The Corporate Crisis Management Program (CCM) trains Corporate Security Professionals and Executive Security Officers to manage risks in a corporate setting. The Program will cover Best Practices in a wide range of issues confronting corporate security personnel: Monitoring, Tracking and Responding to Global Crisis whether human or natural, Managing Threats to Employees, Property and Executives; strengthening the understanding of corporate security personnel of the core analytical concepts of criminal patterns, Link Analysis, Association Matrix, Time Lines and Flow Charts; learning interview skills of Deception Detection and Statement Analysis as well as clues to personality profiles and Handwriting Analysis; developing policies to mitigate Workplace Disruption and Violence and Managing Aggression and Pre-Indicators of Dangerous Behavior; finally, students will be introduced to Kidnap & Ransom practices.
In the 28-Day CCM, ESI has assembled coherent subject matter relevant to corporate security professionals that if taken in separate seminars would cost several times more stretched out over an unpredictable time span than if taken as an integrated curriculum. However, in order to accommodate busy time schedules, the Corporate Security & Threat Management Program can be taken either as a 28-Day Residency or as Stand Alone short Certificate Modules. In the case of Stand Alone Modules, Credit Hours are accumulated towards an ESI Certificate and Credential as a Corporate Security Threat Management Specialist (CSTMS) as the student has time to complete each block of instruction.
The combination of the two Residencies: Corporate Security and Executive Protection prepare the student for ESI's premier certification as a Certified Security Specialist (CSS). It is also possible to obtain the CSS Certification by completing 18 Distance Education courses ON-LINE plus either Corporate Security or Executive Protection Residency.
A primary goal of this two-day course is to prepare students to conduct Security Surveys for or at Corporations and Government Facilities. Students will learn how to conduct Security Surveys of buildings and their staff using the FEMA model, which is now a recommended practice for corporations, and may soon become a mandate.
Students will be able to conduct a FEMA model survey and develop working solutions to include training and drills. The student will learn how these surveys are used to mitigate new threats of an Active Shooter Incident as seen in Mumbai, India and Aurora, Colorado. FEMA is seeking to establish national standards that would apply to all public locations.
Upon completion of the course, students will be eligible for FEMA Certification and demonstrate real-world qualifications for this type of work.
In addition, the course will address issues such as “How do Executive Protection Agents support or fit into the corporate security that must confront a wide range of threats both human and natural? Is there a role for Close Protection during natural disasters I.e. Hurricanes, earthquakes and other natural disasters?
Corporate Security consist of a broader skill set than Close Protection. What do you need to know in order to be of value to a global corporation? And what are the intelligence resources necessary to Monitor, Track and Respond to global crisis situations?
The Managing Threats & Risks course takes the principles of threat and risk management and applies them to the overall corporate security role, and introduces procedures to manage and intervene in situations where threats and acts of violence are directed towards any member of the company workforce. Discussion includes coworker harassment, customer or client threats, and the rising issue of domestic violence spillover.
This course teaches corporate security from a risk management perspective, and introduces the student to the challenges of operational security in a corporate setting. This course reinforces threat management as a primary proactive approach to mitigate risks, and drives a looping model of risk identification, mitigation, and incident response and business recovery. Discussion includes the nature of workplace violence; threat management in a five-component workable model; technology to receive, manage and monitor ongoing risk situations; training employees to respond should gun violence occur in the corporate work environment; and building a threat assessment team leveraging human resource, security, legal, and risk management perspectives.
Topics will include: training employees for the "what if" scenario; facilitating an efficient active shooter response by law enforcement; armed vs. unarmed guard contracts; and planning and administering mass casualty medical response in a corporate environment.
Students will apply their skills and knowledge of course concepts through individual and team assignments of actual cases, which highlight, the administrative, political, financial, and often frustrating issues facing the corporate security professional.
The Case Studies of Corporate CEO Stalker Exercise is a unique teaching platform designed to present the student with an immersive, stress induced, Team Building Mission that we introduce on the study of CEO Stalking. The Module is based on actual case studies of long-term stalking incidents of corporate executives and how they were managed to a successful conclusion.
The students are given their own client case with all the incidents associated with the threat to an executive and their family. The Team is then asked to collect factual data, analyze the details and develop a Management Plan on how to handle the case that minimizes the danger to the client and to the corporation. The end goal of the course is to provide a platform whereby the individual student and the team will learn how to develop a Threat Assessment and a Management Plan based on structured analytical techniques. The course will illustrate guidelines for policy on how to crisis manage threats to officers and the corporation, when it is advisable to invite outside consultants i.e. psychiatrists, legal counsel and law enforcement agencies to facilitate a peaceful resolution
D. Anthony Nichter, ARM, CHE, CPP, CPS, CDTI
This course is designed to strengthen the understanding of corporate security personnel with the core analytical concepts beginning with the Intelligence Cycle, methods of Intelligence Collection, Report Writing and resulting in Policy Development. It’s goal to convey techniques develop by the military intelligence that can be applied to a corporate environment to mitigate organized criminal operations.
