This message was sent to ##Email##
|
May 3, 2017 |
| | | |
|
|
|
IAPSC
From the interactive educational sessions to the business connections to the exhibit hall of top industry vendors, this year’s IAPSC conference for security consultants is not to be missed.
Not yet registered? That’s OK! Online registration will be open until Thursday (Save $100 off the full conference with promo code “Security2017”). On-site registration will also be available beginning this Sunday, May 7 at 10:00 a.m. the Sheraton Austin Hotel at the Capitol. Single Day Monday and Off-site Tour registration options are also available. Learn more.
IAPSC
Les Nichols is an expert in developing child protection programs within youth-serving organizations and out-of-school time programs. For 22 years, he served as the lead youth safety and facility expert for Boys & Girls Clubs of America (BGCA), one of the nation’s largest, facility-based youth-serving organizations. BGCA serves approximately four million youth at 4,000 sites in all 50 states and on overseas military bases, college campuses, Native American lands, camps, public housing, recreation facilities, community centers, churches and schools.
READ MORE
Promoted by
|
|
|
 |
IAPSC
This is a reminder that the IAPSC Annual Members Business Meeting will be held during the Conference from 8:00 – 8:45 a.m. at the Sheraton Austin Hotel at the Capitol, 701 East 11th Street, Austin, TX 78701. The agenda will include the election of the IAPSC Board of Directors and Officers and recognition of the new IAPSC members in attendance.
IAPSC
Mark your calendars for the next date of this popular seminar: Sunday, September 24, 2017 in Dallas, TX, prior to the ASIS 2017 Seminar & Exhibits.
This unique, one-day intensive program will show you how launch a new security consultant practice or jump-start an existing one. Learn from a faculty of seasoned consultants how to develop and market yourself as a security consultant and how to avoid the expensive mistakes that can sabotage your success. The program is filled with practical information that will save you time, money, and frustration. Take home a comprehensive workbook of sample proposals and reports that give you a clear advantage when competing for a security consulting assignment.
 |
|
HID Global® is the leading provider of products and services that help organizations manage secure identities. Visit our Consultant Corner to join our growing community. MORE
|
|
IAPSC
Fri., May 19 @ 9 a.m. PDT — Forensics and Security Management
Fri., June 16 @ 9 a.m. PDT — Security Design and Engineering
Fri., July 21 @ 9 a.m. PDT — Cybersecurity
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges, and trends in the industry. It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
Content provided by IAPSC Platinum Sponsor, Boon Edam
Not all physical security entrances are created equal. In fact, their capabilities vary greatly, and therefore, impact an organization’s overall anti-tailgating strategy differently in terms of capital outlay, manpower needed, annual operating costs, ROI, and user education and preparation. We’ve identified four security entrance capability levels based on each product’s working principle. You can think of a capability level as a goal: Does your client want to detect tailgating or prevent it from happening altogether? Download our whitepaper so that you can truly consult your clients on the best entrance for their unique security goals.
READ MORE
WIRED
The Charter of the National Security Agency limits its powerful surveillance to the rest of the world, not U.S. citizens. But one controversial carve-out in NSA rules has for years allowed it to vacuum up communications that aren’t “to” or “from” a foreign target, but merely “about” one—no matter who sends or receives it. Now the NSA says it will end that practice. And in doing so, it concedes a significant win to the privacy advocates who have fought it for years.
READ MORE
The Wall Street Journal
The North Atlantic Treaty Organization is considering appointing a senior official to oversee counterterrorism efforts, a move aimed at meeting one of President Donald Trump’s demands that the alliance focus more on terror threats.
The proposal is similar to NATO’s recent decision to create a top intelligence post, a move that Trump has repeatedly praised.
READ MORE
NextGov
President Donald Trump wants to modernize the federal government’s aging IT systems and the digital services they provide citizens, and he’s established a council of agency heads and federal executives to help him do it.
An executive order signed Monday establishes the American Technology Council to “coordinate the vision, strategy and direction” of IT across government and provide advice regarding its use.
READ MORE
CIO
Cybersecurity and privacy continue to make headlines. Experts have more questions than answers addressing risk management concerns in the evolving cybersecurity market. On March 7, 2017, the CIA got doxed by the anti-secrecy organization WikiLeaks. Nearly 9,000 documents appeared online showing the CIA sought to observe conversations, online browsing habits and other activities by infiltrating the systems that contained them, such as Apple and Android smartphones, laptops, TVs and even cars. The government is not alone.
READ MORE
InfoWorld
Security threats are constantly evolving, but as Verizon's latest Data Breach Investigations Report shows, the more things change in information security, the more they stay the same.
More than half (51 percent) of the data breaches analyzed in the report involved malware, 73 percent of the breaches were financially motivated, and 75 percent of security incidents were tracked back to outside actors.
READ MORE
Government Technology
On a refreshingly sunny day in mid-April, government officials and data experts gathered at a newly renovated conference room at the University of Pittsburgh to discuss the city’s next catastrophic disaster.
The agenda that day addressed the potential for a dense yellow smog cloud to roll into Pittsburgh, as it did in in 1948 in Donora, a small mill town 24 miles southeast of Pittsburgh.
READ MORE
Security Info Watch
Cybersecurity is an ever-evolving game of cat and mouse between hackers and security professionals tasked with the responsibility of protecting information held in public and private networks alike. While there are a plethora of both well-established and startup companies that are churning out more advanced security products by the day as part of an effort to neutralize cyber criminals and the treasure trove of resources at their disposal, very few people stop to gauge what professional hackers themselves truly feel are the best security measures to have in place or which safeguards pose the most problems for them.
READ MORE
CNBC
The U.S. government's spy tools are being revealed.
Wikileaks continues to publish alleged CIA hacking techniques for smart devices, including smart TVs and smartphones. And recently a treasure trove of alleged hacking tools used by the NSA were leaked by hacking group, Shadow Brokers.
Experts say the leaks could open the door for cybercriminals to use the same tactics to target consumers
READ MORE
Government Technology
Wrightsville Beach is beefing up its surveillance capabilities with a plan to install more cameras watching over busy areas of the New Hanover County beach town.
Town Manager Tim Owens said the town is in the process of adding nine cameras at various locations, including two at Jack Parker Boulevard; one with four different angles at the intersection of Waynick Boulevard and Lumina Avenue; three at Town Hall; an additional point-zoom-tilt camera at Town Hall directed at the drawbridge; and two more on Raleigh Street.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|