The Human Element

Last night, the Security Today team was lucky enough to attend a small, intimate dinner put on by i-Pro Americas Inc. at the Smith & Wollensky Steakhouse at the Venetian. After a brief welcome by President Bill Brennan, two tables of about 15 people each dove into a four-course dinner including the biggest ribeye steak I’ve ever seen and a half-pound slice of rich chocolate cake. (I’m still riding the sugar high as of this writing at 12:37 a.m.).

Most of us gathered were strangers. Shop talk lasted the first ten or fifteen minutes, but as the first course began soothing our stomachs, the conversation spun off in a dozen unexpected directions. We talked about Vegas, previous travel experiences, dream travel destinations. How we spent our lockdowns. Star Wars, the Marvel movies, the Big Bang Theory, Bob’s Burgers. We debated the minute cultural differences between our various home cities, from Rockford (Illinois) to Dallas to Charleston to London. The Beatles. Old college friends we used to be close with but now only talk on birthdays. Gambling addiction and alcoholism. The Russia-Ukraine conflict. By the time the waiters were removing our entree plates, it felt less like a work dinner and more like a gathering of old friends..

Anyone who’s been to a conference knows how overstimulating and intense they can be. You wake up and you’re on for 14–16 hours straight, from the conference itself to happy hours to dinners to afterparties. You’re pushing products and solutions and branding and messaging and networking and synergizing. You’re wearing your work mask from the time you wake up to the time you go to bed. I clocked in at 20,165 steps on Wednesday and 18,489 steps Thursday. .

(Please don’t think I’m complaining—when these kinds of large-scale events only happen once or twice a year, it’s just the nature of the beast.).

We talk about the human element of security, but we don’t talk much about the human element of conferences. The last thing I expected to happen last night was to have an in-depth conversation about the stage-play sequel to the Harry Potter series. And by meal’s end, I was equally surprised to be trading business cards with my dinner companions—not for professional reasons, because work barely came up; but because I’d met some pretty cool folks and wanted to be able to keep in touch.

About the Author

Matt Jones is senior editor of Spaces4Learning and Campus Security and Life Safety. He can be reached at [email protected]

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities