Conference Sessions

Free Conference Sessions

As of May 1, 2020, subject to change.

Presenter: Paul Sun, President/CE, IronYun
Session Sponsored by Illinois Association of Security Professionals
In this talk, we will discuss the next generation of AI deep learning video analytics and its applications in the law enforcement, physical security and access control industry. Some of the questions we will discuss are:

  • AI deep learning analytics enables the video security cameras to generate real-time alerts with unprecedented accuracy. As the next generation AI system scales up, how would AI deep learning analytics impact network bandwidth, storage capacity, etc. ?
  • Are AI deep learning being over hyped?
  • What are the “real” solutions that AI can bring to bear?
  • What applications are suited for AI?
  • What’s real, what's not?
  • How can AI assist in early active shooter detection and alert?
  • Why AI technology is a game changer for the security industry?

Learning Objectives:
Attendees of this session will learn the latest AI deep learning trends and solutions that can impact day-to-day tasks to improve law enforcement functions.

We will also provide live demo of license plate reader, face search, early warning active shooter detection, intrusion detection, weapons detection using AI video surveillance systems.

Presenter: Dave Beeman, VP, Andy Frain Services, Inc.

To safeguard people and property, many organizations are implementing security screening programs to find prohibited, illegal, stolen or dangerous items. The screening techniques and methods include metal detection, physical search (e.g. bag or package, pat-down, vehicle), trace detection, and x-ray technology. However, unless properly planned and implemented, these security screening programs may not be effective and, in some cases, may expose the organization to additional liability. This presentation will provide security practitioners guidance for implementing and managing an effective security screening program. Included will be SAFETY Act Certified considerations for selecting the appropriate screening methods and equipment, communicating the screening process, screening area design and staffing, record keeping and employee training, certification, and testing.

Learning Objectives:

  1. Attendees will understand the basic principles of an effective security screening program and can apply those principles to plan, design and implement an effective security screening program of their own, or if they already have a screening program in place, apply them to assessing the effectiveness of their existing program.
  2. Attendees will understand the basic security screening methods, considerations for selecting the security screening equipment most appropriate for their organization, and be able to apply them to the selection of methods and/or equipment and to the management of their program.

Presenter: Sev Meneshian, CFP® President, Public Retirement Planners, LLC

The Coronavirus caught most investors off guard and in the 1st quarter of 2020, the stock market dropped more than 30% as the world economy was forced to shut down to slow the spread. Was the panic selling in the first quarter of 2020 just a blip on the radar or is there more sharp selling to come? Did the coronavirus expose some other weakness in the economy? Was there another reason why stocks tumbled? During this session, you’ll learn what could be in store for investors in 2021 and 2022 and how to potentially profit in the years ahead.

Presenter: Sandra Stibbards, President/CEO, Camelot Investigations

All companies, agencies and individuals utilize the internet for research & open source investigations whether preparing for EP detail, conduct risk / threat assessments, due diligence on your client or target, auditing your business and employees. The highest priority is to secure your identity, maintain privacy, keep your system safe, & protect your information. Before maneuvering in and out of websites and databases, be sure you're not giving up everything about you and your business or providing vulnerabilities for easy access to your information. This session will offer resources, tools, downloads to help secure your identity, activity and information while online, teaching you to maneuver covertly. Bring your laptop or tablet for a hands-on experience.

Presenter: Cordelia Coppleson, Assistant Attorney General, Office of Illinois Attorney General

The Firearm Restraining Order (FRO) allows family/household members, and law enforcement to work with courts to temporarily remove guns and prevent the purchase of new guns by individuals who pose a significant risk of harm to themselves or others. The FRO is a civil procedure, not a criminal one. The goal is to ensure safety of the individual and those around them. This law enacted January 1st 2019, allows for Illinoisans to use Firearm Restraining Orders to prevent violence in their home and community. It provides family/household members and law enforcement to be proactive in addressing their concerns, by providing them a civil measure to prevent a person who is exhibiting dangerous behavior from legally accessing firearms. This class will review the law, how to obtain an order and how to best utilize this tool for helping people in crisis.

Presenter: Tim Perry, President, 10-41 Incorporated

Understanding our own Resilience Factor is key to managing thoughts, performance, and reducing anxiety. Resilience in leaders can be measured and improved by understanding your dominant Leadership Styles (LS), knowing your target Culture Climate (CC), and validating your Emotional Intelligence (EQ). In this session, you will assess your Resilience Factor so that you can become a more mindful leader for the organization.(NEMERT Approved)

Learning Objectives:
Learning is the key to growing. When we stop learning, we stop living. In our time together, you will understand, assess, and learn how to improve three critical areas that make a high impact leader in law enforcement:

  1. Six Dominant Leadership Styles (LS) and how each plays a factor in everyday living and crisis situations.
  2. Six Culture Climates that every leader must know currently and what they are trying to move to in order for the organization to be effective in command and control environments.
  3. Emotional Intelligence (EQ) is the understanding of Self-Awareness so that you can better grow your Self-Management, Social Awareness, and Relationship Management. The four factors will make or break a career. Understanding how to harness the value of EQ is a physical, intellectual, emotional, and spiritual factor in becoming an effective leader.

