Head of Security Service (1 module). Advanced training - course RUB 63,900. from Moscow Business School, training 40 academic hours, Date: January 22, 2024.
Miscellaneous / / December 02, 2023
Professional experience
2013 - present V. — Providing consulting services in the field of corporate security, risk management, asset protection and compliance
2004–2013 — Federal Security Service of Russia, head of the legal department
1985–2013 — Military service in military positions in the KGB of the USSR, FAPSI, FSO of Russia, Colonel of Justice
Professional competencies
Building a company's corporate security system
Management of legal risks, HR risks, security of remote work
Organization of the functioning of the company's security system
Increasing the efficiency of the company's corporate security system
Trade secret of a company, effective ways to protect it
Prevention of illegal actions on the part of employees. Staff motivation and loyalty
Confidential company records
Competitive intelligence, assessing the reliability of counterparties
Economic risk management, business intelligence, fraud, hostile takeover
Technical security of the company. Protection of information leakage channels, IT security, engineering and technical security
Legal protection of business, tax audits, GR management
Anti-terrorism security of objects, audit, organizational measures
Clients
Russian Pension Fund, Moscow Government, Russian Helicopters (Rostec State Corporation), RT-komplektimpeks LLC (Rostec), UEC-Saturn PJSC (Rostec State Corporation), VKO Almaz-Antey, JSC NovaWind (GK Rosatom), Center for Operation of Ground-Based Space Infrastructure Facilities (GC Roscosmos), VNIIEM (GC Roscosmos), PJSC Gazprom, PJSC NK Rosneft, PJSC Transneft, PJSC Novatek, OJSC Lukoil Overseas, LLC Lukoil-Perm, Transoil LLC, Norilsk Nickel PJSC, Ural Mining and Metallurgical Company PJSC, Bashkir Soda Company PJSC, Sterlitamak Soda Plant OJSC, KAMAZ PJSC, JSC "Bryansk Machine-Building Plant", PJSC "Ural Mining and Metallurgical Company", LLC "Udokan Copper", Confectionery Factory "Sladunitsa", AFK "Sistema", IFC "Binvest", Investment Fund "Solid", Management Company Metalloinvest, Urals Capital Financial and Industrial Group, Armadillo, Biotek, BTB (Safe Business Technologies), Belagro, Phosagro Group, Severnoe Domodedovo JSC, Aeroflot PJSC, FM Group Logistic", PJSC "MTS", PJSC "Megafon", GC "Systematics", LLC "Net By Net", OJSC "Nizhpharm", GC "Biotek", LLC "Medipal", AE "Elevel", Inventive retail group, JSC "Yulmart" ", GC "JTI", GC "Safe business technologies" and others
Teaching activities
Moscow State University (Higher School of Business), course “Corporate Security”
Russian Academy of National Economy and Public Administration under the President of the Russian Federation, MBA programs
State University of Management, MBA programs
All-Russian Academy of Foreign Trade, MBA programs
University of State and Municipal Administration, Head of the Department of Security
Author of seminars on business security issues at training centers and business schools FinCont, Academy information systems, Russian School of Management, Center for Professional Development "Profi Career", Russian Foundation for Educational programs "Economics and Management", Academy of Advanced Training, Institute of Economics, Management and Social Relations, Security 360 and others
Speeches and publications
Publications on the topics of security and information protection in the publishing house "Arsin"
Methodological manuals “Practical guide on information security of business activities”, “Practical recommendations on business security” (under the pseudonym Kazakov N. N.)
