Travel, safety and security. Time to think.

Join us  for a presentation by Shane Britten, Senior Specialist Consultant (Intelligence and Security) from Claviger Group as he discusses this topic in an interactive workshop.

As a senior Australian intelligence officer deployed to more than 40 countries, Shane has a history of successful defence of personal safety and security threats from criminal and terrorist groups, as well as the aggressive espionage actions of foreign intelligence services

Bring your phone, laptop and any devices that you travel with regularly to get the most out of this discussion. 1pm -4pm Monday 1st September. Like the kenwood offering, jvc’s kw-m730bt will also ship next best mobile spy software for iphone month for $500. Tea, coffee and afternoon tea provided. $195 MineSpace/AAMIG members, $250 General admission

 

Managing Security Risk: International Travel

Outcomes

Participants will be provided information on the nature and extent of the risks associated with international travel, including physical and information security threats. Strategies, practical methods and training will be provided to increase personal and information security while overseas, including related to mobile phones and laptops. The skills taught during the workshop can be applied to other company members and executives.  

Course Objectives

At the end of the session, participants will be able to:

  • Anticipate and pre-empt security risks associated with travel;
  • Understand the capabilities and methods used by adversaries to steal commercial information;
  • Develop a risk profile for travel they undertake, or that undertaken by executives or other staff;
  • Utilise initial methods to increase information security and other risks associated with travel; and
  • Practice methods to limit the likelihood of success and the consequences of a security incident while travelling.

Course Program Outline

Course Program Outline

Session 1: What are the risks and who creates them?

Session 2: How do we identify our own points of vulnerability?

Session 3: Mitigating Human Risks, including from traditional espionage attempts

Session 4: Mitigating Device Risks, including mobile phones and laptops

Session 5: Building security awareness