical Report Writing will provide you with the exact skills to write technical reports and proposals that are informative, persuasive, clear and professional.
Contact Kris at kris@360bsi.com for further details.
Fraud Control & the COSO 2013 Framework 20 - 23 February 2017 Kuala Lumpur, M...360 BSI
ย
This 4 Day Program will help organizations to detect & control Fraud & utilize the COSO 2013 Framework to Improve Internal Controls and Organizational Effectiveness.
Part 1:
Fraud Control: Preventing & Detecting Fraud (Day 1 - Day 2)
Course participants will learn the fundamentals of fraud, identify troublesome conditions and be able to incorporate that knowledge into their process design, risk assessments and control activities.
Workshop Benefits:
-Identify Red Flags of Potential Fraud
-Key Tools for Fraud Detection
-Self Assessment of Existing Controls
-Fraud Auditing Procedures
-Proactive Techniques to Fraud Detection
-5 Key Pillars of Fraud Control
-Effective Ethics Training programs
-Develop Whistleblowing programs
-11 Key Steps to Fraud Prevention
Part 2:
The COSO 2013 Internal Control integrated Framework (Day 3 - Day 4)
Improving Internal Controls and Organizational Effectiveness
In this interactive two-day program, you will learn how this principles-based approach can be deployed successfully in your organization. Participants will examine the implications for business leaders, process owners, managers, and both internal and external auditors.
Workshop Benefits:
-Identify Control & Process weaknesses
-Key Tools to implement & evaluate COSO
-Improve Operational Efficiency
-Effective Corporate Governance
-4 Principles of Risk Assessment
-Design & Implement Internal Controls
-Improve Coordination & Communication
-3 Principles of Control Activities
-Develop Suitable Monitoring Activities
-Get handy reference checklists
WHO SHOULD ATTEND
-Company Chairman & Directors
-Business Directors
-Department heads
-Internal and external auditors
-Compliance officers
-Process Improvement specialists
-Government regulators
-Strategic planners
-Corporate Governance personnel
-Risk Managers
-HR Directors
-Legal Counsels & Advisors
-Fraud analysts
Contact kris@360bsi.com to register your seats.
Document Management, Security & Retention 17 - 18 October 2016 Kuala Lumpur, ...360 BSI
ย
Document Management, Security and Retention addresses the problems that all organisations have:
- Too much information
- Too much cost to store and manage emails, documents and data
- Hard to find the right information when you need it
- Information is lost, misplaced, or stolen
- Staff resign or retire, taking vital knowledge with them
This course will look at practical ways in document management, such as adding the right metadata to your documents, filing them in structured systems, securing them from loss, alteration or theft, and finding the right document when you need it.
Upon completing this course, you will be able to:
- Control access to documents, protect them from damage or loss, and detect any breaches of your system
- Label documents so that they can be found when they are needed
- File documents safely and securely
- Decide when and how to destroy obsolete documents
- Save significant costs in time and money
WHO SHOULD ATTEND
- CEOs, CFOs, CIOs, COOs
- Company Secretaries, Legal officers
- Finance & HR Managers
- Information and Knowledge officers
- Document controllers
- Quality and Risk managers
- Staff responsible for administering or managing documents, filing & information processes
- Staff responsible for documents in Case-related or Project-related organisations
Contact Kris at kris@360bsi.com for further details.
