How To Create The Defended Enterprise
Mike Smock
CEO: Distributed Security - Founder: Kingdom Defense - CBMC - Faith Based Security Network - Nehemiah 4:17 - KD9PWC
COMMAND SCHOOL - How To Create The Defended Enterprise
For Enterprise CEOs And Senior Managers
Online Seminar | 32 Hours | $1,895 | 06.28.21 | Register
In the immediate past, enterprise leadership delegated or outsourced physical security. As new and emerging threats confront corporate enterprises, senior leaders need to assume control of this vital function in order to properly secure life and property. Outsourcing, even delegating enterprise security is no longer advisable. DSI's Command School develops the knowledge necessary for senior leaders to assume command of their enterprise security.
- Command School is a 32-hour online seminar for CEOs and senior security managers designed to bridge that final, most crucial gap in corporate security which is the ability to mount an active defense against lethal threats. Command School provides the tools and training needed to not only defend the enterprise – but also extend these tools and training to the immediate community. Command School will teach you:How to develop and integrate an active defense component into your corporate security plan.
- How to recruit, screen, train, and operate a private security force composed of enterprise employees.
- How to build-out a distributed security network capable of defending your immediate community.
The online seminar is delivered via eight four-hour sessions over a four-week period. Seminar sessions are conducted on Monday and Wednesday evenings from 1800 to 2200 EST.
COMMAND SCHOOL - Creating The Defended Enterprise
Formats:
Command School is offered in three formats, on-site engagement, off-site seminar, and online seminar. The on-site engagement offers a tailored seminar for six participants from a single enterprise and is hosted by the engaging enterprise. The off-site seminar is a general offering open to all enterprises, is limited to 12 participants, and is hosted at a third-party meeting venue. The online seminar is conducted via remote learning tools. We are currently offering online seminars only.
Online Seminar summary:
- Cost: $1,895
- Duration: 32 Hours/4 Weeks
- Format: Online seminar/Engagement
- Location: Remote/Online
- Date: June 28, 2021
- Registration
Included in the seminar cost:
- 32 Hours. Thirty-two hours over four weeks.
- Presentation PDF. 500+ pages printed take-aways in a presentation binder.
- Courseware. 17 LMS (Learning Management Software) online modules.
- Training Plan. Interactive stand-up plan.
- One-year Membership. Lifetime membership to the DSI Online Defense Academy.
- Certificate Of Completion. Completion certificate.
Topics covered:
- Defended Enterprise. What is a defended enterprise? Historical context, strategic underpinnings, and current events demonstrating the need for the defended enterprise and the leveraged effectiveness of a Distributed Security Base and Distributed Security Network.
- Introduction to Security Analysis. Security for a private enterprise must be built on a solid foundation of analysis, conducted in five parts: Area Study, Site Survey, Threat Assessment, Asset Evaluation, and Vulnerability Assessment.
- Area Study. The first step in systematic security analysis is an Area Study, a collection and analysis of information on your surrounding area.
- Site Survey. A Site Survey is a detailed characterization of your site - your property, physical plant, on-site assets, personnel, and operations.
- Asset Evaluation. Asset Evaluation catalogs and characterizes persons, groups, enterprises, and agencies that can contribute to your security, but are beyond your direct control.
- Threat Assessment. Threat Assessment uses deductive analysis to list, characterize, and prioritize all potential threats to your site(s), personnel, and operations.
- The Private Security Force. A Defended Enterprise must recruit, train, organize and manage its Private Security Force, and support it with infrastructure, provisioning, and outsourcing.
- Communications. We identify communication challenges and solutions, both internal and external, that a defended enterprise will face before, during, and after a crisis.
- Task Catalog and METL. The Mission Essential Task List (METL) model is a powerful tool for codifying and assigning security procedures and responsibilities.
- Post-incident. In the immediate aftermath of a violent incident, it is necessary to secure the scene, treat the injured, communicate with inbound first responders, and link up safely and effectively with them.
