This message was sent to ##Email##
To advertise in this publication please click here
|
|
|
.IAPSC NEWS
IAPSC Upcoming Webinars — Register Now!
IAPSC
As an IAPSC member you have free access to any of our educational webinars. Take a look below at our upcoming webinar schedule and register now!
Presented by Duane Reeves Tuesday, November 17 | 3 PM (ET)
Eavesdropping, surveillance, and espionage is not just something that happens in the movies. Corporate or economic espionage has become a multi-billion-dollar industry fueled by the marketing of sophisticated spy technology to individuals who are deploying covert technology against one another on an unprecedented scale.
This presentation is designed to introduce you to the world of how insider threats are utilizing electronic surveillance and how this field has affected the way information technology and physical security should conduct security operations.
Presented by Sean A. Ahrens, CPP & Deborah Blass, PE Tuesday, December 1 | 12:30 PM (ET)
Depending on the project, a threat and risk assessment may require an evaluation of non-standard threats, which may be expressed through Chemical, Biological, Radiological, Nuclear or Explosives. Although operations and security cameras are typical controls for these types of threats, additional mitigation strategies may need to be employed, which require more technical and structural engineering expertise to adapt the building infrastructure (i.e. progressive collapse resistance, impact resistance, or blast resistance).
This webinar is intended to give basic technical education into building hardening strategies, and the context, implications, and cost ramifications for the inclusion of these controls.
|
|
|
 |
|
Overtur™ is Allegion’s digital environment for simplifying design, specification and management of door openings, including access control, between Divisions 8 and 28. It serves as a central hub of access control hardware information that allows team members to collaborate on a project in a single platform.
|
|
IAPSC 2021 Annual Conference
IAPSC
IAPSC’s 2021 Annual Conference will be held on June 7-9 at the Sheraton Gunter in San Antonio, Texas. IAPSC staff is working closely with the venue to ensure we are proactively following safe meeting practices based on CDC and local guidelines. We look forward to sharing our plans with you. Please stay tuned for more details and registration coming soon! In the meantime, please visit IAPSC’s website for hotel information.Please contact IAPSC staff via email at iapsc@iapsc.org with any questions.
|
|
IAPSC
Earning the Certified Security Consultant designation demonstrates your depth of knowledge, professional objectivity, integrity, and skills as a security consultant. The CSC requires a combination of experience, education, independence, ethics, and successfully passing an online examination.
The exam is open to both members and non-members as well as independent (external) and internal consultants. IAPSC members are pre-qualified to sit for the exam and receive a discount on the certification fee.
Learn more here and apply today!
.GOVERNMENT
|
Promoted by Murray Associates
Spies, hackers, terrorists and nosey neighbors are targeting business Wi-Fi big time. And, why not? Business information is valuable, ransomeware pays, and voyeurs seek entertainment. Our 20-point checklist will help you secure your system. Most Wi-Fi systems are sitting ducks, especially with employees working from home. Wi-Fi is used by smartphones, printers, VoIP phones, security cameras, smart TVs, smart speakers and all other IoT devices. Wi-Fi is also the gateway to your network, where everything else can be remotely attacked by outsiders. Additionally, many bugging devices use Wi-Fi…
|
|
|
.BUSINESS & MANAGEMENT
How To Protect Your Organization From Internal And External Threats To Cybersecurity
Employee Benefit News
While remote work has ushered in unprecedented freedom and flexibility for thousands of employees, it also exposes workplaces to more cybersecurity threats.
When employees work from home, traditional IT departments have less control over devices and networks, leaving open the possibility of internal and external data breaches.
|
|
|
With Profile T, ONVIF employs a media service that can support video compression formats, including H.265. The profile is also designed to support audio compression formats, with the ability to include video and audio codecs as needed in the future without having to redesign its media service.
|
|
|
|
|
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.
Connect with Highly Defined Buyers and Maximize Your Brand Exposure
|
|
|
|
|
.IT SECURITY
Cybersecurity: 1 in 3 Attacks Are Coronavirus-Related
ZDNet
The U.K.'s National Cyber Security Centre (NCSC) is 'stepping up support' for the National Health Service to help protect U.K. hospitals and other healthcare organisations against cyberattacks.
The NCSC's Annual Review 2020 reveals that the cyber arm of GCHQ has handled more 200 cyber incidents related to coronavirus during the course of this year – almost a third of the total number of incidents it was called in to help with over that period.
|
|
What Are The Fastest Growing Cybersecurity Skills In 2021?
Forbes
Cybersecurity professionals with cloud security skills can gain a $15,025 salary premium by capitalizing on strong market demand for their skills in 2021.
DevOps and Application Development Security professionals can expect to earn a $12,266 salary premium based on their unique, in-demand skills.
|
|
COVID-19 Vaccine-Maker Hit with Cyberattack, Data Breach
Threatpost
COVID-19 vaccine manufacturer Dr. Reddy's Laboratories has shut down its plants in Brazil, India, Russia, the U.K. and the U.S. following a cyberattack, according to reports.
The Indian company is the contractor for Russia's "Sputinik V" COVID-19 vaccine, which is about to enter Phase 2 human trials. The Drug Control General of India gave the company the go-ahead on Oct. 19.
|
|
Deep Dive: Responding to the Rising Threat of eSkimming
PYMNTS
Fraudsters have refocused on attacking e-commerce in recent years. Online shopping is becoming more popular among consumers, giving cybercriminals more opportunities to exploit digital channels for their schemes. Many are also finding it less profitable to attack in-person debit and credit card transactions at point of sale terminals because of the added security measures they deploy.
|
|
Are your kids remote learning? They could be the target of identity theft
Yahoo Sports
One day, a 12-year-old receives a notice from the IRS informing her that she hasn’t paid her income taxes for last year. Meanwhile in the next town over, a 2-year-old is being hounded by debt collectors for an outstanding credit card balance of $15,000.
No, it’s not the setup for a new episode of ‘The Twilight Zone.’ These scenarios — and worse — happen in real life all the time. More than one million children were victims of identity theft in 2017, according to a report by Javelin Strategy & Research.
|
|
The invisible threat: Building cyber resilience to respond to the rise in third party cyberthreats
Government Executive
Last year, the number of targeted attacks — which often seek the crown jewels of sensitive, critical data — reported by the average federal agency soared from 211 to 320, a 53% increase. This is according to Accenture’s recent report, “State of Cyber Resilience – Federal Edition,” which surveys the threat landscape faced by federal agencies and the responses effective in quashing those threats.
|
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|