Assessing Terrorism Related Risk (ATRR) Workshop – Copenhagen
Assessing Terrorism Related Risk (ATRR) Workshop
Copenhagen, Denmark | 2-5 November 2020
On 2-5 November 2020, the S2 Institute will be presenting a four-day, 32-hour version of the S2 Assessing Terrorism Related Risk (ATRR) Workshop in Copenhagen, Denmark.
The S2 Assessing Terrorism Related Risk (ATRR) Workshop is designed to train security and public safety personnel in the dynamics of terrorism related risk and effective methodology for conducting terrorism risk assessments in support of security planning. The information presented in this course reflects best practices in security risk management as applied in both the government and commercial sectors of the security industry.
This program is structured as an interactive workshop and employs a series of progressive group exercises to assist in understanding the process of risk assessment and how to apply risk management principles in anti-terrorism and security planning.
Topics include:
Principles of Security Risk Management • Dynamics of Terrorism Related Risk • Security Risk Assessment Methodology • Risk Assessment Models • Asset Identification and Valuation • Threat Assessment • Vulnerability Assessment Techniques • Performance-Based Physical Protection System (PPS) Analysis • Blast Vulnerability Assessment • Countermeasures Cost-Benefit Analysis • Report Preparation and Plan Implementation
- Understand risk management principles and the function of risk assessment in security planning.
- Recognize important characteristics of terrorism related risk and terrorist modus operandi necessary for conducting effective risk assessments.
- Conduct security risk assessments by utilizing qualitative risk assessment methodology.
- Estimate the potential Intent and Capability of adversaries relevant for purposes of terrorist risk assessment.
- Evaluate the design of physical protection systems utilizing quantitative assessment methods.
- Estimate vulnerability to terrorist attack scenarios using the principles of fault tree analysis and Critical Success Factors (CSF) analysis
- Estimate the potential vulnerability of structures to blast loading from terrorist IEDs.
- Design prioritized security countermeasures strategies by utilizing cost-benefit analysis techniques.
DAY ONE
- Principles of Risk Management
- Fundamental Risk Management Concepts
- Risk Assessment Approaches
- Risk Measurement Models
- Risk Assessment Methodology
- Qualitative Risk Assessment Model
- Characteristics of Terrorism Related Risk
- Ideological Motives
- Strategic Objectives of Terrorists
- Types of Terrorist Targets
- Target Selection Criteria
- EXERCISE: Could your organization be attractive as a terrorist target?
- Categories of Terrorism Related Risk
- Terrorist Planning and Execution Phases
- Risk Dynamics and Terrorism
- Conducting the Risk Assessment
- Guidelines for Assessing Terrorism Related Risk
- Assessment Planning and Preparation
- Team Composition
- Identifying and Profiling Assets
- Asset Identification Principles
- Sources of Asset Information
- Identification of Undesirable Events
- Asset Identification Approaches
- EXERCISE: Asset Inventory
- Asset Valuation
- Exercise: Develop Criteria for Rating Severity
DAY TWO
- Threat Identification and Assessment
- Categories of Threats
- Identifying Potential Terrorist Adversaries
- EXERCISE: Self-Assessment
- Adversary Assessment
- Sources of Adversary Information
- Determination of INTENT and CAPABILITY
- Structured Target Attractiveness Assessment
- Analysis of Critical Threat Modus Operandi
- EXERCISE: Adversary Assessment
- Identification of Potential Risks Based on Threat M.O.
- Development of Design Basis Threats (DBTs)
- Development of Threat Scenarios
- EXERCISE: Develop Design Basis Threats & Scenarios
- Development of Threat Rating Criteria
- EXERCISE: Develop a Threat Estimation Criteria
- Vulnerability Assessment
- Terrorism-Related Vulnerability Issues
- Areas of Vulnerability
- Vulnerability Assessment Approaches
- Assessment Approaches and Applications
- Security & Emergency Readiness Assessment Surveys
- Survey Structure
- Data Collection Process and Documentation
- Security & Emergency Readiness Assessment Surveys
DAY THREE
- Vulnerability Assessment (cont.)
