This message was sent to ##Email##
|
January 10, 2017 |
| | | |
|
|
|
IAPSC
This year, the IAPSC Annual Conference will be hosted in the live music capital of the world, Austin, TX! Register today and enjoy one of the foremost conferences for security consultants. Register by January 23, 2017 to save an additional $50!
Be one of the first 15 full conference registrants and you'll be eligible to win a registration gift from the IAPSC, including a FREE room night in Austin!
In addition to numerous opportunities to connect with your colleagues and valuable one-on-one time with leading security manufacturers, the conference features topical educational sessions that affect the security industry and your business, including:
- Growing Your Business One Person at a Time
- Dealing with Civil Unrest
- Protecting You & Your Clients from the Cloud
- Drones — What We Can and Cannot Do
- Utilizing the IAPSC Forensic Methodology in Case Work
- Security Planning for Large Scale Events — featuring speakers from SXSW and Austin City Limits
- Preventing Child Sexual Abuse in Youth Serving Organizations
- Cyber Security Standards
Visit the Conference Website to view the Full Program
IAPSC
The Nominating Committee is accepting nominations of members in good standing for Board of Director positions for 2017. Offices of President, Vice President, Secretary, and Treasurer will serve a for the one (1) year term 2017-2018. Elected Directors will serve a two (2) year term 2017-2019. The election will be held and new terms will begin at the Annual Members Business Meeting during the IAPSC Annual Conference on May 7-9, 2017, in Austin, TX. Nominations are due by Feb. 1, 2017. For more information download the call for nominations and the candidate statement guidelines or contact iapsc@iapsc.org.
Promoted by
|
|
|
 |
By Rebecca Harris, Canadian Business
IAPSC Member Wael Lahoud, CISSP, ESS, GCCC, PSP was mentioned and provided input on the following article published by Canadian Business, along with other Canadian renowned cybersecurity experts.
"Firewalls, anti-virus software and spam filters are the tent poles of basic network security. However, with the rise of Internet of Things (IoT) devices, some organizations don't actually know what is connected to their network," says Wael Lahoud, director and principle of Goldmark Security Consulting.
"Even from a physical security perspective, we're seeing more cameras and intrusion devices being connected on the network," he says. "While these are going to help protect the premise, that could be another door in for a cyber breach."
READ MORE
IAPSC
We are pleased to announce that Sean McClure will now be working with IAPSC's management team in the role of Administrative Coordinator. Sean will be primarily focused on supporting IAPSC's sponsorship fulfillment, CSC certification, Security Interest Group meetings, and membership processes. You may reach him at the IAPSC Office at smcclure@iapsc.org or 415-538-0288.
IAPSC
IAPSC Members, if you have not already done so, it's time to renew your annual membership in the International Association of Professional Security Consultants. If you have not already done so, you can renew online here, download this form, or call the IAPSC office at + 1-415-536-0288. We look forward to your continued participation!
 |
|
HID Global® is the leading provider of products and services that help organizations manage secure identities. Visit our Consultant Corner to join our growing community. MORE
|
|
IAPSC
Fri., January 20 @ 9 a.m. PDT @ 9 a.m. PDT — Cybersecurity
Fri., February 17 @ 9 a.m. PDT — Forensics and Security Management
Fri., March 17 @ 9 a.m. PDT — Security Design and Engineering
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges, and trends in the industry. It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
TechCrunch
Following an extremely contentious election cycle, the Department of Homeland Security (DHS) will label election systems in the U.S. as "critical infrastructure." The new categorization would allow election systems to "receive prioritized cybersecurity assistance" from DHS, although this would only be by request of a state or local government.
In a press release, Homeland Security Secretary Jeh Johnson explained that the designation will apply to "storage facilities, polling places, and centralized vote tabulations locations," as well as "voter registration databases, voting machines, and other systems to manage the election process for federal, state and local governments."
READ MORE
USA Today
Federal and local officials have been quietly scrambling to find space for tens of thousands of demonstrators expected to flood the capital for President-elect Donald Trump's inauguration later this month.
At least 26 protest groups are seeking or have been granted permits — more than four times the average number for past inaugurations — in a show of force that will likely test a sprawling security operation.
READ MORE
CNET
The Federal Trade Commission is taking D-Link to court, accusing the company of poor security practices for its routers, web cameras, baby monitors and other products.
The lawsuit (PDF), filed in San Francisco's district court, argues that D-Link failed to meet security standards from 2007, leaving widespread vulnerabilities open to hackers.
The commission alleges that D-Link coded easy to crack login credentials into its camera software, enabling hackers to easily spy on the company's customers.
READ MORE
USA Today
Airports across the country stepped up security measures Friday in the wake of the Fort Lauderdale-Hollywood International Airport shooting that left 5 dead and 8 injured.
Officials in New York added extra police patrols as well as officers armed with heavy tactical weapons at the region's major airports. The Port Authority of New York and New Jersey, which owns John F. Kennedy International Airport, LaGuardia Airport and Newark-Liberty International Airport, said heightened security included deployment of armored vehicles and K-9 explosives detection teams.
READ MORE
SecurityInfoWatch
Media coverage of cybersecurity usually focuses on mega data breaches (i.e. Yahoo) and large-scale attacks such as the Dyn DDoS attacks, which could be why we have seen more and more companies prepare for these incidents. According to the Ponemon Institute, 86 percent of companies now have a data breach response plan compared to 61 percent in 2013. However, what is often less covered by the media is the subsequent fraud risks consumers and businesses face.
READ MORE
TechCrunch
Security is one of the few tech sectors that thrives primarily thanks to the cruel intentions of bad actors. White hats and black hats exist symbiotically. Without the criminal element to create demand, CISOs would just hang up their spurs and call it a day.
While the tension between adversaries is a necessary function of the security industry, and spurs innovation, 2016 was an especially brutal year for the good guys.
READ MORE
CSO Online
The year 2016 has not really been a standout for information security. This was the year that the Russians hacked the DNC (and now the RNC, apparently), the year that ransomware authors bricked an entire transit system, and the year that the IoT literally broke the internet. Like most of the population, the security community can't wait to say goodbye to 2016.
READ MORE
Fortune
The prevalence of bring-your-own-device culture in the corporate world means workers can be more productive and connected. But as hackers hone their skills at breaking into cell phones, the sprawling range of devices prevents a tempting target for crime and espionage.
In response, a new market segment is emerging within the cyber-security field that involves companies that detect and mitigate attacks on mobile devices. In a recent research report, Gartner dubbed this new field "mobile threat defense," and described a range of services — including scanning for risky apps and threatening WiFi networks — that the firms are offering.
READ MORE
The Next Web
Technology is a beautiful thing. It can make life more convenient by allowing people to push a button and get something good — a ride home, a vacation rental, or dinner.
It's also a powerful tool that can improve safety and security in ways not possible before. But as the fears of private information in the hands of others rise, how can we put these fears at ease?
Here are a few technologies bettering security and how you can keep yourself from becoming a security statistic.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|