Professional Security Management

19-20 Nov, 2024, Wyndham Grand Bangsar Kuala Lumpur

IPA Training is Registered with

Learn from the Best

Aziz Ariarasa Abdullah is an experienced corporate trainer / lecturer in Total Integrated Security
Management. He has conducted several security management training programs in-house, at public forums & up to degree level at academic institutions for all levels of students / participants.

 

He has 25 years of experience in the Private / Corporate Security Industry & served several corporate companies as a Security Consultant / Private Investigator in addition to senior management
appointments in security companies. Very experienced in private / corporate investigation includes cases related to fraud, intellectual property, asset shrinkage, due diligence, personality profiling,
industrial espionage & internal theft.

 

In relation to the above, he has conducted several assignments for large organizations in Oil & Gas, Chemical, Maritime and several other industries. To name some such companies will be Shell Trading Malaysia, Esso Malaysia Berhad, Titan Petrochemicals, Malaysian Marine Heavy Engineering (MMHE) etc. The assignments were mainly Security surveys & audits, Physical Security Analysis, Building
Security, Crisis Management & Business Continuity Planning, Bomb Threat Management and Counter Terrorism.

 

He is member of:
1. American Society of Industrial Security (ASIS) – since Y2009
2. Asian Professional Security Association (APSA) – since Y2009
3. Fellow of the Academy of Security, Intelligence & Risk Studies (ASIRS) – since Y2014
4. Transported Asset Protection Association (TAPA) – since Y2018
5. International Association for Counter Terrorism & Security Professionals (IACSP) – since Y2018
6. International Security Industry Organization (ISIO) – since Y2020


 

He joined the Royal Malaysian Police in 1965 as an Inspector and retired after 33 years of service in 1998 with the rank of Assistant Commissioner of Police. He has 19 years of experience in the Special
Branch – covers a wide range of Police trade craft including criminal investigations, procurement of
tactical intelligence, overt & covert handling of undercover operations with surveillance, Counter
Insurgency Operations, & International Counter Espionage. He had another 14 years in CID, Internal
Affairs department & service as Officer in-charge of Klang Police District (OCPD) – covers investigation into crime, internal affairs, narcotics & command management. He was also specially trained in Special Weapons & Tactics (SWAT) to combat urban terrorism by armed mobile communist units during
communist insurgency.

 

TERTIARY / TRAINING QUALIFICATIONS
1. TAPA Certified Coordinator (TCC) – Y2018
2. TAPA Certified TSR / FSR / GSR Auditor – Y2018
3. CIISCM – Certified Crime Prevention Specialist (CCPS) – Y2019
4. CIISCM – Certified Anti-Terrorist Specialist (CATS) – Y2018
5. CIISCM – Certified Corporate Security Management Professional (CCSMP) – Y2018
6. IRCA Lead Auditor & Assessor, ISO 9001:2000 – Y2007
7. Msc in Security & Safety Management (WIU), Florida, USA – Y2007
8. Masters in Business Administration (CU), Florida, USA – Y2005
9. MIM & HRDF @ Certified Train the Trainer (TTT) – Y2006
10. Ministry of Home Affairs, Malaysia @Certified Security Trainer – Y2004
10. Bachelor in Business Administration (AIU), Florida, USA – Y2003
11. Franklin Covey@The Seven Habits of Highly Effective People – Y2000

 

Venue Details

Wyndham Grand Bangsar Kuala Lumpur
No 1, Jalan Pantai Jaya, Tower 3, 59200 Kuala Lumpur, - 59200
Phone : (603) 2298 1888
Fax : (603) 2298 1999

https://wyndhamgrand bangsarkl.com.my/

Contact us

Juliany,
03 2283 6109
juliany@ipa.com.my

Phoebe,
03 2283 6100
phoebe@ipa.com.my 

FOR CUSTOMISED IN-HOUSE TRAINING
Jane,
03 2283 6101
Jane@ipa.com.my

ADDRESS 
A-28-5, 28th Floor, Menara UOA Bangsar, 
No.5, Jalan Bangsar Utama 1, 
59000 Kuala Lumpur
www.ipa.com.my

FOCUSING ON
  • Module 1: Definition, Role, & History
  • Module 2: Security – Environment
  • Module 3: Profession & Business of Security
  • Module 4: Policies & Procedures
  • Module 5: Managing Risk
  • Module 6: Managing Physical Security Operations
  • Module 7: Managing Access Control
  • Module 8: Managing Investigations
  • Module 9: Emergency Management
  • Module 10: Security Program Design
  • Module 11: Case Study
OVERVIEW

Security has become increasingly diverse and specialized. We can no longer narrowly view offenders as being threats only from the outside, who can be thwarted through perimeter access controls and patrols. The reality is that the threat may also be from within – on premises everyday, for instance, as a disgruntled employee or a spy. Simultaneously, the internet and information technology (IT) systems have resulted in serious vulnerabilities. Security is an essential component of comprehensive protection when an entity is faced with a variety of hazards which are not criminal in nature, such as adverse weather or a utility failure.

Everyday all around the world, thousands of IT systems are compromised. Some are attacked purely for the kudos of doing so, others for political motives, but most commonly they are attacked to steal money or commercial secrets. Are you confident that your cyber security governance regime minimizes the risks of this happening? My experience suggests that in practice, few companies have got this right. If not, your IT systems may have already been compromised, attackers could already have your new product plans, bidding positions or research; they may already be running your process control systems.

We live in a world of many threats and hazards, and we learn of people killed or injured and property stolen or destroyed from a host of sources. At the same time, we all differ in our behavior in trying to avoid losses. Most people practice various forms of security and safety in their personal lives, such as locking homes and vehicles. Both private and public sectors spend enormous sums of money and resources seeking to prevent deaths, injuries, theft, and property damage from a host of threats and hazards. Whether in business or government, people are hired to perform protection functions.

Training of security personnel is a major issue and is of the utmost importance prior to duty assignments. Personnel must know their job responsibilities and how best to protect people and assets while conforming to law and company policies and procedures. A professional performs a service to help society, possesses specialized knowledge and skills, follows a code of ethics, and strives for self-improvement.

This course provides information about the security profession, the business of security, and how to protect people, information and assets. An emphasis is placed on history, terminology, theory, methodology, and practical strategies of protection. The course applies several techniques to guide participants towards enhanced security competencies and skills.

AFTER ATTENDING THIS COURSE YOU WILL RETURN TO YOUR JOB…
  1. Understanding the many different aspects of the security functions, implementing and managing the day-to-day operations of the security organization and being prepared, at all times, to meet and overcome the various threats to his facilities.
  2. Being able to Identify, Assess, Manage and Mitigate Risks.
  3. Understanding the application of methodologies in Risk Analysis & Threat Assessment.
  4. Being able to systematically review, analyze and determine the effectiveness of the organization’s current security practices.
  5. Establishing and implementing policies, standards and procedures for the effective management of security programs within the organization.
  6. Getting to know the ability to plan for emergencies through a realistic assessment of potential hazards, evaluating the cost of preparedness and weighting that against the risk to people & property.
  7. Being able to adopt and practice a systematic investigation function with effective operations in the conduct of investigations universally.
  8. Being able to assimilate information necessary to perform a high level of service successfully and properly as a security management professional.
  9. Discussing case studies on the concepts of Security Management as a specialist.
WHO SHOULD ATTEND
  1. Security Managers & Executives
  2. Human Resource
  3. Facilities
  4. Operations
  5. Audit / Compliance / Legal
METHODOLOGY
  • Interactive Lectures
  • Case Studies & Practice Session
  • Discussion
  • Questions & Answers Session
Day 1
9:00

MODULE 1: DEFINITION, ROLE, & HISTORY

10.45

MODULE 2: SECURITY – ENVIRONMENT

12.00

MODULE 3: PROFESSION & BUSINESS OF SECURITY

1:00 Lunch
2:00

MODULE 4: POLICIES & PROCEDURES

3:45

MODULE 5: MANAGING RISK

5:00 End of Day 1
Day 2
9:00

MODULE 6: MANAGING PHYSICAL SECURITY OPERATIONS

10.45

MODULE 7: MANAGING ACCESS CONTROL

12.00

MODULE 8: MANAGING INVESTIGATIONS

1:00 Lunch
2:00

MODULE 9: EMERGENCY MANAGEMENT

3:00

MODULE 10: SECURITY PROGRAM DESIGN

4:00

MODULE 11: CASE STUDY

5:00 End of Course