Presenter: Dr. Gene I Katz, Colorado Technical University

This session presents various action steps that have demonstrably been shown to reduce, and even prevent crime. Reflecting some of the major findings in the President's Task Force on 21st Century Policing, this workshop provides step by step details for a variety of simple, proven methods for how to utilize print and broadcast outlets, social media, and other internet venues, in order to enhance positive public perceptions of the police department.

In addition, I’ll identify some simple moves that police personnel can make to improve direct engagement and interactivity with civilians, as well as designs for creating successful civic events by collaborating with community organizations, including merchant groups, minority advocates, educational facilities, faith communities, and many others.

Learning Objective:

Teaches specific steps designed to improve communication, connection and trust between local law enforcement and the residents of the communities in which they serve, thereby enhancing civilian perceptions of policing, as well as mutual cooperation and trust.

Presenter: Anna Stratton, Bradford Systems Corporation

A two-part presentation outlining CJIS requirements for records processing and updating along with detailed information and breakdown of the multiple federal grant opportunities. Presentation includes NCHIP and NICS grants; who is eligible and what the grant opportunities cover. Additionally, learn who administers the grant in your state and how to connect with grant writers.

Each year over 30M+ grant dollars are left on the table because most law enforcement agencies are either unaware or are overwhelmed with the process.

Learning Objectives:

  • Understanding CJIS compliance requirements with records storage, digital conversion and maintenance of records including the benefits of information sharing.
  • Breakdown of the applicable federal grants, what's covered and how to obtain funding for special projects.

Presenter: Randy Brown, Code 3

New digital alerting technology helps agencies reduce collisions and officer fatalities.

Learning Objectives:

  1. Top causes of LODD (Line of Duty Deaths)
  2. New Digital technology solutions that help reduce collisions and LODDs related to vehicle accidents
  3. Present specific applications for Police and Emergency Vehicle applications

Presenter: John Chambers, AT&T

FirstNet is a dedicated broadband/mobility network for first responders and the companies that support them.

Learn about FirstNet and how all first responders and the organizations that support them can take full advantage.

Presenter: Dean Alexander, Professor, Western Illinois University

It is crucial that U.S. law enforcement appreciates the issue of family-affiliated extremism/terrorism and undertakes steps to undermine it. family terror networks are defined, highlighted as a growing facet of terrorism, and its importance is shared. Next, characteristics of family terror networks are explored. This will be followed by numerous and insightful case studies of U.S. and foreign-based, family-linked extremists/terrorists. Next, law enforcement responses family-linked violence will be shared.

Learning Objectives:

  1. Be Able to Define Family Terror Networks
  2. Discuss the frequency, importance, characteristics, and risks arising from family terror networks
  3. Share law enforcement responses to family terror networks

Presenter: Jeff Hammer, Macomb Police Department

This course is designed to provide information about ILEAP accreditation so Chiefs / Commanders can decide if ILEAP is right for their agency.

This course will cover the ILEAP process, fees, administrative work load, Power DMS and other topics. There will be ample time for question and answers.

Presenter: Samuel-Louis Bandy, Jr., Elsonore Security

CPTED: Crime Prevention Through Environmental Design.

This will be a brief history and review of the basic concepts of this alternative crime prevention strategy, as described by the late Tim Crowe and others. It will give the history of how this developed from the writings and strategies of many authors in the late 1960 through the 1970 era.

Learning Objective:

Upon completion, attendees will understand how this is an alternative strategy for use when traditional target hardening and fortressing are not possible or practical. In addition, attendees will also see how, when if target hardening and fortressing are used, CPTED can enhance the results if implemented correctly.

Presenter: Dean Alexander, Professor, Western Illinois University

Male incel doctrinaires, often radicalized and communicating online (e.g., Reddit, Facebook, and incel-oriented websites) lament their inability to develop a romantic relationship with a woman. This presentation will discuss the incel movement, their ideologies, what criminal acts they have undertaken, the threat they pose, and law enforcement responses.

Learning Objectives:

  1. Understand What is the Incel Movement
  2. Be Able to Describe the Ideologies and Activities Comprising the Incel Movement
  3. Be Able to Discuss the Nature of the Threat
  4. Be Able to Articulate Law Enforcement Responses

Presenter’s article on topic
Presenter’s bio

Presenter: Misty LaPerriere, National Law Enforcement Liaison & Trainer, Selah Freedom Foundation

Selah Freedom is a nonprofit organization with the mission to end sex trafficking and bring freedom to the exploited through four strong programs: Awareness, Prevention, Outreach and Residential.

