This message was sent to ##Email##
|
June 13, 2017 |
| | | |
|
|
|
IAPSC
Michael Glasser is the Security Consulting Manager for LMC Consulting — Microsoft Global Security. In this role he manages and provides internal security consulting services for Microsoft. He is also an instructor in a course for the Metropolitan Burglar and Fire Alarm Association in New York. Michael holds the Certified Protection Professional, Certified Information Systems Security Professional, and Certified Security Project Manager designations. Learn more by visiting his IAPSC profile here.
IAPSC
The IAPSC Board of Directors is pleased to offer a sponsored insurance program for members through an agreement with The Mechanic Group, which offers General & Professional Liability and Errors & Omissions insurance coverage for Security Consultants. We invite you to check out the link below for more details about the coverage and to get a quote using the online application.
Members, log in and click here to learn more.
Promoted by
|
|
|
 |
IAPSC
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges and trends in the industry.
It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
 |
|
HID Global® is the leading provider of products and services that help organizations manage secure identities. Visit our Consultant Corner to join our growing community. MORE
|
|
IPASC
Our partners at the Security Industry Association (SIA) are updating the testing criteria for the Certified Security Project Manager (CSPM) credential, and they need your expertise and help.
With your experience in security project management, we are asking you to complete the SIA Job Task Analysis survey.
The Job Task Analysis defines the common duties of security project managers, and ensures that the SIA CSPM certification program matches the current job requirements and expertise required. This study of your duties has 12 questions and will take approximately 7 minutes.
Begin the Survey
IPASC
Registration is now open for this popular seminar: Sunday, September 24, 2017 in Dallas, TX, prior to the ASIS 2017 Seminar & Exhibits. This unique, one-day intensive program will show you how launch a new security consultant practice or jump-start an existing one. Learn from a faculty of seasoned consultants how to develop and market yourself as a security consultant and how to avoid the expensive mistakes that can sabotage your success. The program is filled with practical information that will save you time, money, and frustration. Take home a comprehensive workbook of sample proposals and reports that give you a clear advantage when competing for a security consulting assignment. Register Now.
Business Insider
Three terrorists drove a white rental van to London Bridge and began mowing down pedestrians. They proceeded to a nearby market to continue their attack with knives while wearing fake explosive vests to add to the fear and chaos. As the investigation into this horrific crime continues in Britain, here across the pond, the London Bridge attack occasions a fresh examination of the United States' approach to the war on terror: Is what we're doing working? Does it keep us safe? Is our counter-terror strategy effectively defensive?
READ MORE
The Hill
Returning from his first energy summit with fellow G7 nations, Energy Secretary Rick Perry issued a memo expressing concern about the United States' diminishing use of antiquated "baseload" power plants, the centralized and often polluting system of power generation that had been used to deliver electricity to captive customers for more than a century.
READ MORE
Security Management
The European Union needs a strategy for addressing cybersecurity risks and empowering its digital security agency, according to a new report by a European think tank. The report, European cybersecurity police — Trends and prospects, by Iva Tasheva, a junior policy analyst at the European Policy Centre, found that recent cyberattacks, such as the WannaCry ransomware attack, are exploiting EU critical infrastructures' computer systems.
READ MORE
IT Pro
Talented people and proper processes are more important than technology when it comes to running a successful security operations center (SOC), delegates at Infosecurity Europe 2017 in London were told yesterday. Emma Smith, technology security director at Vodafone, said that organizations should not get "swept up" in the flood of tools hitting the market. She said that process, behavior and culture can deliver "more bang per buck" that technology ever could. Smith added that it was more important to "attract and retain the right people".
READ MORE
Security InfoWatch
Public agencies and businesses around the world are making cyber risk a top priority. Insuring companies against data breaches is becoming a huge industry even as its nascent role and impact in security operations continue to unfold. North American policyholders dominate the market, but Europe and Asia are expected to grow rapidly over the next five years due to new laws (e.g., EU data privacy regulations) and significant increases in targeted attacks like ransomware.
READ MORE
Security Magazine
Millennials like Snapchat, digital banking, online shopping, Whataburger, selfies and Robinhood, the app that lets you trade stocks without paying fees. They also prefer to support local, independent businesses, not global chains; and increasingly, they are living at home and delaying starting a family. And according to some reports, they also are not very loyal workers, and they demand more from their employers than other generations. A career in security is often the road less traveled, but that needs to change in order to ensure future success of the profession and industry.
READ MORE
Security InfoWatch
Vulnerabilities in software that automates everything from factories to traffic lights has become the nation's top cybersecurity threat, an agent on the FBI's Denver Cyber Task Force said recently in Colorado Springs. Supervisory control and data acquisition (SCADA) software is used to control — sometimes remotely — many types of devices in the energy, transportation, manufacturing and other industries and often is connected to sensors, valves, pumps, motors and other types of equipment to ensure safe operation, detect problems and maintain quality.
READ MORE
HIT Infrastructure
Healthcare organizations are still hesitant to migrate to cloud-based HIT infrastructure systems because of security concerns stemming from storing PHI in an off-premises location. The recent WannaCry ransomware attack reiterates that fear, which makes it important for entities to understand what cloud service providers can offer in the face of malware and DoS attacks.
READ MORE
Security Management
It took companies an average of 38 days to detect attackers responsible for data breaches between 2014 and 2016, according to a new report published Friday by the Aberdeen Group. "This means that in half of the successful data breaches, detection by the defenders took five to six weeks or less," the report said. "In the other half, detection took as long as four years." The findings come from Cybersecurity: For Defenders, It's About Time, a report from the Aberdeen Group sponsored by McAfee that leveraged data from Verizon's Data Breach Investigation Report to determine "dwell times," or the total time attackers had in a defender's network before being detected.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|