Updates from the GSX 2021 Show Floor: Day 2

As I mentioned yesterday, GSX 2021 is my first foray into the world of security conferences and trade shows. And if Day 1 was the day I succeeded in not drowning, Day 2 was the day I managed to tread water and even swim a little bit. The farther I walked and the more people I talked to, the more secure—no pun intended—I felt. And it gave me a sense of the irreplaceability of in-person events and real, live, face-to-face interaction with total strangers.

I’m sure that veterans of these events have collected small mountains of branded giveaways and knick-knacks: pens, notebooks, flashlights, koozies, coffee mugs, water tumblers, keychains, T-shirts, and so on. With each of these token prizes comes a conversation: approaching an unfamiliar booth, getting an overview of a company and its products, trading business cards, and adding another name to my growing network of professional contacts. A tangible reminder of that conversation—and the potential for professional collaboration—lives on in the form of, say, a bright orange stress ball, which will likely roll around in my desk drawer for the next several years.

It’s great to see old colleagues. To solidify and extend existing partnerships. To touch base with familiar people and companies, strengthen old relationships. But the unique benefit of something like a trade show is that it puts you in the same room with companies that you haven’t worked with before—people and companies and solutions that you’ve never heard of. It’s an opportunity to have a new conversation with a new face, to expand as well as deepen your network. It’s the chance to learn things you never knew you never knew.

It’s not a new observation that the digital world gives us tunnel vision. We curate our social media feeds to show us only what we want to see (things we’re familiar with, things we agree with)—and nothing else. It’s only in person that we’re forced to engage at length with the unfamiliar. And this is why, in my—again, hilariously inexperienced—opinion, trade shows will never go away entirely, even after the pandemic subsides. The Internet can never replace face-to-face interaction for the sole reason that you can’t Google a company whose name you’ve never encountered. But once the connection has been sparked, the possibility for collaboration is endless.

About the Author

Matt Jones is senior editor of Spaces4Learning and Campus Security and Life Safety. He can be reached at MJones@1105media.com

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

Featured Cybersecurity

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3