|This message contains images. If you don't see images, click here to view.|
Advertise in this news brief.
IAPSC Annual Conference 2015 — Register & Book Your Room Today!
Join your IAPSC colleagues for the IAPSC Annual Conference 2015, Old Growth vs. New Growth — the Future of Consulting, April 19-22 in Napa, California!
The 2015 program is built to provide you with the tools and knowledge to keep you at the forefront of the industry now and in the future. Sessions cover a range of topics including: cultural site security, security risks associated with infectious disease, terrorism and national security, college campus security, social media marketing, customer retention, and drone security. In addition, four sessions will feature case studies and real world applications of technical security solutions revolving around VMS, smart buildings and access control.
Book Your Rooms by March 27!
- The Role of Compliance presented by Joe McDonald, Chief Security Officer, SUPERNAP
- Keeping Your Customers for Life, presented by Joe Diliberto, Owner, Sandler Training
- Security Risks Involved with Ebola and Other Infectious Disease, presented by Christian Sandrock, M.D., MPH, FCCP, UC Davis School of Medicine - A leading expert in disaster preparedness for health care professionals and facilities.
- Opportunities in Drone Security, presented by Jim Hill, President and CEO, AirCover Integrated Solutions Corp.
The cut-off date to book your room at the IAPSC discounted rate is March 27. Book your room online today before they sell out!
View the Program
Visit the Conference Website
| Share this article:
Member Colin Braziel meets Her Majesty Queen Elizabeth
On Wednesday, March 18, IAPSC Member Colin Braziel, FSyl, FRSA, attended the reception for the 50th Anniversary of the Winston Churchill Memorial Trust held at Buckingham Palace and met Her Majesty Queen Elizabeth.
Welcome New IAPSC Members
James Francis, CPP, CFSO
President & Chief Consultant, LFJ Consulting Services LLC — Round Rock, TX
Mr. Francis' extensive experience in the security profession spans both government and industry. He has over 35 years of diverse experience in the areas of audio countermeasures, facility vulnerability analysis, Crime Prevention Through Environmental Design (CPTED), distinguished person protection, counter-terrorism, high-threat environment security, facility planning, guard force management, strike contingency planning, emergency management, information security, and security management system development.
Don Oxman, CISSP, CISM
President, The Oxman Group LLC — Fort Worth, TX
Mr. Oxman is well-versed in the implementation and support of security and networking technologies. He has designed and implemented secure networks for government, banks, and real estate. Founded in 2007, his IT security consulting company The Oxman Group, provides information security leadership, security assessments, data forensics, electronic surveillance detection, and security monitoring services.
Sean Ahrens, CPP, BSCP, CSC
Global Practice Leader/Manager of Security Consulting & Design, AON Global Risk Consulting — Lincolnshire, IL
Mr. Ahrens is a corporate security executive with over 20 years of management experience that includes executive leadership positions and a global network of security resources. He has a track record of creating and implementing turnkey security solutions for a broad range of companies in the U.S. and internationally. Within Aon, Mr. Ahrens directs the entire security consulting practice.
ISC West: Free Exhibit Hall pass for members
On behalf of ISC and SIA, we'd like to invite you to join us at ISC West 2015 at the Sands Expo in Las Vegas. The Exhibit Hall will be open April 15-17 and SIA Educational sessions will be April 14-16. ISC West allows you to: kick off your strategic planning for the year, explore over 1,000 exhibitors and brands and stay connected to your colleagues through exclusive networking. IAPSC Members: Contact us to claim your FREE Executive’s Club and Exhibit Hall Registration.
Upcoming IAPSC 'Successful Security Consulting' programs
This popular, one-day intensive seminar will show you how to develop, market and deliver security consultant services effectively. Learn how to avoid the costly mistakes that can sabotage the success of your security program.