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
ย
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
"๐ฉ๐ฌ๐ฎ๐ผ๐ต ๐พ๐ฐ๐ป๐ฏ ๐ป๐ฑ ๐ฐ๐บ ๐ฏ๐จ๐ณ๐ญ ๐ซ๐ถ๐ต๐ฌ"
๐๐ ๐๐จ๐ฆ๐ฌ (๐๐ ๐๐จ๐ฆ๐ฆ๐ฎ๐ง๐ข๐๐๐ญ๐ข๐จ๐ง๐ฌ) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
๐๐ ๐๐จ๐ฆ๐ฌ provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
โญ ๐ ๐๐๐ญ๐ฎ๐ซ๐๐ ๐ฉ๐ซ๐จ๐ฃ๐๐๐ญ๐ฌ:
โข 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
โข SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
โขFreenBecky 1st Fan Meeting in Vietnam
โขCHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
โข WOW K-Music Festival 2023
โข Winner [CROSS] Tour in HCM
โข Super Show 9 in HCM with Super Junior
โข HCMC - Gyeongsangbuk-do Culture and Tourism Festival
โข Korean Vietnam Partnership - Fair with LG
โข Korean President visits Samsung Electronics R&D Center
โข Vietnam Food Expo with Lotte Wellfood
"๐๐ฏ๐๐ซ๐ฒ ๐๐ฏ๐๐ง๐ญ ๐ข๐ฌ ๐ ๐ฌ๐ญ๐จ๐ซ๐ฒ, ๐ ๐ฌ๐ฉ๐๐๐ข๐๐ฅ ๐ฃ๐จ๐ฎ๐ซ๐ง๐๐ฒ. ๐๐ ๐๐ฅ๐ฐ๐๐ฒ๐ฌ ๐๐๐ฅ๐ข๐๐ฏ๐ ๐ญ๐ก๐๐ญ ๐ฌ๐ก๐จ๐ซ๐ญ๐ฅ๐ฒ ๐ฒ๐จ๐ฎ ๐ฐ๐ข๐ฅ๐ฅ ๐๐ ๐ ๐ฉ๐๐ซ๐ญ ๐จ๐ ๐จ๐ฎ๐ซ ๐ฌ๐ญ๐จ๐ซ๐ข๐๐ฌ."
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
ย
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website โ www.pmday.org
Youtube โ https://www.youtube.com/startuplviv
FB โ https://www.facebook.com/pmdayconference
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
In the Adani-Hindenburg case, what is SEBI investigating.pptxAdani case
ย
Adani SEBI investigation revealed that the latter had sought information from five foreign jurisdictions concerning the holdings of the firmโs foreign portfolio investors (FPIs) in relation to the alleged violations of the MPS Regulations. Nevertheless, the economic interest of the twelve FPIs based in tax haven jurisdictions still needs to be determined. The Adani Group firms classed these FPIs as public shareholders. According to Hindenburg, FPIs were used to get around regulatory standards.
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
ย
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
ย
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
ย
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
An introduction to the cryptocurrency investment platform Binance Savings.Any kyc Account
ย
Learn how to use Binance Savings to expand your bitcoin holdings. Discover how to maximize your earnings on one of the most reliable cryptocurrency exchange platforms, as well as how to earn interest on your cryptocurrency holdings and the various savings choices available.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
ย
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. Youโll also learn
โข Four (4) workplace discipline methods you should consider
โข The best and most practical approach to implementing workplace discipline.
โข Three (3) key tips to maintain a disciplined workplace.
Building Your Employer Brand with Social MediaLuanWise
ย
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement โ helping to position your organization as an employer of choice in today's competitive talent landscape.
Field Incident Command 29 April - 01 May 2012 Dubai, UAE
1. ADVANCED
CERTIFICATE
IN
FIELD INCIDENT
COMMAND
29 APRIL - 01 MAY 2012
RADISSON BLU
DUBAI DEIRA CREEK
UNITED ARAB EMIRATES NUS!
SPECIAL BvOlly ttestted
i ey e e
iv
COURSE OVERVIEW A comprehensual to guide you
re
Training Man
t work.
to
The Field Incident Commanders Course is specifically designed for those w hen you return
persons who may be called upon to attend or manage an emergency or
disaster situation and meets OSHA requirements. YOUR INTERNATIONA
YOUR INTERNATIONAL
With the increase in natural disasters across the world and the higher risks COURSE FACILITATOR
associated with expanding industry there is a real need for more people to be
trained in field emergency management to prevent the loss of life and
damage to infrastructure. Adrian Francis
Dip.Sec.Man.,Grad.Cert.Man.,Dip.Gov.Inv.
Participation in this course will train you to effectively manage and take Director of Training/
control of emergency situations using International ICS 100, 200 and 300 Chief Instructor
standards. Australian School of
Security & Investigations
The Incident Command System (ICS) is an internationally accepted tool used
Adrian Francis has a long career in law enforcement,
for the command, control, and coordination of emergency response.
investigations and security intelligence. Extensive
The ICS allows people to work together and communicate effectively in experience in specialist covert intelligence gathering
emergency situations especially when they may be drawn from multiple operations coupled with over 25 years experience as a senior
agencies that do not routinely work together. criminal and corporate investigator has given Adrian the
background knowledge and hands on experience to ensure
that Delegates receive only the most up to date and
Field Incident Command will enable delegates to: professional training available.
