PSA Security Network to Offer Track at ISC West 2015

PSA Security Network , the world’s largest electronic security cooperative today announced it will host a special track at ISC West 2015 on April 14 in Las Vegas, NV. The PSA TEC track at ISC West features a full day of training sessions intended to address current issues for physical security integrators. This year’s sessions will cover cybersecurity, the use of proprietary platforms, and unconventional security solutions. The sessions to be featured include the following:

To Have or To Hire: The Advancement of IT Skills in the Physical Security Space
April 14, 2015, 8:30 AM - 10:00 AM

As IP-based security technologies and IT-centric systems become more prevalent in today’s physical security solution set, IT skill sets become increasingly more critical to have or to hire. Is your organization prepared to meet the demand? Join us as integrators and manufacturers weigh in on the changes taking place affecting operations, recruiting, partnering, outsourcing and go-to-market strategies.
Moderator: Paul Cronin, Atrion
Panelists: Eric Yunag, Dakota Security Systems; Wayne Smith, Tech Systems; Ian Johnston, Digital Watchdog; Yoav Stern, DVTEL 

Get Off My Cloud! Best Practices in Securing the Cloud

April 14, 2015, 11:30 AM - 12:30 PM


Cloud-based services are more robust and commonplace in security applications than ever before, however, security for the cloud remains a concern. Corporations are blamed for poor security, hackers with malicious intent are a given threat and lax password practices on the part of users make cloud security a tough case to crack. This must-attend session is designed for anyone interested in adopting a more secure cloud strategy for his/her organization. Come hear manufacturers discuss their efforts to provide better security for cloud-based solutions.
Moderator: Tim Brooks, PSA Security Network 
Panelists: Charles Wheeler, Brivo; Dean Drako, Eagle Eye Networks; Rajeev Dubey, Kantech

Open vs. Proprietary Platforms: On Which Should You Build Your Future?

April 14, 2015, 1:30 PM - 2:30 PM


From proprietary to open solutions, what is the lifecycle expectation of a system platform and how do you decide which is the best system to use? Enterprise customers can’t afford to experiment with major platforms employed in their operations. How do you decide on which platform to standardize? Are you better off with open versus proprietary solutions? Can an enterprise customer ever benefit from being an “early adopter” of technology? Join us to assess the pros and cons of open and proprietary platforms against your present and future business needs.
Moderator: Brian Coulombe, DVS Security 
Panelists: Adam Shane, AMAG; Scott Dennison, Exacq from Tyco Security Products; John DeGeorge, NSYE Euronext; John Fenske, HID Global

The Forum for Creative Security Solutions

April 14, 2015, 2:45 PM - 3:45 PM


This session examines a series of customer case studies in which innovative and unconventional solutions were developed to solve uncommon problems. Starting with a statement of a unique real-life customer situation that defied a conventional approach, a panel of industry experts and session attendees are invited to offer potential solutions. The final resolution will then be revealed along with the supporting rationale and what was needed from the manufacturer or integrator to make it happen. Cases will be drawn from across the industry and will be selected to showcase truly innovate thinking and approaches by practicing security personnel.
Moderator: Ray Coulombe, Security Specifiers
Panelists: Andrew Lanning, Integrated Security Technologies; Wayne Smith, Tech Systems; Chad Parris, Security Risk Management; Ray Bernard, Ray Bernard Consulting Services 

Protecting the Protectors: Cyber Hygiene for Physical Security

April 14, 2015, 4:00 PM - 5:00 PM


Cyber security events are not entirely preventable, yet experts in the cyber security field suggest that a significant risk of cyber incursions could be substantially mitigated if enterprises engaged in good “cyber hygiene.” These best practices are often well-known, simple common sense approaches that should be a part of an enterprise culture. Learn how to reduce risk to your network and enterprise by identifying the most common sources of risk and exposure that can be prevented by effective cyber hygiene.

Presented by: David Brent, Bosch Security Systems; Darnell Washington, SecureXperts

Featured

  • Personal Liability Concerns Impact 70% of Cybersecurity Leaders

    BlackFog, provider of ransomware prevention and anti data exfiltration (ADX), recently unveiled its research conducted with UK and US IT Security decision makers. The research revealed that the majority of respondents, 70%, felt that stories of CISOs being held personally liable for cybersecurity incidents has negatively affected their opinion of the role. Read Now

  • Security Industry Association Announces the 2025 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2025 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both short- and long-term change in the global security industry. Read Now

  • Generative AI, Cybersecurity Among Top Risks for Healthcare Provider Organizations in 2025

    Overseeing the use of generative artificial intelligence, enhancing cybersecurity and ensuring compliance with a host of federal healthcare regulations headline the Top Risks health systems face in 2025, according to an annual study by Kodiak Solutions. Read Now

  • Wisconsin Shooting Likely a 'Combination of Factors'

    Following the deaths of a teacher and student at Abundant Life Christian School in, Madison, Wisc., police chief Shon Barnes indicated that the motive appears to be a “combination of factors” for a 15-year-old female student’s attack on a study hall. Read Now

    • Active Shooter
    • Incident Response

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3