Security Industry Association Names Kathleen Carroll as Committee Chair of the Year

The award recognizes individuals for excellence in leading SIA committees and advancing member objectives

The Security Industry Association (SIA) has selected Kathleen Carroll as the 2020 recipient of the SIA Committee Chair of the Year Award, which recognizes individuals for excellence in leading SIA committees and advancing member objectives. SIA will present Carroll with the honor at The Advance, SIA’s annual membership meeting, during ISC West.

Carroll chairs the SIA Data Privacy Advisory Board and is the founder and managing partner of Seven Seas Strategic Communications, a full-service public relations and government affairs firm offering strategic planning, writing, media relations and event planning. With more than 30 years of experience, she has worked with companies in diverse industries, designing public relations and government affairs programs and strategies that help build business and garner attention and support for clients’ key goals and objectives.

“I am honored to be recognized as Chairperson of the Year. The Data Privacy Advisory Board members have made it easy to chair this committee, and I thank them for their commitment, dedication and active participation,” Carroll said in a statement. “I am also grateful to SIA for recognizing early on that privacy and security should be complementary. As important has been the support that the advisory board has received from Ron Hawkins and the rest of the SIA staff.Educating and informing the security industry about data privacy motivates me daily, and chairing the Data Privacy Advisory Board allows me to work with like-minded leaders in the industry to spread the word. Privacy matters.”

She previously served as vice president of corporate communications for HID Global, overseeing the development and implementation of public relations and government affairs programs. She has testified before Congress on a range of topics, including the use of secure identification documents in airports, and has testified in several states on the use of secure credentials for physical and logical access control, cybersecurity, the Internet of Things and privacy.

Featured

  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3