This seminar is designed for human resource managers, payroll managers, benefits administrators, business owners and managers, directors, CEOs, CFOs, operations managers and accountants.
Monumental changes have occurred in the environment in which business managers and professionals find themselves. Survival requires exceptional knowledge of competitors and adequate protection of trade secrets and infrastructure. Large corporations have to operate their own corporate intelligence/security departments. This seminar is for managers and professionals who are new or unexposed to corporate intelligence/security.
This seminar will include:
• Learning How Competitive Intelligence (CI) And Competitive Security (CS) Are Used By World-Class Organizations
• Learning How To Protect And Defend Against Competitive Intelligence And Other Security Threats Conducted By Your Competition And Other Parties
• Seeing How CI Supports Strategic Planning, New Product Development, Sales And Marketing Success And Security
• Learning Competitive Security Insights Every Workplace Survivor Should Possess
8:30 a.m. - 10:20 a.m.
I. What Is Competitive Intelligence?
1. History Of Competitive Intelligence (CI)
2. The CI Cycle
3. Strategic versus Tactical Intelligence
B. Collection Methodology And Techniques
1. Human Services
2. Document Services
3. Intelligence Within Your Own Enterprise
C. Analysis: Giving Meaning To Information
1. Future Scenario Planning
2. Implications And Situation Analysis
3. Competitor Profiling
4. Sales And Marketing Applications
a. Sell Against Strategy
b. Walletshare And Cross Marketing
c. Product Marketing Involvement For Next General Product Development
5. SWOT And SPACE Analysis
6. Financial Metrics
7. Vendor Analysis
8. Partner Analysis
9. Competitive Benchmarking
D. Completing The Intelligence Cycle
1. Continuous Feedback
2. Key Intelligence Topics
3. Early Warning
4. Current Awareness
10:20 a.m. - 10:30 a.m.
10:30 a.m. - 12:00 p.m.
II. What Is Competitive Security?
A. Identification And Mitigation Against Threats
1. Theft Of Trade Secrets
2. Subversion Of Infrastructure
3. Deliberate Or Accidental Misinformation
B. Recognition Of Potential Sources Of Threats
1. Co-Workers Competing For Jobs
2. Departments Competing For Budgetary Dollars
3. Companies Competing For Market Advantage
4. Foreign Governments/ Companies
C. Targeting Possible Means Of Compromised Security
1. Uninformed Or Inappropriate Use Of Security
4. Poor Information Security Procedures
6. Recruited Spies
7. Physical Penetration Of The Site
8. Computer System Penetration
D. Security Damage Assessments Metrics
1. Lives Lost
2. Physical Damage Incurred
3. Assets Lost Or Impaired
4. Markets Lost
E. Appropriate Appreciation Of Requirements Set Forth By Laws/Regulations And Directives Like:
1. PD-63 Addressing Privacy, Cybercrime And Terrorism
2. Health Insurance Portability And Accountability Act (HIPAA)
3. Gramm Leach Bliley Act
4. The Economic Espionage Act
5. The National Infrastructure Protection Act (That’s Only The Beginning)
12:00 p.m. - 1:00 p.m.
Lunch (On Your Own)
1:00 p.m. - 2:50 p.m.
III. Competitive Security Infrastructure And
A. Ranking And Definition Of Security Threats
1. Asset Protection
2. Maintenance Of Trade Secrets
3. Physical Security
B. Creation Of Corporate Security Assets
1. Chief Risk Officer With Sarbanes-Oxley Responsibilities
2. Executive Risk Council (To Identify Strategies And Compliance From Cross- Functional View)
3. Techniques For Prevention Of Panic
4. Maintaining Balance Between Security And Free/Open Environment
2:50 p.m. - 3:00 p.m.
3:00 p.m. - 4:30 p.m.
IV. Ethics And Components Of A Solid
System For Competitive Intelligence
A. Intelligence Infrastructure And Tools
1. Relationship With Knowledge Management
2. Software Applications
3. Budgets And Headcount
B. Counterintelligence: Protecting Your Company
1. Vulnerability Analysis
2. Creating Awareness To Prevent CI
C. Ethics And The Law
D. Insights On CI In Asia, Latin America, Europe And Corporate America