Social Network Analysis utilizes a technique for organizing information like Link Analysis, Flow Charts, Association Matrix, Time Lines and other analytic tools to tract the relationships between individuals, organizations, agencies, and businesses in order to form the basis for conclusions. The course introduces various Structured Analytic Techniques used by analysts from Structured Brainstorming, Nominal Group Technique, and Star Bursting. Students will also cover hypothesis generation and decision analysis tools such as SWOT Analysis. Social Network Analysis techniques are one of the most commonly used forms of analysis in law enforcement, corporate security loss prevention, investigation of narcotics network, organized crime, terrorism, fraud, and other criminal conspiracies.
The course will present a Structured Analytic Technique as a way of reducing the ambiguity of highly ambiguous situations that opens the process of analysis in a manner that makes it apparent to others. Techniques include Structured Brainstorming, Scenarios, Indicators, Analysis of Competing Hypothesis and Key Assumptions Check.
Students will build a valuable foundation in Intelligence Analysis and understand the distinction between a data collector and an Intelligence Analyst.
Finally the course will introduce the position of the OPSEC Manager and how it offers a strong basis to develop “Good Practices” for security departments.
Barry Wilson, President
The skilled Executive Protection Agent understands that Knowledge in both proactive and reactive skills is Power. They also recognize that the more Knowledge Based Tools they possess, the more effective they will be at devising and implementing a Protective Strategy that will successful defend their Clients.
This course in Field Handwriting Analysis will allow the successful student to ascertain the core personality characteristics of any individual. The training opens a window into the opposition’s attitudes, thinking patterns, emotions and character history, which under normal circumstances could take months to uncover.
The Student should be prepared for an intensive course of both empirical and interruptive study taught through practical review of handwriting samples and scenario extrapolation.
Course of Study
This module is a 5-Day Certificate Course designed to teach the principles of interviewing for cause or for the solicitation of information from a variety of subjects. The course is comprised of two distinct but highly compatible components taught by two experienced intelligence analysts, Alan and Kaaryn Gough: Behavioral Analysis and Statement Analysis. Combining instruction with interactive and real-world scenarios, this course will give participants immediate and practical knowledge. Individually, each component will teach skills and provide tools to detect deception and gather intelligence from responses provided by subjects. Participants will ultimately learn how to combine both methodologies, resulting in significantly enhanced accuracy in analysis and a more comprehensive gathering of reliable information.
This course component is designed to teach the principles of interviewing for cause or for the solicitation of information from a variety of subjects. Through instruction and numerous interactive exercises, the participants will learn how to conduct effective interviews and analyze the results for maximum accuracy. Whether finding out “what happened”, or discovering information not previously known, these techniques can be applied in formal and informal interview settings and in the analysis of other forms of subject statements or documentation.
Kaaryn Gough, President and CEO
This course component introduces the highly effective method of detecting deception and gathering information through the examination of a subject’s words, linguistic structure and content–what information a subject chooses to include and exclude–in a spoken or written statement. Employed by law enforcement, government agencies, legal firms, insurance companies and private industry around the world, statement analysis is a consistent and systematic method that has proven to be an invaluable investigative tool.
JOHN ROSE, President,
Workplace Disruption & Violence Management- This course provides the Protection Agent with an alternative perspective towards the workplace, namely, how to be a ‘protector’ of the many employees and not just the singular executive. The Agent learns how to apply his/her exotic protection skills to the wider occupational environment and not just members of the Boardroom. From this point of view, modern protection agents will increase their chances of long-term employment as today’s workplaces witness increasing violence that is escalating in both frequency and severity.
Bob Duggan, President, Executive Security International
ESI has taught this course for 30 years, and believes it an essential skill set to any Protection Specialist. Starting with an archive of film clips of assassinations, attempted and successful, this course will train the student to identify the precursors of assault or pre-indicators of violence. The goal is to enable the student to replace casual observation of generalities with the study of detail, to recall it systematically and to develop the capacity to make accurate descriptions. The Behavioral Intelligence and Clues to Dangerousness course will concentrate on the identification of facial expressions with the primary emotions based on the research of Dr. Paul Ekman and other behavioral scientist. A Protection Specialist that is capable of identifying facial expressions and body gestures as the precursors of assault or aggression is armed with the capacity to Anticipate, and Preempt the Attack on Principle.
Lt.Col Kendall S Schaefer, (USMC retired),
This course will be taught using Somali pirate hostage cases from the Indian Ocean and individual kidnap-for-ransom cases from Mexico and Latin America. In addition, the students will learn techniques for avoiding a kidnapping and for surviving a kidnapping incident.
Scott Schaefer managed Kidnap Response Operations for the Houston-based ASI Global Response (www.ASIGlobalResponse.com) until he was medically retired in 2012. As a dedicated response consultant for Travelers Insurance, Scott and the ASI team responded to kidnap-for-ransom, extortion-with-violence, and piracy events around the world. Scott is widely sought after to provide direction and insight to the corporate world regarding kidnap prevention and training, crisis management planning and response.
Prior to working as a Kidnap & Ransom Consultant, Scott served with the Marine Corps and was a Case Officer with the Clandestine Services Division of the Central Intelligence Agency, retiring at the equivalent rank of Lt.Col. He has taught courses for corporate and government clients in the areas of Intelligence Collection and Analysis, Surveillance Detection and Counter Intelligence.
PSD Protective Operations