Jerry Smith is a malicious risks and crisis consultant specializing in leadership capability development and the management of threats from chemical, biological, radiological, nuclear and explosive materials. He consults for a variety of sectors, including the London insurance industry, blue chip companies, national governments, the United Nations and international nongovernmental organizations.
Jerry was the head of operations for the verification, disablement and initial removal of Syria’s declared chemical weapons’ arsenal. He was a senior advisor to the United Nations as well as negotiating and liaising with key interlocutors including national governments and armed opposition groups. As a director in international chemical watchdog the OPCW, he was in Syria when they were awarded the 2013 Nobel Peace Prize.
Smith has over 30 years’ experience of risk management, resilience and crisis response within the British Army, UK Civil Service and the United Nations, as well as the private sector. He has worked in over 40 countries on four continents, including operations in remote and non-permissive environments.
Smith holds an MBA and a BEng (Honors) from Cardiff University. He also holds a postgraduate diploma in weapon effects on structures and is a member of the Institute of Explosive Engineers. He is a visiting fellow at Cranfield University. Smith is an author, interviewee and consultant for BBC, CNN, CBS and SKY, as well as The Wall Street Journal, The Washington Post, Foreign Policy Magazine and The Guardian. In 2015, he was made OBE for services to international arms control and weapons of mass destruction counterproliferation.
Threats associated with acts of terrorism or criminality are of great concern for utilities, commercial buildings, infrastructure sites and campuses of all kinds. The assessment of threats and risks should be both very practical (establishing vulnerability and mitigation measures) and quantifiable. This session will look specifically at what data is actually available for professionals and end users to consider when setting guidelines for threat, risk and vulnerability assessments for specific sites in specific locations and how that data can be accessed and employed.