This message contains images. If you don't see images, click here to view.
Advertise in this news brief.

Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit August 25, 2015

Home   About   Join   Members   Events & News   Press   Contact     



IAPSC will be at ASIS 2015 in September — Come and see us!
Join IAPSC for two opportunities to connect with association members and colleagues in the security industry during ASIS 2015 in Anaheim, CA. The IAPSC networking reception for members and their guests will be the evening of Sunday, Sept. 27 from 5-7 p.m. in Room 201D at the Anaheim Convention Center. Refreshments will be served. Also, be sure to visit our information and membership booth on Monday, Sept. 28 or Tuesday, Sept. 29. Members will be available to answer questions about IAPSC and the benefits of membership. To get details, RSVP for the reception, or to volunteer for a time slot at the booth, contact:

Thank you to the IAPSC reception sponsor: RS2 Technologies
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Mark your calendar for these upcoming IAPSC Interest Group meetings
IAPSC Members are encouraged to participate in these 1-hour Web-based audio/video conference call to discuss timely topics in their areas of expertise.
  • Security Design & Engineering (Rene Rieder, Jr. and Chad Parris Co-Chairs) will meet for the first time on Friday, Sept. 18 at 9 a.m. PT/12 p.m. ET. Members are encouraged to contact the chairs with suggestions for discussion topics.
  • The Cybersecurity Interest Group (Jim Kelton and Michael Bacon Co-Chairs) will meet again on Friday, Oct. 16 at 9 a.m. PT/12 p.m. ET.
To attend, IAPSC members may RSVP to

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

IAPSC Successful Security Consulting Seminar at ASIS 2015
Sunday, Sept. 27, 8 a.m.-5 p.m.

This popular, one-day intensive program presented by leading technical and management security consultants will show you how to develop, market and deliver security consultant services and how to avoid the costly mistakes that can sabotage the success of your clients’ or your own security program. The program is filled with practical information on just how to offer and deliver security consulting assignments starting with establishing your practice, finding clients, networking with other consultants, and executing security management and technical aspects of consulting from the initial consulting assignment through security assessments, designs and specifications, procurement, and implementation. A comprehensive workbook of sample proposals and reports will be provided each attendee. Program # 1509-CONSU
Register Now

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

IAPSC launches online RFP portal
IAPSC is pleased announce a newly developed member benefit: the IAPSC RFP Portal. This new tool on the IAPSC website allows contracting officers / buyers to create and distribute an online solicitation for security consulting services from IAPSC members. It provides a RFP/RFQ template to be completed online by the buyer, which is then automatically disseminated to qualified members. While many members were involved in contributing to aspects of the portal development, we especially want to thank Harold Gillens, Ken Wheatley, Frank Pisciotta, and Jim Kelton who have been intricately involved in developing and testing the portal.

We invite you to take a look the portal here and spread the word to your network:

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

IAPSC to offer 'Basic Successful Security Consulting' workshop at ISC East in NYC
On Nov. 18, IAPSC will be presenting a half-day introductory workshop on how to successfully launch a new security consulting practice or jump-start an existing one. Attendees will learn the essential traits for success from a faculty of expert security consultants Alan Brockbank, CPP, CSC, William Birks, Jr., CPP and Rene Rieder, Jr. CPP, PSP, CHS-IV, CMAS, covering topics such how to start your business, attract clients, and best practices for completing the consulting assignment. The workshop registration fee can be applied to IAPSC membership application within 30 days of attendance.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Mark your calendar — IAPSC Annual Conference is in Charleston!

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Federal workers' personal devices pose security risk
USA Today
Half of federal employees access government email and documents from their personal smartphones and mobile devices, creating potential cybersecurity risks for agencies already under siege from hackers, a new study found. In a survey of 1,000 workers from 20 civilian, intelligence and military agencies, 60 percent of employees said they are aware of some of the risks of using their personal devices for work, but 85 percent of those respondents said they do it anyway. The study was commissioned by Lookout, Inc., a cybersecurity company.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Public-private partnerships drive secured cities
The worldwide population levels are growing at a rapid rate and urbanization drives new levels of inhabitants in large cities across the globe. The move from urban areas to cities compels municipalities to evaluate ways to boost efficiency and improve quality of life. With large and complex infrastructures serving millions of people, today's cities are vulnerable to a wide range of threats such as overcrowding, criminal activity, terrorism and natural disasters. As a result, there is a growing trend toward the creation of citywide public safety programs to better protect people, property and assets.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Missed an issue of IAPSC News? Click here to visit the IAPSC News archive page.

Interpol offers help in the battle against cybercrime
By Archita Datta Majumdar
For police departments around the world, cybercrime has become yet another addition to their workload — and not all are equipped to handle it. Lack of resources is an issue, but a lack of awareness is also preventing effective cybercrime fighting. There is a huge knowledge gap between crime fighters and the increasingly complex nature of cybercrime. However, Interpol is looking to bridge that gap. And judging by Interpol's recent activities, their focus is intensifying on that front.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


New operations center will transform nation's electric grid
Emergency Management
At the heart of the newest building on the Pacific Northwest National Laboratory campus is an operations center focused on making the largest and most complex machine ever created more secure and more reliable. "The Systems Engineering Building is a really generic name for a really cool place," said Elizabeth Sherwood-Randall, the nation's deputy energy secretary, at the building's dedication.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Death on the job: Putting names and faces on fatality statistics
EHS Today
Criminal prosecutions of employers can help prevent future workplace tragedies, claim workplace safety advocates, who on Aug. 18 released new data from the U.S. Worker Fatality Database about deaths on the job during the first seven months of 2015. The data is hosted by the website of the National Council for Occupational Safety and Health (National COSH), and is the largest open-access data set of individual workplace fatalities ever collected in the United States. Two-thirds of the cases include names of the deceased workers.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Virtualization doubles the cost of security breach
CSO Online
When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional environment, according to a new report from Kaspersky Lab. In a survey of 5,500 companies that the company conducted with B2B International, enterprises paid an average of $800,000 to cover from a security breach involving virtualization, compared to $400,000 in traditional environments. Small and midsized businesses, meanwhile, saw costs rise from an average of $26,000 to $60,000 with virtualization.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Esther Cho, Content Editor, 469.420.2671  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915 |

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

Aug. 11, 2015
July 28, 2015
July 14, 2015
June 30, 2015

7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063