Hosted by: Abilene Christian University
Date: November 5, 2019
Time: 9:00 a.m. to 4:00 p.m.
Registration Required: Yes
Registration Deadline: CLOSED
Contact: Arthur Brant, 325-674-2930
Breakfast: Provided, 8:00-9:00 a.m. CST
Lunch: Provided, noon-1 p.m. CST
Refreshments: Provided during designated breaks throughout the day
Wifi: Guest Wireless Available
Abilene Regional Airport (ABI)
5.3 miles from the Abilene Christian University campus
Directions to Venue:
The Hunter Welcome Center is located on the east side of the Abilene Christian University campus. From the North, take Ambler Boulevard to ACU Drive and turn south into the Campus. Travel south down ACU Drive past the football stadium on the west and the baseball stadium and an apartment complex on the east. The Hunter Welcome Center is located on the east side of ACU Drive.From the East, take Judge Ely Boulevard and turn west onto Teague Boulevard. Travel west on Teague Boulevard, then turn north onto ACU Drive. The Hunter Welcome Center is located on the east side of ACU Drive.
- Rental Car
Free guest parking is available on the north side of the Hunter Welcome Center.
REN-ISAC is proud to offer six blended-threat, discussion-based workshops to the higher education community. Like last year, the workshop scenario is focused on physical security, with the subject of this year's scenario being a measles outbreak. There is also a significant cyber component impacting university data to emphasize an enterprise approach to risk management. The scenario for these workshops has been custom-made for REN-ISAC and offers a unique and realistic blend of physical and cyber threats for participants to consider. The workshops will be professionally facilitated. Each of the participants will receive a copy of the final report, and a summary report will be made available to the entire community.
All in higher education are welcome to attend, not just those from REN-ISAC member institutions. We expect exercise participants to represent health care, physical security, emergency management, information technology and security, and other subject matter experts.