Brivo's Steve Van Till will be kicking off ISC West in style on April 10th at 10:00am with his presentation entitled, “Cloud Standards: Driving the Future While Avoiding Yesterday’s Mistakes.” Salvatore D’Agostino, CEO at IDMachines, will join Van Till as well.
New and returning exhibitors rushing to reserve space for nation's third largest security show.
Winners of the Humanitarian and Corporate Social Responsibility (CSR) awards from Mission 500 will be honored at ISC West on April 11, 2013.
Qolsys, a platinum sponsor, is bringing a groundbreaking, residential solution to ISC WEST 2013.
During the 23rd NYC Security Conference & Expo, Patrick Timlin will be honored as ASIS New York City Chapter's Person of the Year at the awards luncheon.
During the luncheon, Shapiro will share insights and anecdotes about today's most successful businesspeople embracing the same qualities that defined historical and mythical ninja clans. Shapiro coined a term for these businesspeople – "ninja innovators."
Security-Net, a provider of security integration services, held its annual shareholders meeting in late January at the Newport Beach Marriott Hotel and Spa in Newport Beach, Calif., marking the organization’s 20th anniversary.
According to Tim ‘TK’ Keanini, chief research officer for nCircle, the public perception of the country with the most-advanced, nation-state, cyber attack capabilities has clearly been shaped by recent media coverage.
This year, TREXPO is joining forces with GovSec– the Government Security Conference and Expo – to bring together leaders in law enforcement, military, security and federal agencies in a single location.
Roy Spence, marketing maven, to inspire and enlighten on the importance of what businesses stand for and about the purpose that drives us.
SentryCon 2013, the 18th Annual Dealer Conference, will be held in Mobile, Alabama, April 17th-18th.
Community's sound system provides intelligible speech and quality music, all while abiding by the multi-use requirements of the venue.
MP5000 barriers are able to stop 7.5 ton (6400 Kg) vehicles traveling 40 mph (48 kph).
In response to the recent release of a study sponsored in part by Johns Hopkins entitled “Hospital-Based Shootings in the United States: 2000-2011," the International Association for Healthcare Security & Safety [IAHSS] believes there is some valuable information that was garnered from the evaluation of violence within hospital facilities, however several key strategies were not discussed.
Department of Homeland Security Secretary Janet Napolitano will address attendees at the ASIS International 58th Annual Seminar and Exhibits (ASIS 2012), the world's largest educational event and trade show dedicated to security, on Monday, September 10 at noon.
All the action at the Republican National Convention won't exist within the confines of the Tampa Bay Times Forum when a record number of participants gather next week.
Career Pavilion IT and security management practitioners attending ASIS 2012, September 10-13 in Philadelphia, can get the tools and advice to advance their careers at the ASIS and (ISC)² Career Pavilion located in the Grand Hall between the Convention Center and Downtown Marriott.
HID Global, a provider of solutions for the delivery of secure identity, will showcase its comprehensive portfolio of secure government identification technologies and issuance systems at the American Association of Motor Vehicles Administration International Conference and Exhibition in Charlotte, North Carolina, August 20 - 22.
Delta Scientific, the leading manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, today announced that 26 16-foot Delta MP5000 mobile deployable vehicle crash barriers with be used by the Secret Service at both upcoming national political conventions.
In developing a comprehensive physical security strategy, it’s important to include a key control plan as part of the overall security package. Key management systems can reinforce access control policies that are already in place and can also help to reduce the costs that are associated with lost keys or unmanaged access. It’s also important to know that it is never too late -- or too early -- to implement a key control and management plan as part of an overall physical security strategy. And if you’re not sure about how to proceed, the following three questions may provide the answers for you.
- By Fernando Pires
- Aug 07, 2012