|This message contains images. If you don't see images, click here to view.|
Advertise in this news brief.
IAPSC welcomes new president
At the Annual Conference banquet on April 21, 2015 in Napa, California, IAPSC welcomed newly elected President Harold Gillens, PSP, CFC, CHS-III (left) and thanked outgoing President Frank Pisciotta, MPA, CSC (right) with a plaque recognizing his two years of excellent leadership of the Association.
| Share this article:
Call for IAPSC member comments — AG-01 CAD symbols
The comment period for the Architectural Graphics Standard – CAD Symbols for Security System Layout – Release 3.0 (AG-01) draft is now open. IAPSC members are invited to submit written comments, edits and updates may be submitted for review to Frank Pisciotta (firstname.lastname@example.org) by Friday, May 22 at 12 p.m. PST. Please note that the draft is not an exhaustive document. Formatting will be completed before the document is published.
Download the AG-01 Draft
IAPSC Successful Security Consulting Seminar at ASIS 2015
Early bird registration through May 31!
This popular, one-day intensive program presented by leading technical and management security consultants will show you how to develop, market and deliver security consultant services and how to avoid the costly mistakes that can sabotage the success of your clients’ or your own security program. The program is filled with practical information on just how to offer and deliver security consulting assignments starting with establishing your practice, finding clients, networking with other consultants, and executing security management and technical aspects of consulting from the initial consulting assignment through security assessments, designs and specifications, procurement, and implementation. A comprehensive workbook of sample proposals and reports will be provided each attendee. ASIS Seminar attendees who would potentially benefit from this course include:
Program # 1509-CONSU
- Security consultants
- System integrators
- Internal consultants (management & technical)
- Systems designers, specifiers, engineers & architects
- Security professionals (corporate and government)
- Law enforcement professionals
Save the date
IAPSC Annual Conference 2016 on April 17-20
Stadium security and safety gets continental look
The FIFA/CAF Regional Seminar for National Security Officers ended on a high note with participants hailing the importance of an opportunity to discuss issues of security and safety at the various stadia. The overall aim of the seminar was to provide assistance and equip the Security officers to handle related issues in their respective associations.
How retailers can protect against security breaches
When you swipe your card to pay at a store, how safe is your data? According to Symantec, the security of your data varies greatly depending on the sophistication of the payments system of the retailer you're visiting. Outdated point of sale systems are notoriously insecure and, according to Symantec, are particularly vulnerable due to a lack of encryption and reliance on outdated software. Symantec recently released its annual Security Threat Report, which unveiled shocking statistics about the state of security in retail.
9 steps to minimize violence in your workplace
Employers are beginning to realize that the violence isn't occurring solely on movie screens anymore, but also in unlikely places of business across the United States. As a result, employers are asking the obvious next question: "What can I do to protect my company and my employees?" Like workplace accidents involving machinery, injuries from workplace violence can be avoided (or at least severely limited) if some proactive measures are taken. Here are nine steps that are critical components of a successful workplace violence prevention program.
Biometrics a major part of personal security, expert says
The future of protecting personal and financial information may lie close to the human body. Specialists in the fields of biometric security and computer forensics say fingerprints, and retinal and iris scans are likely to become a regular component of "two-factor authentication" security systems in the years to come. "You think about it, it's a very secure future, right?" noted VLCM director of security Nate Stephenson. "Nobody can copy your finger. Nobody can copy your eye. Nobody can copy the veins and the heart rate that you have that’s unique to you."
Missed an issue of IAPSC News? Click here to visit the IAPSC News archive page.
Health care workplace violence injuries up from 2012-2014
From 2012 to 2014, workplace violence injury rates increased for all health care job classifications and nearly doubled for nurse assistants and nurses, according to data from the Occupational Health Safety Network. "The health care and social assistance sector accounts for the greatest proportion (20.7 percent) of private industry nonfatal occupational injuries among all sectors," write Ahmed E. Gomaa, M.D., from the Division of Surveillance, Hazard Evaluations and Field Studies, National Institute for Occupational Safety and Health, and colleagues in an article published in the April 24 issue of the Morbidity and Mortality Weekly Report. "The most common injuries are due to patient handling; slips, trips, and falls; and workplace violence."
Single-option lockdown response is a failure for school shootings
When drive-by drills, known as lockdown in most of the country, were widely used in response to school shootings with little or no adaptation of tactics, we began down a path that ultimately led to the tragic shooting at Sandy Hook that took 26 innocent lives. There were stops along the way in places called Columbine, Virginia Tech, Aurora and many others. These were all opportunities to learn that our model for response was at great risk from those who would seek to use our plan (or lack of plan) against us.
United will reward people who flag security flaws — sort of
United Airlines announced it's launching a bug bounty program inviting researchers to report bugs in its websites, apps and online portals. The announcement comes weeks after the airline kicked a security researcher off of one of its flights for tweeting about vulnerabilities in the Wi-Fi and entertainment networks of certain models of United planes made by Boeing and Airbus.
Top security tools in the fight against cybercrime
Cybercrime is a massive global threat, and U.S. businesses are the No.1 target. For tips and advice about how best to defend against cyberattacks, Network World asked security pros to name their No.1, most valuable security tool. Many of the experts we interviewed pointed out that there is no silver bullet when it comes to security.
Traditional security approaches produce too many false positives
According to 62 percent of IT professionals, traditional security approaches produce too many alerts and false positives for them to handle. This is among the findings of a new study from research firm Enterprise Management Associates (EMA), sponsored by machine learning and automation specialist Prelert, which shows that 25 percent of organizations know they experienced a breach or significant cyber attack that incurred loss last year.
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit
Esther Cho, Content Editor, 469.420.2671
International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
email@example.com | www.iapsc.org
Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.
This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!
May 5, 2015
April 21, 2015
April 7, 2015
March 24, 2015
7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063