5 Great Education Sessions at GSX 2023

5 Great Education Sessions at GSX 2023

The calendar has flipped to September, and that means it is almost time for GSX 2023. One of the top draws, along with a huge exhibition hall with great vendors, is a robust education series.

You can see everything being offered in Dallas here. But we’re highlighting five great sessions covering a wide variety of topics and where they are located.

Monday, September 11, 10-11 a.m., C141/C143/C149. 10 Minutes to Live: Active Shooter Survival Training. This presentation, you will learn simple tools to use if you ever find yourself in an active shooter scenario. You will learn how to prepare using a security mindset, fight through fear with a survival midgets set to evaluate the situation and react appropriately.

Monday, September 11, 2-3 p.m., C155. Protecting your Facility or Venue from the Threat of a Terrorist Bombing Attack. The Cybersecurity and Infrastructure Security Agency’s (CISA) Office for Bombing Prevention (OBP) leads the Department of Homeland Security’s efforts to implement national counter-improvised explosive device (C-IED) policy and enhance the nation’s ability to prevent, protect against, respond to, and mitigate the use of explosives against critical infrastructure—the private sector and federal, state, local, tribal, and territorial entities. OBP will discuss how how you can prevent bombing attacks while increasing overall security.

Monday, September 11, 3:15-4:15 p.m, D161. Digital Nomads—Securing Today's Mobile Worker. With the pandemic, more employees are enjoying remote work. But that’s left corporate security to catch up with the changing times. This session will explore why remote work has grown and become and permanent part of life. It will also explain the security challenges from digital nomads and how companies can adopt a Enterprise Security Risk Management (ESRM) for remote workers.

Tuesday, September 12, 10:30-11:30 a.m., C156. Insider Threat & Behavioral Analytics for Cyber & Physical Security. Behavioral analytics can be used for a number of tasks including analyzing data sets to identify anomies that may represent risks to workplace physical and cybersecurity. A pair of experts will explain behavioral analytics in more detail and outline use cases, real-life case studies, and more.

Wednesday, September 13, 8:30-9:30 a.m., C144/C145. Preparing for the Next Era of Ransomware. Ransomware continues to be an escalating problems for businesses, governments, and even critical infrastructure. In this session, you’ll hear the results of a new research paper that explore ransomware in cybercrime and what would trigger changes in those business models.

See you in Dallas!

About the Author

Brent Dirks is senior editor for Security Today and Campus Security Today magazines.

Featured

  • Teaching Old Dogs, New Tricks

    After more than 30 years in the security integration business, today’s video surveillance systems are certainly not the same CCTV systems I sold and installed when I first started hanging cameras. Back in the day, there were only a handful of companies out there and one that started with a “P” stood above the rest. If you were fortunate enough to get invited to travel on their private jet out to California to tour the factory, it was a real honor. I have a picture somewhere in my garage collecting dust, of me sitting in the co-pilot seat. I know, old-man highlights, but still very cool. Read Now

  • Learning to be a Strategic Skeptic: Promoting Critical Thinking, Digital Literacy

  • Why Communication is Key in an Emergency

    During an emergency, communication with the outside world can be a critical component when it comes to response time and saving lives. Emergency communications typically consist of alerts and warnings; directives about evacuating the premises; information about response status, and other matters that can impact response and recovery. Read Now

  • Trust But Verify

    Today’s world is built on software—whether it is third-party applications, open-source libraries, in-house developed tools, operating systems, containers or firmware. Organizations worldwide depend on these diverse software components to power their operations, connect with customers, and drive innovation. However, this reliance on software comes with hidden dangers: the blind trust placed in these software products. Many companies assume that the software they purchase, and use is secure and free from vulnerabilities, but recent high-profile software supply chain breaches have proven otherwise. The reality is that every piece of software, no matter how reputable the source, increases the organization’s attack surface and poses new risks. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3