Article “Practical recommendations for preventing and resolving conflicts of interest” in the Security Director magazine (2021)
Methods for conducting a comprehensive security audit were created and implemented; methods for creating mechanisms for preventing and combating corruption at enterprises (anti-corruption compliance), corporate security standards
Education
1992–1997 — FSB Academy
1985–1989 — Higher Border Military-Political School of the KGB of the USSR
Day 1
Risk management techniques used in corporate security. Decision making under conditions of uncertainty
Company security policy. Risk forecasting. Legal protection as part of the security system
Review of international risk management standards. Basic provisions of GOST R 58771-2019 - “National Standard of the Russian Federation. Risk management. Risk assessment technologies”, as well as the requirements of international standards FERMA and COSO ERM Documents of the Bank of Russia on risk management in public joint-stock companies
Legislation of the Russian Federation in the field of corporate security and economic risk management
Types of economic risks. External and internal risks. Creation of a system for analyzing and managing economic risks. Audit of economic security and existing risk management system
Features of managing the economic risks of an enterprise under sanctions pressure, import substitution programs, during a special military operation, as well as during anti-crisis management. Adjusting the risk map when switching to remote (remote) work
Distribution of areas of responsibility between divisions of the enterprise (officials) for identifying, monitoring and managing economic risks. Risk Management Service (RMS) as a separate division of the enterprise. Risk owner concept
Creation of local legal acts of the enterprise on economic risk management. The procedure for drawing up an economic risk map
Forecasting a risk situation. Identification of sources of information that allow us to identify the causes of risk and its possible types. Identifying sources of risk. Identification of objects affected by one or another type of economic risk
Economic risk assessment. Application of statistical, expert and calculation-analytical methods of risk assessment. Determination of acceptable risk limits. The concept of risk appetite
Applied methods of economic risk management. Methods of minimization and methods of compensation of losses. Methods of anticipation and methods of risk avoidance. Localization methods and risk distribution methods. Monitoring the risk situation
Management risks and the danger of corporate conflicts in an enterprise. The reasons for their occurrence and the main methods of neutralization. Creating an organizationally protected business structure and ensuring the security of strategic decision-making
Types of risks and management features in the context of the activities of the Security Service
Main operational risks and risks of disruption of business process continuity. The impact of informatization and digital transformation of business processes on them
Risks of withdrawal or misuse of enterprise assets. Protecting tangible assets and ensuring the safety of inventory items. Enterprise territory security
Risks of disruption of the use of intangible assets. Obtaining patents and licenses. Copyright protection
Corruption risks and their minimization. Protection against corruption risks in enterprise business processes. The main provisions of the recommendations of the Ministry of Labor of the Russian Federation on the procedure for assessing corruption risks in an organization
Administrative and regulatory risks. Compliance function at the enterprise. GR as minimization of administrative risks. Building relationships with government agencies, public associations and political parties
Sanctions risks and risks of uncertainty. Adjustment of the enterprise’s economic risk map in the conditions of parallel import
Criminal legal risks for company officials. Protection of interests in relations with government regulatory and law enforcement agencies
Reputational (image) risks. Information and PR protection of enterprise activities. Countering black PR, information warfare and unfair competition
Risks of information security violations. Protecting confidential information in the enterprise
Technical and technological risks. Protection from terrorist attacks and other emergency situations. Risks of sabotage
Economic risks in civil legal relations. Formation of procedures for assessing the reliability of counterparties and the security of commercial offers
Risks of violation of labor legislation requirements. The concept of personnel security. Migration risks. Risk of worker mobilization. Personnel screening upon hiring. Risk management of non-labor relations with personnel (self-employed, freelancers, outstaffing, etc.)
Workshop “Analysis of cases on the development of security policy and practice of security behavior”
Day 2
Building corporate security. Security Service. Organizational and legal issues when protecting an enterprise
Modern approaches to corporate security
International acts in the field of corporate security. Legislation of the Russian Federation in the field of protection of business activities. Departmental, industry requirements and standards in the field of business protection
International experience and corporate standards for protecting companies from economic crimes
The concept of security in Russian business. Setting questions before creating a business protection system. Definition of objects of protection. Building a corporate security system. Security as a business function. Can security make money and be profitable?
Features of building corporate security in public companies, organizations with state participation, as well as in foreign companies
Features of building corporate security in ecosystems, holdings, as well as in organizations with a complex organizational (territorially divided) structure
Features of building corporate security in conditions of economic crisis and sanctions pressure. Carrying out anti-crisis measures. What you can and cannot save on
Features of building corporate security during remote (remote) work, as well as in the absence of a “security loop”
Features of building corporate security during a special military operation
Application of chaos theory in corporate security activities. Making management decisions under conditions of uncertainty
Risk-based approach to ensuring enterprise security. Economic, political, regulatory, legal, financial and other risks. Drawing up a risk map. Determination of acceptable risk limits and probability of occurrence. Construction of an economic risk management system. Risk insurance
Ensuring corporate security during the digital transformation of enterprise business processes. Ensuring the safety of making management decisions in conditions of information redundancy, its inaccuracy and unreliability
Diagnostics of enterprise security. Implementation of standards. Regulation
Methodology for conducting an enterprise security audit. Drawing up an audit plan based on a map of economic risks and the formation of threat models. Assessing the security of the business organizational structure and core business processes
Expert methods for assessing enterprise security. Assessing the uninterrupted functioning of the enterprise’s business processes in the event of emergency situations. Creating crisis plans. Availability of enterprise security monitoring;
Enterprise assets as the main object of protection. Tangible and intangible assets. Main directions of protection of inventory items. Protection of business reputation, image, technology and other intangible assets
The concept of compliance in legislation. Compliance as a function to ensure compliance of the organization’s activities with the requirements imposed on compliance with Russian and foreign legislation, risk assessment and provision of comprehensive protection organizations
Definition of subjects of corporate security. Your own security department or outsourcing services. Pros and cons of both options. Distribution of powers and areas of responsibility between security officers and other officials of the enterprise
The concept of personal safety. Internal security division, its tasks and functionality
Features of contractual relations with outsourcing organizations offering corporate security services. Interaction with lawyers, private security organizations, detectives and other organizations (persons with special status) when resolving corporate security issues
The legal side of the security unit's activities. Law and ethics at work. Subordination, financing and performance evaluation of the security unit. Interaction with shareholders, owners and heads of departments. Security division structure
Competencies and skills of a security specialist in demand in modern conditions
Corporate enterprise security standards (CES). Compatibility of KSB with other standards in force at the enterprise. Incorporating the business protection process into the business continuity management process
Development of local acts to ensure enterprise security (policies, instructions, regulations, etc.). Creation of employee behavior rules. Implementation of a safety culture at the enterprise
Training of personnel in the requirements of the KSB. Organization of interaction with contractors and business partners in connection with the implementation of the CSS. Compliance with safety requirements in contractual work and when interacting with government agencies
Workshop “Modern types of corporate fraud”
Day 3
Economic security. Organization of safe contract work. Security of procurement activities. Accounts receivable management
Security of contract work
The concept of “safe contractual work” at an enterprise based on the requirements of the Civil Code of the Russian Federation and other legislation
Organization of safe contractual work at the enterprise. Instructions for contract work. Centralization or delegation of authority. Internal approval procedures. Issuance of powers of attorney. Working with additional agreements
Distribution of areas of responsibility between departments and officials of the enterprise in contractual work. Competency Matrix
Informatization and digital transformation of business processes related to contractual work and transactions. Principles of Big Data in contract work. Application of elements of artificial intelligence when choosing a counterparty
Features of contractual work under conditions of sanctions pressure and uncertainty, as well as in the process of crisis management. Minimizing costs. Procurement security during remote (remote) work methods
Features of safe contract work during a special military operation
Types of risk when concluding various types of contracts (sale, provision of services, purchase, repair, construction, etc.)
Tax risks in contract work. The concept of “commercial prudence” in disputes with tax authorities. Requirements of regulatory legal acts of the Federal Tax Service of Russia for independent assessment of tax risks in transactions
Risk management in procurement activities. Legal expertise. Compliance risks. Anti-fraud
Risks of receiving low-quality goods and services in contractual relationships. Defining quality criteria and assessing the efficiency of spending money
Risks of overpricing in procurement activities. Pricing methods, as well as calculating the initial maximum price. The concept of "cost of ownership"
The concept of compliance risks in contractual work. Requirements of Russian and international legislation for minimizing compliance risks in contractual work;
Assessment of corruption risks in contract work. Requirements of the legislation of the Russian Federation for enterprises to take measures to prevent and combat corruption. Anti-corruption clauses in contracts;
Risks of affiliation of enterprise employees with counterparties. The concept of “conflict of interest” in contractual work. Information-analytical and psychological methods of identifying personal interest in a transaction. Basics of operational psychology
Risks of violating the requirements of antimonopoly legislation in contract work. The concept of unfair competition. Cartel conspiracy. Creation of antimonopoly compliance at the enterprise
Fraudulent risks in contract work. Fraudulent schemes used in civil law relations. Features of fraud in various types of business
Risks of information security violations in contract work. Confidentiality agreements. Protection of copyrights, protection of intellectual property and other intangible rights in relationships with contractors
Risks associated with compliance with the requirements of Federal Law No. 115-FZ. The concept of “suspicious transaction” in documents of the Central Bank and Rosfinmonitoring. Signs indicating an unusual nature of the transaction
Organization of competitive procurement at the enterprise. Basic requirements of federal laws No. 44-FZ and No. 223-FZ for safe contract work
Features of constructing safe contractual work when fulfilling a state defense order
Legal expertise as an element of safe contractual work. Tasks of legal expertise. Standardization of contract forms. Penalties for failure to comply with the terms of the contract. Typical pitfalls in the terms of the contract. The concept of force majeure
Countering kickbacks, illegal withdrawal of assets, commercial bribery and other illegal actions in contract work
Monitoring compliance with the terms of the contract
Organization of control over compliance with the terms of the contract as an element of safe contract work. Monitoring information on counterparties. Creation of algorithms for responding to counterparties’ failure to fulfill contractual obligations
Conducting effective claims work. Non-payment monitoring. Mediation as a way of pre-trial dispute resolution. Psychological, legal, image and other methods of influencing the debtor
Creation of effective internal control over contractual work at the enterprise. Internal control system according to the COSO model. Components according to the COSO model. "Magic Cube" COSO
System of internal audits, financial investigations and other procedures in contract work
Workshop “Analysis of cases on various types of risks arising when concluding a contract”
Day 4
Economic security. Competitive intelligence. Assessing the reliability of the counterparty and the security of commercial offers
Information and analytical work. Threat Assessment
Construction of information and analytical work at the enterprise. The concept of “competitive intelligence”, its goals, objectives and directions. What is OSINT? Legal cover for conducting competitive intelligence. Ethical Information Gathering
Adjustment of methods for assessing the reliability of a counterparty in the context of the economic crisis and sanctions pressure in 2022-2023. Assessing the counterparty's ability to operate under conditions of uncertainty. Trends in 2023 related to the closure and restriction of access to information
Adjustment of criteria for assessing counterparties in the context of a special military operation. Assessing the reliability of counterparties working on parallel imports. Trends for 2023
Methods of collecting information. Classification and evaluation of information. Making management decisions in conditions of information redundancy, its inaccuracy and unreliability. Operating principles of Big Data. Application of elements of artificial intelligence in competitive intelligence
Methods and technologies of competitive intelligence. Innovative technologies and non-technical means
Stages of competitive intelligence. Systematization of work on collecting information about the counterparty. Automation and digital transformation of the process of collecting and analyzing information
Subjects of competitive intelligence. Outsourcing of information and analytical services. Obtaining information from detectives, lawyers, journalists, etc.
Overview of the main government information resources and procedures for working with them
Documents and information provided by the counterparty. Obtaining information from the organization's website
Processing of unofficial information. “Gray” databases of legal entities and individuals. Using the resources of the invisible part of the Internet for competitive intelligence
Features of obtaining information on individuals. Changes in legislation on the processing of personal data that came into force in 2022-2023. Features of the processing of personal data authorized by the subject of personal data for distribution. Cross-border transfer of personal data from March 1, 2023
The concept of “digital footprint of an individual”. Collection of information about individuals on social networks
Review of international information resources for collecting and analyzing information on foreign counterparties
Obtaining information using “operational methods”. Using social engineering methods to obtain information. Human motivation to transmit information. Visual observation, inspection of premises and terrain
Methods of information analysis. Analysis of the competitive environment. Algorithm for determining the reliability of counterparties. Risk-based approach to assessing the reliability of an organization. The concept of “Due Diligence” in legislation
Review of the main information and analytical systems (products) used in competitive intelligence. Formation of corporate databases
Evaluation of the constituent documents of the counterparty. Analysis of attributes and corporate identity. Assessing the possibility of crisis situations. Application of empirical laws in practice
Financial analysis of the counterparty’s accounting documents in order to determine the economic stability and solvency of the organization. Assessing the reliability of the counterparty in the conditions of anti-crisis management
Assessing the reliability of counterparties. Commercial security of enterprises. Impact of sanctions
Assessment of the counterparty from the position of tax risks. The concept of “due diligence and caution” in relationships with counterparties
Assessing the counterparty from the perspective of corruption risks. Calculation of affiliations and conflicts of interest. Anti-corruption clauses in the text of the contract. Compliance procedures
Analysis of the counterparty from the perspective of administrative capabilities and regulatory risks
Assessment of the counterparty from the perspective of fraudulent risks and withdrawal of assets. The risk of concluding an “unnecessary contract”. Assessment of the economic feasibility of the contract
Assessment of the counterparty from the perspective of compliance with the requirements of antimonopoly legislation. Antimonopoly compliance in legislation. Selection of counterparties based on competitive procedures. The concept of cartel and restriction of competition
Assessing the counterparty from the perspective of sanctions risks. Information resources allowing you to assess the sanctions consequences of the transaction
Analysis of the counterparty and the transaction from the perspective of the requirements of the Central Bank and Rosfinmonitoring. The concept of “suspicious transaction” in the provisions of Federal Law 115-FZ
Security analysis of commercial proposals and contracts. Study of the project initiators, their interests and business reputation. Verification of representatives. Studying the mechanism for making a profit. Analysis of the first contact.
