ASIS International and (ISC)2 to Colocate Annual Conferences

Plans are well underway for the ASIS International 58th Annual Seminar and Exhibits (ASIS 2012), Sept. 10-13, 2012 in Philadelphia. ASIS, the largest organization of security management professionals worldwide, and (ISC)2, the largest not-for-profit membership body of certified information security professionals worldwide, are pleased to announce that the second annual (ISC)2 Security Congress will be colocated with the ASIS Annual Seminar again this year.

“As the industry’s leading certification and education organizations, we can strengthen and serve the broader security community best by working together. By aligning our organizational resources strategically, our combined memberships gain access to core knowledge and best practices across the full spectrum of information and traditional security disciplines,” said W. Hord Tipton, CISSP-ISSEP, CAP, CISA,  executive director of (ISC)2.

Building on the overwhelmingly positive response from attendees from both organizations last year in Orlando, Fla., ASIS and (ISC)2 will continue to collaborate on ways to optimize expertise and leverage resources to present two events in the same location with one focus: to provide traditional and information security professionals with the knowledge, technology, and networking opportunities they need to excel in their careers and secure their organizations’ people, property, and data.

“The integration of traditional and information security is a critical issue affecting the practice of security management,” said ASIS president, Eduard J. Emde, CPP. “Our members are experiencing an increasing rate of assimilation of a variety of technologies into their functions along with the continuing emphasis on cyber security. Our goal is to help them to become better equipped to succeed in the future.”

Once again, registrants of either conference will gain access to each event’s education sessions, the exhibit hall, and most of the networking events. Both organizations also will offer review courses for their respective certifications, as well as separate, members-only activities.

Attendees can anticipate an expanded presence of information security-focused companies on the exhibit floor (in 2011, there were more than 75 companies), and the information security education tracks will nearly double from five to nine.

ASIS and (ISC)2 expect the Philadelphia location to attract very strong attendance. Both organizations have heavy concentrations of members in the U.S. Northeast Corridor. With Philadelphia’s easy accessibility, there is little doubt that ASIS 2012 and the (ISC)2 Security Congress will draw record numbers to these world-class security events. 

Registration and housing for ASIS 2012 and the (ISC)2 Security Congress are now open for the event on Sept. 10-13, 2012,  in Philadelphia.

Featured

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX
  • Nothing Artificial About this Intelligence

    I have been looking forward to this year’s GSX show in New Orleans, the Cresent City, or if you prefer The Big Easy. It seems like quite a while since we’ve been here. Twenty years ago, ASIS, as it was known then was literally washed out of the city by someone known as Katrina. It is a good thing to come back to NOLA. Read Now

  • From Monitors to Mission Control

    Security Operations Centers (SOC) were once defined by rows of static monitors, each displaying a single feed with operators quietly watching for issues. That model has become obsolete. Incidents evolve too quickly, data comes from multiple locations, and decisions must be made in seconds—not minutes. Read Now

  • New Gas Monkey Garage Venue Uses AI-Enhanced Video Technology

    Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”