Properly manage during a crisis situation PROFILE
Communicate effectively in emergency situations Consultant for government and private sector on
Prevent loss of life and damage to critical infrastructure investigator training and development New South Wales
Comply with international OSHA requirements Police Rescue Squad Course Drug Enforcement Agency
Crime Scene Investigators Australian Federal Police
Utilise latest technologies for better emergency response Surveillance Detective Advanced Certificate in Criminal
Investigations Arson Investigators Certificate Advanced
โ
Diploma in Risk Management Certificate IV in Government
Amateurs train until (Fraud Control & Investigations)
they get it right, 1 Over 25 years experience as an Investigator in both law
enforcement and general investigation environment.
2 Extensive experience in investigations targeting all levels of
Professionals train until
โ
crime.
3 Accredited trainer and Director of Registered Training
they cannot get it wrong Organization with strong background in investigator training
and risk management.
4 Key skills in technical based investigations, evidentiary,
TESTIMONIALS identification, evaluation, deployment of restricted surveillance
and security equipment including GPS and RF tracking
โOne of the best trainings I have attended. Workshop arrangement was
equipment and other related equipments.
outstanding & the instructor Mr. Adrian is very knowledgeable.โ
5 Consultant for corporate clients for risk management, security
- Ali Hassan Baaqeel, Emergency Coordinator, Petro Rabigh
procedures, surveillance, investigation techniques local and
โI found the presentation of this course as being one of the best I have international.
attended thus far. This course gives you the tools to save lives.โ 6 Extensive knowledge and experience in investigation of crime
- Gert Ferreira, Deputy Regional Operations Manager, CRM international and serious corruption in the Government & Organizations.
7 Promote, contribute and instruct in safe working practices
โI am impressed by how simple & effective the course was. The instructor
(OH&S)
has exceeded my expectations. I would attend & recommend more
8 Check and evaluate all briefs of evidence where specialist
courses with 360 BSI.โ
- Abdulla Hassan Al-Thawadi, Production Engineer, Tatweer Petroleum investigative services are involved.
ยฉ 360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL 168 Jalan Bukit Bintang 55100 Kuala Lumpur Malay
BSI (M) Bhd (833835 X) Level Pavilion KL, 168 Jalan Bukit Bintang 55100 Kuala Lumpur Malaysia.
(833835-X) evel Pavilion Bintang, Lumpur, 1
2. COURSE
CONTENT
ALL SESSIONS WILL BE
THEORY AND PRACTICAL BASED
DAY1 INCIDENT COMMAND SYSTEM (ICS)
What is an incident? WHY THIS EVENT
Understanding the evolution of the ICS
This program will develop the core skills needed
Introduction to the ICS to manage an emergency or disaster.
ICS Purposes
Initial Response to an Incident or Emergency There is a real need for people to be trained in
Selection of the Incident Commander field emergency management to prevent the
Role and Responsibility of the Incident Commander loss of life & damage to infrastructure.
Incident Commander problems
Manageable Span of Control Participation in this course will train you to
Selecting the right team effectively manage and take control of
Transfer of Command emergency situations using International ICS
100, 200 and 300 standards.
The training is both practical and realistic and is
relevant to your working environment.
Some areas & possible scenarios could include:
DAY2 COMMUNICATIONS Plants, Refinery, Chemical Storage, Power
Station โ Bombing, Leakage, Explosion
Railways, underground rails, Airports, Ports โ
Understanding the initial emergency call Accident with numerous people
Communicating to the right people Water Authorities, Government Building โ
Responding the correct services and support groups Contamination of Water Supply, Threat to
Knowing and reading your environment water supply, Terrorism, Major Incident,
Knowing your limitations Collapse, and more.
