We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.

IAHSS Conference

Tuesday, October 30, 2012 &
Wednesday, October 31, 2012

Presented by:

8:00 am - 12:00 noon
Jacob Javits Convention Center

The International Association for Healthcare Security & Safety (IAHSS) is thrilled to bring you back two days of intensive healthcare security education at ISC East. All courses in the program will qualify for CHPA recertification points.

Register Here

*Cost: $99 in advance; $125 on site
(100% of your ticket fee goes to IAHSS)


Mastering Solutions To Today’s Risks In Healthcare Security

October 30, 2012, 8:30 - 10:15 AM
Two Killed in Hospital Shooting! - A Model for Threat Awareness and Management in Health Care

Targeted violence can be viewed as separate and distinct from the aggressive behaviour we manage, usually from our patients, on a daily basis in all of our health care facilities. Incidents where both the perpetrator and target(s) are identified or identifiable prior to the incident are occurring with alarming frequency in our health authorities, sometimes with deadly results. Using defined threat management strategies and protective intelligence we can effectively identify, assess, and manage these very real and increasing threats safely and protect the health care milieu from these tragic incidences of workplace violence. The session will introduce practical tools and strategies based on current methodologies and will focus on; "Why People Threaten", "Sudden and Predatory Violence", "Threat Management Strategies" and "Introducing a Threat Management Program".

Speaker:

  • Greg Conlan, Director Operations Integrated Protection Services, Fraser Health Authority
October 30, 2012, 10:30 - 11:45 AM
Security; When Grandma Can't Come Home

Security in Long Term Care and how it differs from Hospitals will be presented, including not only the security aspect but the role that it takes in safety.  Solutions, both technological and operational will be analyzed and discussed.

Speaker:

  • Frank Taormina, FJT Security & Safety Solutions
October 31, 2012, 8:30 - 9:30 AM
Mass Notification Systems and Application for Risk Reduction

Understanding Emergency Communication Systems and Risk Analysis -
This presentation will discuss the paradigm shift in the fire protection and security industry, and define what drives the installation of an emergency communication system (ECS) or a mass notification system. You will learn about ECS planning and risk analysis, and what you need to know to develop effective solutions for every application. Having a well thought-out and organized risk analysis will help you under the threats and ways to mitigate these threats to better prepare for emergency situations to communicate real-time instructions.

Speaker:

  • Jack Poole, Principal, Poole Fire Protection
October 31, 2012, 9:30 - 10:45 AM
Drug Diversion- A Collaborative Process-driven Approach to Managing Diversion in the Healthcare Setting

This presentation will provide the statistical information of drug abuse in the healthcare setting and the most commonly diverted prescription medications. It will offer guidance on how to create drug diversion policies, diversion investigation teams, and how to effectively develop monitoring methods within the healthcare environment. The presentation will also include interviewing processes as well as video demonstrations of actual diversion interviews with suspects.

Speakers:

  • Andrew Corsaro, C-Cure RX, LLC
  • Steve Carlson, C-Cure RX, LLC
October 31, 2012, 11:00 - 12:00 PM
OSINT Online - Are You Aware of the New Mediums for Investigations?

Open sources go far beyond what is available in Google and Facebook, as well as other popular sites. This session will look beyond the obvious services into social networks and similar media to locate assets, discover leaks, protect reputations, track down anonymous users and expand the arsenal of resources available but unknown to the Security Professional. In addition, we’ll discuss the obvious pitfalls that most Security Professionals fall into when investigating in these new mediums. What are they missing, where are they exposing themselves and how to investigate discreetly online, are three major themes while we expose the sources.

Speaker:

  • Cynthia Hetherington, President Hetherington Group