- Fault Tree Analysis
- Critical Success Factors (CSF) Analysis
- EXERCISE: CSF Analysis
- Physical Protection System (PPS) Analysis
- Performance-Based Physical Security Principles
- Estimate of Adversary Sequence Interruption Model (EASI)
- Probability of Interruption
- Site Characterization
- Adversary Paths
- EXERCISE: EASI Path Analysis
- Blast Hazard Analysis
- Blast Dynamics
- Blast Effects and Structural Response
- Overpressure-Range Effects Assessment
- Building Damage and Injury Effects Estimation
- EXERCISE: Blast Hazard Analysis
- Blast Dynamics
- Practical Field Tests (a.k.a. “Red Team Exercises”)
- Completing the Vulnerability Assessment
- Vulnerability Rating Criteria
- EXERCISE: Estimate Vulnerability to Several Attack Scenarios
DAY FOUR
- Evaluating Risk
- Establishing Level of Risk and Risk Acceptability
- EXERCISE: Completing the Risk Assessment
- Identify & Implement Countermeasures
- Integrated Countermeasures Theory
- Identifying Potential Countermeasures
- Countermeasures Cost-Benefit Analysis
- Applied Cost-Benefit Analysis
- EXERCISE: Cost benefit Analysis
- Establishing Level of Risk and Risk Acceptability
- Completing the Risk Assessment
- Common Problems Made During Terrorism Related Risk Assessments
- The Security Risk Assessment Report
- Risk Communications Considerations
- Examples of Security Risk Assessment Report
- Security Risk Assessment Models Developed for Use in Industries and Government Organizations
Present
S2 Assessing Terrorism Related Risk Workshop is adopted by the European Commission
Public ATRR Assessing Terrorism Related Risk Workshops resume
ATRR Program is revised and expanded
S2 ATRR Workshop is adopted by OSCE for training the MoNS of Azerbaijan
S2 ATRR Workshop is adopted by the Abu Dhabi CNIA
S2 Assessing Terrorism Related Risk Workshop endorsed by U.S. Department of Justice
Ref. Leson, Joel. Assessing and Managing the Terrorism Threat. Washington, DC: U.S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Assistance, 2005. Print
FLETC conducts peer review of the S2 ATRR program
S2 Assessing Terrorism Related Risk Workshop is developed
Course Details
Tuition
$2000.00
Group enrollment discounts are available. Contact us for details.
Instructor
Craig Gundry
Location
Scandic Palace Hotel
Restriction Level
Level 2 – Verified Security Professionals & Law Enforcement Only
Presentation Time
32-Hrs/4 Days (8:30am to 4:30pm)
Audience
Security Executives, Military Force Protection Planners, Domestic Security and Intelligence Analysts, and LE Professionals Assigned to Strategic Anti-Terrorism Activities
Students that wish to enroll and pay for this course by email should download and complete the S2 Course Enrollment Form (PDF). When completed, email the form with payment information to: info@s2institute.com
Student Testimonials
“Mr. Gundry is an outstanding instructor who displays a deep understanding of his subject, who keeps the interest of the students and created a solid course”
N.W. (Name Withheld)
Central Intelligence Agency
“I am an intelligence and security professional with 40 years of experience in the field. I am currently the principal Analytical Risk Management instructor for the DoD Joint Counterintelligence Academy and taught the subject for CIA et al for some four years prior…I mention this to emphasize Mr. Gundry's evident expertise in the subject and the fact that old guys like me still have much to learn from others.”
A. Pattakos
US DoD | Beta Analytics International
"I thought that the course materials and additional handouts provided with the course were extremely well put together and will be useful long after completing the course. In addition, the instructor was very knowledgeable of AT/FP principles and presented the information in a clear and concise manner. This course was well worth the time and money invested.”
R. Russell
Booz Allen Hamilton
"This course triggered my deepest interests. Craig is a superb instructor due to his experience and appearance as an expert."
E. Posthumus
Government of the Netherlands
"The level of teaching was impressive. Craig did not skip a beat...I felt it was a large amount of information covered in a reasonable period of time and was put out in a manner that was understandable...Very informative!"
A. Volonino
Security Consultant
"..helpful for the project I participate in. The instructor was proficient and enthusiastic, with loads of practical experience. Very motivating!"
R. Stoel
Netherlands Forensic Institute
“Excellent, comprehensive course. Mr. Gundry is very knowledgable and is an excellent instructor. I highly recommend this course to other security and AT professionals.”
J.W.
U.S. Coast Guard
“Outstanding course.”
J. Rector
Chief, USAF Security Forces Programs & Requirements Branch
Date
- Nov 02 - 05 2020
- Expired!
Time
- All Day
Location
- Scandic Palace Hotel
- Copenhagen, Denmark