Behavioral aspects when identifying an unreliable partner
Analysis of the contract. Assessment of pricing, quality control, confidentiality, penalties and other contract terms
Recommendations for the preparation of analytical certificates and reports based on the results of assessing the reliability of counterparties and the security of commercial proposals
Workshop “Application of new technologies for verification of counterparties”
Day 5
Anti-terrorist protection of objects and territories. Protection of critical facilities. Engineering and technical safety
Terrorist threats: levels of danger, response and preparedness. Legal Compliance
Legislation of the Russian Federation in the field of countering terrorism. The main provisions of the Federal Law of March 6, 2006 N 35-FZ “On Countering Terrorism”. Counter terrorism concept
The concept of cyber terrorism. The main provisions of the Federal Law of July 26, 2017 No. 187-FZ “On the security of critical information infrastructure of the Russian Federation", the requirements of decrees of the Government of the Russian Federation, orders of FSTEC and FSB to ensure it security
Levels of terrorist danger, providing for the adoption of additional measures to ensure the security of individuals, society and the state and the procedure for their introduction in the Russian Federation
The concepts of “response levels” and “readiness levels” introduced by the Decree of the President of the Russian Federation of October 19 2022 No. 757 on the basis of the Federal Law “On Martial Law” in connection with the conduct of a special military operations
Basic safety requirements for a critical facility. Form of a passport of a critically important facility and the procedure for filling it out
Planning anti-terrorist measures at enterprises. Basic requirements for anti-terrorism security of buildings and structures, including during their design
Determining the degree of threat and possible consequences of committing a terrorist attack. Formation of a model of a security violator of an object (territory)
The procedure for categorizing objects (territories) taking into account the degree of threat of a terrorist attack on it and the possible consequences of its commission. Changes in categorization procedures introduced by Decree of the Government of the Russian Federation dated March 5, 2022 No. 289. Determination of the initial data for assigning the appropriate category
Anti-terrorism measures. Site Safety Data Sheet
Determining the types of terrorist threats likely for a specific object (territory). Methods for identifying potentially hazardous areas and critical elements of an object (territory)
Organizational, engineering, technical, legal and other measures to create protection of objects (territories) from terrorist attacks. Forces and assets deployed to ensure anti-terrorism security
Implementation of access and intra-facility regimes at enterprises. Organizing security and ensuring security at facilities (territories) aimed at preventing unlawful entry
Measures to suppress attempts to commit a terrorist attack on objects (territories) and to minimize possible consequences, as well as eliminate the threat of a terrorist attack
Creation of organizational and administrative documents regulating the anti-terrorist protection of facilities. Formation of commissions and identification of responsible officials
Requirements for personnel ensuring anti-terrorist security of facilities (territories)
Facility safety data sheet. Form and procedure for filling it out. Approval, coordination and update deadlines
Protection of official information about the state of anti-terrorist protection of objects (territories)
Training and consulting enterprise employees on the rules of behavior in the event of threats or terrorist attacks. Practicing practical skills to act in emergency situations
Requirements for anti-terrorism protection of places where people gather in large numbers. Categorization of these places and drawing up a safety data sheet. Measures to ensure anti-terrorism protection of crowded places
Carrying out anti-terrorist measures. Interaction with law enforcement agencies
The procedure for carrying out anti-terrorist measures at hazardous production facilities
Features of anti-terrorist measures at various sites (territories). Security of fuel and energy complex facilities, facilities subject to protection by the Russian Guard, police, facilities administered by government agencies, etc.
Interaction of enterprise officials with government authorities, the National Anti-Terrorism Committee, as well as divisions of the FSB, the Ministry of Internal Affairs, the Ministry of Emergency Situations and other bodies and organizations for anti-terrorist measures carried out at the facilities (territories)
Determining the procedure for informing about the threat or commission of a terrorist attack on objects (territories) and the response of responsible officials to them
Organizing internal anti-terrorism control at enterprises, conducting internal audits and investigations into violations of anti-terrorism legislation
Conducting state control (supervision) over the anti-terrorist security of facilities
Legal liability for violation of requirements for anti-terrorist protection of an object (territory) or obstruction of a person’s activities in carrying out the duties assigned to him to fulfill the requirements anti-terrorism protection