Personal tools
You are here: Home Pre-Conference Workshop

What past attendees said...

"Enjoyable dinner and presentations" - Harley Sparke, Corporate Protection Australia


"It provided a good opportunity to network with security industry" - Paul Power, Department of Defence


"Very interesting" - Paul Edwards, Attorney-General's Department


"Great content, very interesting" - Paul Alaimo, Department of Finance & Deregulation


"Overall an excellent conference and a great opportunity to network...the dinner and ASIO speaker were excellent and staff very helpful" - Ian Wing, Charles Sturt University


"Excellent speakers" - Paul Edwards, Attorney-General's Department


"Great diversity of presentations" - Mark Patch, Gibsons JBS


"Excellent service and venue" - Glen Salmon, Australian Fisheries Management Authority


"Very useful and enjoyable conference" - Phil Winter, Department of Defence


"Interesting topics...presentations of a very high standard" - Michael Thomas, Customs & Border Protection


"Well organised and informative. Quite a good networking opportunity" - Jodie Fitness, Cadden Crowe


Pre-Conference Workshop

Tuesday 28th February 8:00am-5:00pm

Predictive Profiling Methods for Protected Environments

Profiling behaviours and situations are the foundation for every security procedure. This unique seminar teaches Security Professionals how to enhance security programs by proactively identifying criminal or terrorist operations in the planning, surveillance, and rehearsal stages.

This one-day workshop provides a systematic approach for detection of suspicion, determination of threat and the deployment of subsequent procedures.

Predictive Profiling is a different approach that starts from the point of view of the aggressor and is based on actual aggressors methods of operation.

Facilitator: Kim Langton, Director and Managing Partner, Chameleon Associates (Australia) Pty Ltd

Workshop Schedule

8:00 8:30     Registration / Coffee and light refreshments

8:30 8:45     Introduction to the workshop

8:45 9:45     The Nature of the Terrorist Threat

9:45 10:45   Means of Aggression

10:45 11:00 Morning break

11:00 12:15 Introduction to Predictive Profiling

12:15 1:15   Lunch Break

1:15 2:15
   Suicide Bombers characteristics, mitigation, conclusions

2:15 3:15    Introduction to Security Questioning

3:15 3:30    Afternoon Break

3:30 4:00    Security Technology Limitations and Capabilities

4:00 4:30    The Cyclical Security Engineering Process

4:30 5:00    Conclusion on the Context of Threat Q&A

Document Actions


PRESS: Please note this will be a closed session conference. Media will not be allowed in the conference room.

Promote your organisation and increase exposure. Download your free Prospectus of our 2012 Security Events and discover our Exhibition and Sponsorship solutions

Register Online