- Sustainable Security. Severe or long-duration natural or man-made disasters present security challenges of an entirely different order.
- Plans and Procedures. Response plans and codified procedures are vital to the security of an enterprise, but we must also understand their limitations.
- Command and Control. Leaders and managers must understand and apply proven principles of command and control adapted to the unique circumstances of a Defended Enterprise in a domestic, peacetime environment.
- Decision Making and Problem-Solving in Crisis. Between the onset of a violent incident and effective intervention by first responders, a Defended Enterprise must rely upon rapid and effective decentralized decision making by security operators, leaders, and managers.
- Tactical Decision Games. A simple and adaptable method for practicing crisis decision making.
- Wargaming. A variety of leveraged tools for analysis, training, and validation.
- Vulnerability Assessment. Vulnerability Assessment uses a variety of interactive and analytical methods to pose potential threats against your security posture, testing effectiveness and identifying areas for improvement.
Command School is also recommended for the private security force team leaders who have completed DSI’s multi-tier operator training (Tiers 4, 3, and 2). The training prepares participants to meet the planning, organizing, problem-solving, decision-making, and leadership challenges inherent in standing up a private security force. The training addresses coordination with local officials, cooperating agencies and organizations, and opinion-makers; creation and validation of emergency response plans; and the details of recruiting, organizing, and leading a force or unit comprising multiple teams, individuals, and specialties. This is "community organizing" on a whole new level – building a sound basis for safety and security in an environment characterized by delayed, inadequate, or non-existent support from civil authorities as a result of natural disasters, civil unrest, or just the gradual decay of the social order.
INSTRUCTORS
Mike Smock is co-founder of Distributed Security, Inc, and co-developer of Command School. He has managed or consulted with enterprises operating in at-risk environments worldwide. Prior to co-founding the enterprise, he was managing director for a San Francisco-based strategy consultancy, and Chairman and CEO of an international contracting firm. In his early career, he spent 15 years in senior management positions with national and international enterprises, and was co-founder Dynaquest, an early artificial intelligence pioneer. He attended Michigan State University.
Bill Tallen is co-founder of Distributed Security, Inc. and co-developer of Command School. Prior to joining the enterprise, he had a 20-year career with the Department of Energy, where he served as a Federal Agent, team leader, unit commander, training instructor, and manager in the agency which provides secure transportation of nuclear weapons and nuclear materials within CONUS. He helped to found DOE's Special Response Force program, developing and teaching urban and close quarter battle techniques to Federal Agents charged with recovery of lost assets. He has designed and conducted a variety of wargaming efforts in support of vulnerability assessments, security system design, and leadership training, and has taught a variety of crisis decision making models. Bill holds the degree of Master of Arts in National Security and Strategic Studies from the U.S. Naval War College.
HOW TO REGISTER
Registration is limited.
To ensure that those training with you are persons of good ethical character, we require all applicants to provide one of the following forms of information. Should you not have any of these forms we can do a criminal background check for you.
- Evidence of no criminal history from a local law enforcement agency printed on official department letterhead, or a statement of good character from a local official; i.e. chief of Police, sheriff, District Attorney, Judge, etc.
- Evidence of current, active, full-line service with a public law enforcement agency, or with the United States Armed Forces.
- Form 4473 “Brady Check” (See the gun store that you purchased your handgun from for a copy.)
- If you have none of the above credentials we will need to run a criminal background check for you. You will be charged an additional non-refundable $20 for the background check.
Cancellations and refunds.
Once your deposit is processed then you are committed to the seminar. There are no refunds unless you do not pass the background check.
If you are unable to attend your scheduled date then you will be able to attend a future program date as long as:
- You cancel no later than 10 days prior to your program date.
- Future program dates are contingent upon space available.
- There is a $250 service charge per attendee for canceling and rebooking the program.
Distributed Security, Inc. is pioneering the development of distributed security networks and distributed security bases within private enterprise. Founded ten years ago, the company offers a full menu of security training options for private enterprise. Visit www.distributedsecurity.com for more information.