|This message contains images. If you don't see images, click here to view.|
Advertise in this news brief.
Beware of 'sales commissions' offered
Recently IAPSC members were approached by a vendor who advertised the following: "We work with security consultants worldwide and pay sales commissions to partners."
Sales commission incentives impede independence and therefore, security consultant members of IAPSC are precluded from accepting them. This is stated in the IAPSC bylaws (Section A, E, 2).
All new members are required to sign an affirmation statement agreeing to comply with the IAPSC bylaws and code of ethics. Current members sign a reaffirmation statement signifying continued compliance. Any deviation from this IAPSC policy is grounds for removal from membership.
IAPSC Reception at ASIS on Sept. 28
Join IAPSC for this opportunity to connect with association members and other colleagues in the security industry before ASIS 2014. The event is open to IAPSC members and their invited guests. Mark your calendar for the evening of Sunday, Sept. 28, 2014. To get details or RSVP: firstname.lastname@example.org.
Welcome new member: Manuel Rayn Solay
Rayn is a graduate of the Universidad Nacional Autonoma de Mexico and a certified CPP protection professional. He is a founding member of the American Association of Information Security Professionals (ALAPSI).
Rayn specializes in information protection, property security and asset protection, crisis management and business continuity plans, as well as security awareness programs for families, employees and management consultant. His extensive experience in the industry has allowed him to work in firms with specialized international security, such as Kroll Associates, as well as companies and organizations in the public and private sector, both in threat identification, analysis and assessment of risk and vulnerabilities in the design of security programs, policies, practices and procedures.
Becoming a Successful Security Consultant Seminar
The only course offered on how to successfully launch a new security consulting practice, develop a trust partnership with clients, and deliver essential security consulting services or jump-start an existing practice. This popular intensive program will teach you how to develop, market, and deliver essential consulting services, while avoiding the costly mistakes that can sabotage your success. The program is chock-full of practical information that will save you time, money, and frustration. Take home a comprehensive workbook of sample proposals and reports that will give you a clear advantage when competing and delivering on a security consulting assignment. This course is offered as a pre-seminar to ASIS 2014 on Sunday, Sept. 28 in Atlanta, Georgia. Program #: 1409-CONSU
$395 ASIS member or $495 ASIS nonmember.
GAO report: US diplomatic facilities may be at risk because of security problems
The Washington Post
U.S. diplomatic facilities abroad may be at risk because of problems with their security standards and practices, according to a report from federal auditors. The Government Accountability Office, a nonpartisan investigative wing of Congress, found inconsistency in the way the State Department prepares for evolving threats and the potential dangers to temporary facilities that operate longer than anticipated.
Report: Obama teams weighs tighter airport security
The Obama administration is considering tighter security at airports — and may ask overseas airports to do the same — because of concern that terrorists are developing news types of explosives to try and smuggle onto airplanes, ABC News is reporting. National security officials are meeting about terrorists in Syria that are seeking to design explosives that could get past existing security procedures.
Data security and what keeps CISOs up at night
The life of an enterprise Chief Information Security Office is perhaps more stressful than ever before. Not only does she have to deal with employees who give scant regard to information security, but there are a host of new risk vectors she needs to think about. Hardly a day goes by without another Denial of Service attack or security breach becoming public. CISOs and security staff generally, formerly anonymous individual who were neither seen nor heard, are increasingly being thrust into the limelight when breeches become public.
Law enforcement experimenting with surveillance drones
As technologies progress that could benefit U.S. domestic law enforcement efforts, lawmakers will have to weigh in with concerns over privacy issues and the pending new FAA policy on unmanned drones flying over American national airspace. How would U.S. law enforcement agencies use unmanned drones to enhance surveillance? One current source of information comes from the Mexican law enforcement drone experiment program. In Tijuana, Mexico, the local police are using unarmed drone aircraft produced by 3D Robotics and equipped with video cameras as part of their increased patrol presence in high-crime areas.
State Department going online to counter terrorism messages
What better way to thwart terrorism than via online social media? The State Department's Center for Strategic Counterterrorism Communications has hired a contractor to provide it with six staffers to work in downtown Washington. The six will conduct "a digital English-language campaign designed to counter propaganda by al Qaeda and other extremist groups" outside the U.S., according to Fed Biz Opps, a website for government contract solicitations and related information.
Business operations playing a larger role in video deployments, survey finds
Security Info Watch
Eagle Eye Networks released the results of an independent survey commissioned by the company, which show that a large majority of end users plan to extend the use of surveillance systems beyond security. The "Cloud Video Surveillance Report 2014" surveyed between 250 and 500 IT and video surveillance professionals over a two-month span earlier this year to get their perspective on a variety of trends including business plans for video surveillance, adoption of cloud video services and the increased role of IT professionals in installing and maintaining surveillance networks.
Cyber attacks on the World Cup: Lessons learned
With an estimated viewing audience of over 3.2 billion globally (roughly 50 percent of the world's population), not only does the 2014 World Cup provide that shared experience, it draws a large amount of viewers to television screens around the world and a fair amount of advertisers as well. Given all of this rich history and fervor, it's no surprise that this makes a great venue for idealistic (and perhaps nefarious) actors, such as the hacking collective Group Anonymous, to solicit new recruits to their struggles.
10 critical security habits you should be doing (but aren't)
It's a tough, insecure world out there, fellow PC faithful. Times have never been scarier, with website data breaches turning into regular affairs, programming flaws like Heartbleed popping up left and right, and botnets like Gameover Zeus infecting a legion of PCs, only to gobble the up personal information and financial data stored within. Good news: There's a lot that regular PC users can do to protect themselves against the worst of the worst. But bad news: Most of us don't bother. Here are 10 critical security measures you should be doing right now.
Airport breach a sign for IT industry to think security, not money
The two U.S. airports that had their computers compromised by an unknown group of hackers is a wake up call that America's best IT talent needs to focus less on money and more on national security, an expert says. The Center of Internet Security, a government-endorsed nonprofit that helps states with cybersecurity, said in its recently released report that it was notified in the summer of 2013 of advanced persistent attacks against four U.S. airports.
Missed last week's issue? See which articles your colleagues read most.
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit
Esther Cho, Content Editor, 469.420.2671
International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
email@example.com | www.iapsc.org
Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.
This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!
June 17, 2014
June 3, 2014
May 27, 2014
May 20, 2014
7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063