The importance of the emergency radio dispatcher Other Organizations, Banks, Public Sector โ
negligence, breach of procedures, fraud and
Staging areas others
The incident Command Post
Effective Communications
The importance of being flexible
Managing the emergency
Wind direction โ Considerations
Evacuation considerations
DAY3 EMERGENCY RESPONSE &
PRACTICAL EXERCISES
Understanding Emergency Response Plans WHO SHOULD ATTEND
Effective use of resources Security Professionals, Heads, Managers
Use of technology to assist the Incident Commander Risk Management specialists
Working with the media Emergency Response Team
Working with Senior Management Emergency Dispatch Personnel
Understanding the debrief Plant Security Head, Managers, Incharge
The clean up Former and serving police investigators
Business continuity Investigation officers & others
Root cause analysis Facility Managers
Practical Exercise:
Respond and Setup Incident Command Post COURSE SCHEDULE
8.00 Registration & Coffee/Tea
8.30 Workshop commences
10.30 - 11.00 Morning coffee/tea
12.30 - 13.30 Lunch
14.30 - 15.00 Afternoon coffee/tea
16.30 End of day
2
3. ADVANCED
CERTIFICATE REGISTRATION FORM
IN
FIELD INCIDENT Fax: +603 9205 7788
COMMAND
Tel: +603 9205 7770
29 APRIL - 01 MAY 2012 Mobile: +6016 3326 360
RADISSON BLU
DUBAI DEIRA CREEK Email: kris@360bsi.com
UNITED ARAB EMIRATES
DELEGATES THE CERTIFICATES
1 Name : Participants will be awarded an academic Certificate, an
Australian Nationally Accredited Statement of Attainment for
Name on tag : the unit:
PRS 30103 Certificate III in Security Operations
Job Title :
Email : Note:
Completion of this certified course will enable the candidate
Mobile : to pursue higher level qualifications, i.e.
1. Diploma program
2 Name : 2. Professional Security Intelligence Course (Australia)
Name on tag :
OTHER CERTIFIED PUBLIC COURSES
Job Title :
Security Operations & Investigation
Email : Root Cause Analysis
Emergency Dispatch & Control Center Operations
Mobile : Emergency Response Management
3 Name : Warehouse & Distribution Security
Advanced Covert Surveillance
Name on tag : Loss Prevention & Investigation
Job Title :
Hotel Contact Details:
Email : For Room Reservation, please contact us for corporate rates.
Telephone: 00971 4 2057105 Fax: 00971 4 2234698
Mobile : E-mail: reservations.dxbza@radissonblu.com
Radisson BLU Hotel, Dubai Deira Creek
AUTHORIZATION Baniyas Road, P.O. Box 476, Dubai, UAE
(This form is invalid without a signature) General Information:
Name : 1 Closing date for registration is 22nd April 2012.
2 The fees cover lunch, tea breaks, materials and certificate.
Job Title : 3 Official confirmation will be sent, once registration has
Email : been received.
4 Participants will need to arrange their own accommodation.
5 Attire: Smart Casual
Tel : ( )
Cancellations/Substitutions
Organization :
Substitutions are welcome at any time. Please notify us at
Address : least 2 working days prior to the event. All cancellations will
carry a 10% cancellation fee, once a registration form is
received. All cancellations must be in writing by fax or email
at least 2 weeks before the event date. Cancellations with
less than 2 weeks prior to the event date carry a 100% liability.
However, course materials will still be couriered to you.
Signature : Date: / /
Thank you for your registration!
COURSE FEES (please tick as appropriate) PAYMENT DETAILS
Payment is required within 5 days upon receipt of
the invoice.
USD 2,695 per delegate
Bank transfer:
USD 6,600 - Special for Group of 3 360 INTERNATIONAL LIMITED
USD 10,000 - Special for Group of 5 Standard Chartered Bank
The fee does not include any taxes (withholding or otherwise). In case of any taxes applicable P.O.Box โ 999 Al Fardan Building,
the client has to ensure that the taxes are paid on top of the investment fee paid for the course. Al Mankhool Area, Bur Dubai, Dubai, U.A.E
Compliance with the local tax laws is the responsibility of the client.
Account No: 02-2077311-01 USD
Swift No: SCBLAEADXXX
IBAN No: AE920440000102207731101
* Save up to 50% for In-house Training program All payments must be received prior to the event date
ยฉ 360 BSI (M) Sdn Bhd (833835-X), Level 8 Pavilion KL, 168 Jalan Bukit Bintang, 55100 Kuala Lumpur, Malaysia. www.360bsi.com/security 3