Keynote Speakers and Education Program Announced for Global Security Exchange (GSX) 2022

Keynote Speakers and Education Program Announced for Global Security Exchange (GSX) 2022

ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2022 with in-person and digital experiences taking place 12-14 September at the Georgia World Congress Center in Atlanta, GA and via the online GSX event platform.

“Today, security practitioners are having to deal with an ever-changing security landscape as never before,” said Keith McGlen, CPP, Chair of the GSX 2022 Selection Committee. “Understanding emerging trends and best practices showcasing how our profession can mitigate security-related risks are paramount to keeping the people and assets of organizations secure. This year’s GSX education lineup provides a wide variety of of interest to security leaders who want to achieve and maintain the cutting-edge in security protection strategies.”

GSX will offer timely general session presentations from acclaimed global keynote speakers. This year’s general session lineup includes:

Monday, September 12

Everybody Can Change the World | Mateo Salvatto, Head of Innovation for ORT Schools & CEO of Asteroid Technologies
Young tech entrepreneur and social influencer Mateo Salvatto will share his journey transitioning from an average high-school student into one of Argentina’s most respected tech businessmen through the creation of Háblalo, an app that assists more than 250,000 people globally who have hearing loss and verbal communication disabilities. Through an emotional series of stories of those challenged by their communication abilities and often taken for granted, Mateo will demonstrate how his passion for robotics and technology led to a series of developments that can help empower disabled people all over the world - and convince us that changing the world is easier than we may think.

Tuesday, September 13

Validating Security Controls – Taking “We Think” to “We Know” | Jake Williams, Executive Director of Cyber Threat Intelligence for SCYTHE
We all have security controls in place that we hope are detecting or blocking threat actor behaviors. But do they? Which behaviors? How do you know? If one of your security controls fails, will the activity still be detected? Traditionally, security control testing has been performed by red team operators. Unfortunately, these are point-in-time assessments. Ideally, the red team would be involved in revalidating the control with every software update or configuration change, but this is often cost prohibitive. During this session, Jake will help define the value proposition for security control validation and provide advice on how to operationalize and scale the practice. The next time an executive catches you in the hall worried about something they read about an incident at a competitor, you can confidently say "don't worry, we *know* we'd detect that."

Wednesday, September 14

A Pathway to Courageous Conversations | Derreck Kayongo, Former CEO for Center for Civil and Human Rights
Has anyone ever calculated the total cost of discrimination in the workplace? Derreck tackles the subject head-on by sharing how his organization found itself grappling with the issue. He takes his audience through an examination of how diversity and inclusion problems can impact your corporate bottom line. From long-term harm to your brand and weakened stock prices to negative perceptions within the security community, Derreck illustrates with eye-opening examples, how our upbringing and unconscious biases can become a net negative to organizational growth and have a negative impact on the bottom-line.

“GSX plays a pivotal role in the world of global security professionals,” stated Malcolm C. Smith, CPP, 2022 President, ASIS International Global Board of Directors. “GSX’s multi-dimensional approach to education, exhibit hall, networking, and digital programming afford our global audience of security professionals the opportunity to increase and enhance their knowledge, skillsets, and networks. That is quite unique—making GSX the profession’s flagship event.”

The GSX session lineup includes expert-led deep dives that can improve the practice of security professionals at any stage of their career, covering topics such as, access control, asset protection, remote workforces, workplace violence, cybersecurity, business continuity, crisis management, resilience, and more. All-Access Pass registrants can earn up to 22 CPEs toward their recertification whether they attend the in-person or via the digital experience.

Digital attendees will be able to access online GSX session recordings through 31 December. In-person attendees will have the option to add to their registration digital access of captured content.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3