This message was sent to ##Email##
|
August 8, 2017 |
| | | |
|
|
|
IAPSC
IAPSC provides a free RFP (Request for Proposal) distribution service to help connect prospective clients with our member security consultants. All current members receive an email notice each time a new RFP is posted. Then they may log in to the website to view the details and contact the client directly if they are interested in the opportunity.
There are currently two active projects in the members RFP portal seeking "Security Risk Assessment Consulting Services," one is due Aug. 18 and the other Sept. 1. Members: Click HERE to log in and learn more.
By Frank Pisciotta, CSC, IAPSC Technical Standards and Educational Committee Chair
It seems like yesterday that we were together in Austin at the conference with our sponsors. We bring the sponsors to our conference by invitation only and we should remain mindful of the importance of communication with those sponsors throughout the year. We have been promoting to our sponsors the importance of setting up A&E websites to make available key design documentation such as specifications, data sheets and pricing. One of platinum sponsors recently used IAPSC guidance to influence the employer to set up am A&E site, but then received very little in the way of registration for this site after influencing the employer to make the expenditure. This type of activity only takes a minute to get registered and it is important that we provide this type of support to our sponsors as they have provided support to us. Further, it is also appropriate to share success stories back with the sponsors when we find a great match for our clients to specify their products. We have some top tier partners and the security business is driven on relationships and relationship management. Keeping the lines of communication open to continue to track and monitor product development and advancements is incumbent on every consultant whether you are doing management, technical or forensic consulting. ASIS is coming up and I intend to visit the sponsor booths to check out what is new and exciting. Please also note that we have a space set up on the members only section of the site.
READ MORE
Promoted by
|
|
|
 |
IAPSC
The member comment period is now open for proposed revisions to the IAPSC Best Practice document "Forensic Methodology." Per the established protocol, IAPSC members now have 45 days to provide comments. Once the 45 days are up, the Best Practices committee will review the comments and respond as necessary.
Members: Log in and click HERE to visit the Members' Library and download the proposed revisions from the "Best Practices" folder. Please note that the edits/changes to the document appear in bold typeface.
Comments must be received by Friday, Sept. 15, 2017 via email to iapsc@iapsc.org or by mail/fax to the IAPSC office.
Join us for the IAPSC Members' Networking Reception at ASIS 2017
|
   |
IAPSC
IAPSC Members, their invited guests, and attendees from IAPSC's Successful Security Consulting pre-seminar are invited to join us for this hosted networking reception prior to the ASIS 2017 show in Dallas. The event will be held on Sunday, Sept. 24, from 5-6 p.m. in the Convention Center (room number C142). There is no cost to attend. We hope to see you there!
Add your name to the guest list by contacting: iapsc@iapsc.org.
 |
|
HID Global® is the leading provider of products and services that help organizations manage secure identities. Visit our Consultant Corner to join our growing community. MORE
|
|
IAPSC
We would like to invite you to visit the IAPSC Membership Booth at ASIS Annual Seminar and Exhibits (ASIS 2017) in Dallas, Sept. 25-28. IAPSC will be at Booth 4095 on Tuesday and Wednesday. Stop by to speak with current members about how to become a member or get the most out of your current membership.
Members: We are seeking volunteers to help staff the booth and spread the word about IAPSC. To sign up for a time slot on Tuesday, Sept. 26 or Wednesday, Sept. 27, contact iapsc@iapsc.org.
Enjoy a FREE expo-only pass: Register before August 11th HERE. Use source code: 537E17
Receive a $75 discount on the All-Access Pass (includes all educational sessions, keynotes, receptions, and show floor access): Use discount code: INVITE75
IAPSC
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges and trends in the industry.
It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
IAPSC
Registration is now open for this popular seminar: Sunday, Sept. 24, 2017 in Dallas, TX, prior to the ASIS 2017 Seminar & Exhibits. This unique, one-day intensive program will show you how launch a new security consultant practice or jump-start an existing one. Learn from a faculty of seasoned consultants how to develop and market yourself as a security consultant and how to avoid the expensive mistakes that can sabotage your success. The program is filled with practical information that will save you time, money, and frustration. Take home a comprehensive workbook of sample proposals and reports that give you a clear advantage when competing for a security consulting assignment. Register Now.
The New York Times
If within the past few years you received a package, roamed a shopping mall, boarded a plane, train, ferry or cruise ship, went to a major sporting event, ran a marathon, attended a concert, gambled at a casino or visited a tourist attraction, chances are a dog made sure it was safe for you to do so. With terrorists increasingly attacking so-called soft targets, the demand for detection dogs that can sweep large areas for explosives has soared. So have prices, which can exceed $25,000 for a single dog.
READ MORE
FedScoop
While the Office of Personnel Management's information security practices have improved since the 2015 breach, OPM still has some work to do, a new Government Accountability Office report concludes. The report, released recently, looks at OPM's progress on the 19 recommendations the United States Computer Emergency Readiness Team made after the breach that exposed the data of 22.1 million people.
READ MORE
Dark Reading
The foundation of what we do in InfoSec is all based on risk. How we select controls to reduce the likelihood and impact of threats and vulnerabilities stems from our risk assessments. Every compliance standard mandates one form of risk assessment be done as a part of an organization's security program. But not all risk assessments are done the same way nor do they produce the same results.
READ MORE
Facility Executive
Much of what is done in security is transaction oriented (i.e., tactical). There are photographs taken for ID cards, visitors processed, guard tours conducted, data entered into electronic access system databases, alarms monitored, incident reports taken, investigations conducted, etc. Transaction oriented activities are necessary components of a security program. If there are no major incidents, however, it is easy to fall into a comfortable routine and think the security program is running smoothly and effectively.
READ MORE
Fox News
As the internet of things truly begins to come online, many have taken on the responsibility to exploit hacks before potential to harm is done to others. This time, it's something as harmless as an automatic car wash. However, with the right hacking skills, it turns out an automatic car wash can be pretty harmful. Vice reports a group of security researchers has identified multiple vulnerabilities in automatic car wash systems, specifically in PDQ LaserWash units.
READ MORE
Design News
Cybersecurity risks for industrial control systems are continuing to increase from threats via industrial espionage, to actual physical damage and financial loss due to downtime. A key trend moving ahead is new technology addressing critical areas including asset and material tracking, enhanced HMI authentication and stronger VPN credentials.
READ MORE
Info Security Group
In the wake of the recent OneLogin unauthorized data access, it has become evident that no one is safe in the cyber world. All companies are susceptible to attacks and should be prepared to react in case of a sensitive data breach. Have you ever paused to consider what you would do if your company becomes a victim? If you haven't, this article is for you. After all, it is in everyone's interest to move through the process swiftly and thoroughly to restore your operations and bring forth a restored sense of trust between you and your clients.
READ MORE
Forbes
Statistics from the Identity Theft Resource Center, a nonprofit that tracks U.S. data breaches, strongly suggest that 2017 will be a record breaker. According to the organization, there have been over 800 reported breaches as of late July. This already puts us ahead of every year the ITRC has been tracking except one: 2016, the former champ, which came in at 1,093 breaches for the whole year. At this rate, we should surpass last year's ITRC numbers by about 40 percent.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|