April 14 at ISC West — Sans Expo, Las Vegas, NV
Sept. 27 at ASIS 2015 (Save the Date) – Anaheim, CA
CISA security bill: An F for security but an A+ for spying
When the Senate Intelligence Committee passed the Cybersecurity Information Sharing Act by a vote of 14 to 1, committee chairman Senator Richard Burr argued that it successfully balanced security and privacy. Fifteen new amendments to the bill, he said, were designed to protect internet users' personal information while enabling new ways for companies and federal agencies to coordinate responses to cyberattacks. But critics within the security and privacy communities still have two fundamental problems with the legislation.
Government report blasts IRS security, former employees still access taxpayer data
The IRS is failing to secure its massive computer systems, leaving private taxpayer data vulnerable to fraudsters and hackers, a new report from the Government Accountability Office reveals. The report evaluates IRS security and cites significant deficiencies in its financial reporting systems. It comes as worrisome news for millions of Americans who are legally required to file taxes but may be fearful about fraud.
Homeland Security watchdog says TSA let known felon use expedited airport security lane
The Associated Press via U.S. News and World Report
A convicted felon and former member of a domestic terrorist organization was allowed to pass through an expedited security line designed for passengers who are not considered a security threat, the Homeland Security Department's internal watchdog said. The DHS Inspector General's Office said in a statement that the passenger had not registered for the Transportation Security Administration's PreCheck program but was selected for the expedited screening through the Secure Flight program's risk assessment rules.
CIO survival guide: How to respond to 5 game-changing disasters
Disasters are inevitable and no amount of planning will account for every possible scenario, and that's why improvisation skills are so valuable. Being able to improvise comes from experience and knowing not to panic. We can't help you with the latter, and there is no true replacement for experience, but sometimes just being exposed to a few good ideas is enough to get a head start for when things do go awry.
Preparing for the unthinkable: Violence in the workplace
We don't like to talk about it. We don't even want to think about it. But we're bombarded with media stories about violence in the workplace, and we need to be prepared, just in case. Here are some tips for dealing with the possibility of violence, along with some training guidelines that incorporate the need for all employees to share responsibility for maintaining a violence-free workplace.
Missed an issue of IAPSC News? Click here to visit the IAPSC News archive page.
Study reveals potential gaps in school safety
Security Info Watch
According to the results of the 2014 Student Safety Survey conducted by Awareity, provider of the TIPS risk management and prevention platform, there is an alarming disconnect between the threats students say they are aware of in schools and what administrators and security personnel are doing to actually address potential problems. The survey, which collected responses from nearly 6,500 K-12 students in 14 states as well as Canada, found that 34 percent students are aware of someone who may pose a risk to other students or the school itself.
Home devices threaten enterprise data security, warn researchers
Poor or lacking security on millions of ADSL routers and other devices used by teleworkers represents a threat to global enterprise information security, researchers have warned. Unscrupulous Internet service providers distribute routers that often have several security vulnerabilities, Cisco consultants Kyle Lovett and Dor Tumarkin told the CrestCon & IISP Congress 2015 in London.
Medical data has become the next cybersecurity target
Hackers often carry out massive cyberattacks to gain access to financial data throughbanks and retail companies, but a recent cybercrime hit a seemingly new target: medical data, taken from the health insurance company Premera Blue Cross. The attack affected 11 million patients, making it the largest cyberattack involving medical information to date. The health care industry has been catching hackers' attention lately.
Microsoft to add 'enterprise grade' biometric security to Windows 10
For years, biometric authentication has been a sci-fi staple. Bits and pieces of biometric technology already exist in popular technology, most notably the TouchID fingerprint sensors used on late-model iPhones and iPads. With Windows 10, coming later this fall, Microsoft plans to go big with biometric technology. The new OS will introduce system support for biometric authentication, the company says, "using your face, iris, or fingerprint to unlock your devices ... with technology that is much safer than traditional passwords."
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit
Esther Cho, Content Editor, 469.420.2671
International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
email@example.com | www.iapsc.org
Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.
This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!
March 10, 2015
Feb. 24, 2015
Feb. 10, 2015
Jan. 27, 2015
7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063