Visit the Website

Presenter: Tami Wanless, DACRA Tech, LLC

As municipal enforcement practices evolve in many communities, the most frequent criticisms that arise are about the inconsistency within the systems. From enforcement practices and theories, to policies and procedures that guide the hearing and payment processes, too often the approach is dictated by individual department history as opposed to a well-thought out citywide approach.

Are all individuals with a violation of your municipal ordinances treated the same? Why does a parking citation get processed differently than a building code violation? Can I easily capture a full data picture of ordinance violations across the entire municipality, or just across a particular department? What inconsistencies lie in your municipal systems that are creating operational inefficiencies?

This presentation will address what Unified Administrative Adjudication looks like and what technical, policy, and ordinance provisions are necessary. You will leave this presentation with an understanding of how it can benefit your community by creating a culture of compliance while effectively recovering the costs of enforcement.

Learning Objectives:

  1. What is Unified Administrative Adjudication?
  2. What ordinance and Technical Provisions Are Required?
  3. How Will a Unified Administrative Adjudication System Benefit My Community?

Presenters: G. Michael Verden, The Lake Forest Group; John A. Gill, VidSys

Today’s security technologies have advanced to the point they can detect, deter, and disrupt an active shooter incident. However, technology by itself cannot optimize the capabilities required to respond to an event as serious as an armed intruder. Law enforcement and emergency personnel need to coordinate technical solutions with strategic planning including emergency management guidelines, properly trained personnel, and effective processes to successfully counter this type of attack—by using all the necessary resources, available tools, and holistic measures to survive an active shooter incident.

Two former United States Secret Service agents will explain and demonstrate current technology that can mitigate an active shooter incident by quickly analyzing and responding to available data to protect as many people as possible. When supported by strategic planning, such as an emergency management plan, this technology enables security personnel and first responders to resolve an emergency situation rapidly by coordinating with multiple sources, including: 1) collecting sensor data from multiple vantage points; 2) correlating that information efficiently; and 3) effectively disseminating and communicating those insights to responding parties.

Software tools are available that can identify unusual patterns of behavior by collecting data from disparate sensors, devices, systems, and subsystems, such as video analytics and acoustic detectors, and flagging them as potential risks. Law enforcement and security professionals assigned to an operations center or incident command post can then filter this data in order to better mitigate an active shooter event. First responders can use data, such as geographic information, to view a virtual map where an event is occurring while simultaneously monitoring patterns that allow better proactive and real-time emergency responses.

You can prepare for an active shooter with strategic planning by applying best practices in emergency management to all situations, planning specifically for each, and training your people in the proper response to all crises. As leaders, you can maximize the effectiveness of technology with clear, comprehensive, and detailed procedures and instructions tailored specifically to the circumstances of an active shooter incident in order to respond effectively, prevent injuries, save lives, minimize property damage, decrease liability, restore operations with minimal delay, and fulfill your commitment to protect your community.

Learning Objectives:

  • Know the appropriate response and notification protocols based on the security system alert (e.g., panic, video, acoustic) and how to coordinate effectively with incident stakeholders. Since most active shooters incidents are sudden, traumatic, and over in seconds, this knowledge can be the difference between tragedy and survival.
  • Understand emergency preparedness best practices, including command center operations, standard operating procedures, equipment training, virtual situational awareness, and preventative disciplines, such as automated detection devices, that they can apply to any emergency situation. .
  • Learn the five core areas of security technologies integration: collects, analyzes, verifies, resolves, and tracks information. This automated capability determines what data should be correlated and what should be filtered out based on time, location, duration, frequency and type.
  • Understand how software can be programmed to identify and present potential violent situations for the command center operator to evaluate in order to protect people and property. The command center operator views approved written operations and procedures that the system automatically provides on-screen so that the operator can ensure compliance and swift resolution to threats—accurately, efficiently, and consistently.
  • Review strategic and technical emergency management techniques such as the appropriate response based on the type of incident and the necessary communication capabilities to disseminate real-time information deemed critical during an emergency.

Presenter: Anastasios Goulos, PhD, Organizational Leadership, The Chicago School of Professional Psychology

This study is intended to present prior research on Employee Assistance Programs (EAPs) and how they increase employee satisfaction and contribute to the success of an organization.

While a great number of individuals seek counseling every year, it can be a difficult decision to make. The act of seeking help is often hindered by stigmatization and confidentiality as well as the myths regarding the EAP.

As it relates to this research topic of EAPs within the Public Sector, it was revealed that Law Enforcement Officers (LEOs) are known to be categorized in two factors that coincide with this profession as the following:

  • Superman Factor
  • Stigma Factor.

Superman factor suggests that LEOs do not want to be symbolized as weak-minded employees, as the Stigma factor is intrinsic to those who are fearful of others perception.

Recent Comments
    Archives
    Categories
    • No categories
    Recent Comments
      Latest Posts
      Event Search

      You should choose a search result page. You can choose the page from the Theme Options > Events > Event Search Results Page option.

      Ads