ISC West 2018 to Debut Vast, Diverse Lineup of Educational Sessions

ISC West will debute its SIA Education@ISC session lineup for the 2018 show in Las Vegas in April.

These 85-plus accredited sessions, covering a range of industry topics, are designed to arm attendees with the assets and knowledge they need to protect and defend against developing threats in today’s complex security landscape. ISC West 2018 will take place April 11-13 at the Sands Expo in Las Vegas, NV. SIA Education@ISC will kick off a day prior to the exhibits, on April 10.

Through its partnership with SIA, ISC West has organized a comprehensive program for attendees from all industries, roles and functions across physical, IT and IoT security. Now that registration is officially open for ISC West, the Connected Security Expo and the Unmanned Security & Safety Expo, attendees can sign up to take part in key sessions. Here is a sample of available sessions.

How Advanced IoT Technology can Create the Connected Workplace of the Future
The Internet of Things (IoT) is booming, but there’s no one-size-fits-all approach for deploying an IoT project in the enterprise, nor for securing it. This session will provide attendees with a model for implementing an end-to-end IoT ecosystem and how to leverage its predictive benefits to improve efficiency and security.

You Are the Password: Frictionless Biometric Security
Biometrics will continue to be a hot topic this year, with everyone wondering if using facial recognition or fingerprints is truly more secure than traditional passwords and pins. This session will define where we are with biometrics, how it’s changing the way we interact and transact, and how its increasing popularity will impact our relationship with physical devices.

Active Shooter Workshop
Today’s defense environment is unpredictable, and active shootings are a real concern for businesses and communities. Back by popular demand, join this hands-on workshop to learn how to protect and defend from a communications and infrastructure perspective.

Another Brick in the Firewall: Security Leaders Discuss The Elements of Complete Cyber Protection
As a 50-year-old brand, ISC West has evolved from a physical security event to a converged security event, adapting to stay on the cusp of the changing environment. This diverse panel comprised of experts across intelligent power, surveillance, access control, identity management and cybersecurity will address these vital topics.

Case Study of Law Enforcement Uses of UAVs
Listen to a firsthand account of how the Nevada Highway Patrol has pioneered the use of unmanned aerial vehicles (UAVs) to investigate motor vehicle crashes. A case study will be presented showing the capabilities of UAVs to speed up on-scene investigations, allowing roadways to be cleared faster. A comparison of the data obtained by the UAV and by a total station will be presented.

“Each year, our mission is to provide attendees with the knowledge, strategies and tactics they need to fight emerging threats, straight from industry experts who are experiencing the same security concerns,” said Will Wise, group vice president of the ISC security portfolio at Reed Exhibitions. “This year is no exception; we’re providing education covering everything from access and ID management to connected security to video surveillance to unmanned systems to IoT and AI, and more. We’re looking forward to continuing to provide that expert-level thought leadership we’re known for and to help cross-functional teams learn and collaborate.”

About the Author

Ralph C. Jensen is the Publisher/Editor in chief of Security Today magazine.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.