How to Prepare for ISC West

No matter how many times you've been to ISC West, the sheer size of the show will never cease to amaze. It is the largest security industry tradeshow in the U.S., after all. This year, there will be more than 1,000 exhibitors and brands there – all eager to show their latest products and technologies. When attending ISC, it's always best to plan ahead.

Show Dates and Times

It's too easy to get overwhelmed at ISC West. Make sure you know which days you'll be there, and when the exhibit hall opens. Here's a quick guide:

For SIA Education @ ISC, Tuesday hours are from 8am until 5pm. On Wednesday and Thursday, hours are a bit different – 7:30am to 3pm.

For the Exhibit Hall, Wednesday and Thursday hours are from 10am-5pm. Friday the hall closes at 3pm.

Check out the Floor Plan

With so many exhibitors and booths in one place, it's almost impossible to find your way around. Luckily, ISC West provides a floor plan that you can download from their site. I like to print out a copy or two and take with me – you never know when they'll come in handy.

Bring a Bag

I like to take a backpack with me to the show. It's easier to keep track of and it doesn't hurt my shoulder like a purse or messenger back would after an entire day spent walking and rushing from one booth to another. It's also nice to keep a water handy. Hydration is important!

Show Up a Little Early

No matter if you have a booth appointment or attending a session when you first make it to the show, arrive a few minutes early. Grab a snack, a coffee and gear up for what's ahead. Scope out the areas you need to be for the few hours or so, and then you can settle in and get things done. But most of all: have fun! It's Vegas!

About the Author

Lindsay Page is the editor for Campus Security & Life Safety magazine, and the senior editor for Security Today.

Featured

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

  • Deploying in a Hybrid, Cloud Environment

    The way organizations manage access control is evolving. Traditional on-premises systems come with high IT and server requirements. At the same time, fully cloud-based solutions may not meet the needs of every facility. Read Now

  • Facing Facts for Facilities

    Despite the proliferation of constantly evolving security solutions, there remains a troubling trend among many facility operators who often neglect the most important security assets within their organization. Keys and shared devices like radios, laptops and tablets are crucial to successful operations, yet many operators are managing them haphazardly through outdated storage systems like pegboards and notebooks. Read Now

  • Report Reveals Security Training Reduces Global Phishing Click Rates by 86%

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, today launched its “Phishing by Industry Benchmarking Report 2025” which measures an organization’s Phish-prone Percentage (PPP) — the percentage of employees likely to fall for social engineering or phishing attacks, indicating the organization’s overall susceptibility to phishing threats. This year’s report found a global average baseline PPP of 33.1%, meaning a third of employees interact with phishing simulations before taking part in best-practice security awareness training (SAT).COVER 2025-PIB-NA-Report_EN-US Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.