This message was sent to ##Email##
|
October 17, 2017 |
| | | |
|
|
|
Building Design + Construction
Building Construction + Design magazine recently asked four top experts: Michael A. Silva, CPP, Frank Pisciotta, MPA, CSC, Christopher R. Lanni, CPP, and Chad Parris, PSP, CSC — all members of the International Association of Professional Security Consultants (IAPSC) — for their advice on securing multifamily projects. Here's what they said...
READ MORE
IAPSC
Hector Sanchez, MBA, CPP is Senior Security Consultant for Holistic Secured Operations, Inc. in West Palm Beach, FL. He provides Operational Security Assessments for businesses in the areas of Cyber/Information Security and Physical/Personnel Security. Sanchez also assists with the development of Policies and Procedures tailored for the specific needs of the business, and develops Contingency Plans and Continuity Models in preparation of incidents and disaster that could harm the business. He focuses all initiatives on the Security Triad defined in accordance with the American Society for Industrial Security (ASIS International). Sanchez holds an MBA in Technology Management and a specialization in e-business.
Steven T. Baker, CPP, PSP, PCI, is President of VTI Associates, a professional security consulting firm. Steve has more than 28 years of experience providing security, training, and investigative services. His experience includes conducting vulnerability and risk assessments, security operations, investigations, and providing executive protection, litigation support and training in firearms and self-defense to civilians and security personnel. Steve is a former Adjunct Instructor with the University of Phoenix, Southwestern College and the University of Nevada International Gaming Institute.
Promoted by
|
|
|
 |
Physicians Practice magazine
IAPSC Member Jim Kelton, CISA, CRISC, CGEIT, CDP is quoted in this Physician Practice magazine article where he outlines 5 important incident response steps to a security breach.
If your practice is hit by an EHR-related security breach, review your incident response plan, says security consultant with Altius Information Technologies, Jim Kelton. He's joking just a little when he tells practices this, because most haven't taken the time to develop such a plan. The incident response plan should include the processes and procedures the practice needs to undertake in the event of an EHR-related security breach. This is not the time to be scrambling and skipping over important steps, says Kelton. Having a plan to follow makes your practice's response in the face of a security breach much smoother. Here's what Kelton recommends in response to a security breach...
READ MORE
IAPSC 2018 Annual Conference: April 29 - May 1, 2018 in San Diego, CA
|
   |
IAPSC
Save the date — Registration opens December 1
Interested in exhibiting or sponsorship? Click here to download the 2018 sponsor brochure.
 |
|
HID Mobile Access allows members of your organization to access doors, gates and more with a mobile device. Schedule a consultation here to learn more. MORE
|
|
IAPSC
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges and trends in the industry.
It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
New IAPSC Members Orientation Webinar
|
   |
IAPSC
New members of the IAPSC are invited to participate in an orientation webinar on Thursday, November 9, 2017 at 9:00am EST. This short presentation will review the current membership benefits and opportunities to help make sure you are getting the most out of your membership, as well as to give you the opportunity to ask questions and remotely connect with some of your fellow members. Contact acorley@iapsc.org to RSVP and receive the meeting login instructions.
Content provided by IAPSC Annual Sponsor, Axis Communications
By implementing a few cybersecurity best practices, you can make your network more secure. This eBook is a perfect way to get started. Make the change today. By reading, you will learn:
- How to spot the symptoms of poor cyber health
- Tactics for protecting your data and network
- Reasons your video surveillance system could be valuable to a cyber criminal
- To build an internal company culture concerned about cybersecurity
- Where to find resources to help make improvements or maintain your current system
Download the eBook today!
The Hill
A top German federal cybersecurity agency is unaware of Kaspersky Lab software being used in espionage, Reuters reported recently. "There are no plans to warn against the use of Kaspersky products since [our agency] has no evidence for misconduct by the company or weaknesses in its software," the BSI, whose name translates to the Federal Office of Information Security, told Reuters via email.
READ MORE
CNN
Recently, the Department of Homeland Security directed federal agencies to implement better security protocols on government emails and websites. Agencies will be required to use a technology that helps prevent email spoofing, or impersonating government agencies via email. It's called DMARC, or Domain-based Message Authentication, Reporting and Conformance. Further, every federal website must be accessible through a secure connection — that is, HTTPS instead of HTTP.
READ MORE
Security Management
Two resumes lie side by side on a recruiter's desk. Candidate A has an Ivy League education, a 4.0 GPA and a slew of impressive internships. Candidate B graduated from a state school with a 3.4 GPA and once worked as a singing waitress. Which candidate is more likely to add value to the organization?
READ MORE
Security Management
When Christopher Martini, CPP, took the wheel as Jaguar Land Rover North America's regional manager for corporate security and business protection in 2013, he knew he had a long road ahead of him. He was the first person to serve in the role, which focused on keeping the British automotive company's American and Canadian administrative facilities safe.
READ MORE
Wired
When you set up a new Wi-Fi network, you're probably conditioned by now to check the "WPA2" box. You may not specifically know when or why someone advised you to do this, but it was solid advice. Wi-Fi Protected Access 2 is the current industry standard that encrypts traffic on Wi-Fi networks to thwart eavesdroppers. And since it's been the secure option since 2004, WPA2 networks are absolutely everywhere. They're also, it turns out, vulnerable to cryptographic attack.
READ MORE
Fortune
Professor Richard Thaler this week collected a Nobel Prize for his insights into behavioral economics — the idea that, contrary to economic theory, humans are not rational actors when it comes to financial decisions, but can be nudged to make better choices. The most famous application of Thaler's insight is a law that encourages firms to automatically enroll workers in 401K plans rather than require them to sign up. This simple nudge has dramatically increased the amount that tens of millions of Americans have saved for retirement.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|