This message was sent to ##Email##
|
March 08, 2016 |
| | | |
|
|
IAPSC
The IAPSC invites you to join other best-in-class independent security consultants at the IAPSC Annual Conference 2016 on April 17-20 in Charleston, SC. Participants may be eligible to receive 14.5 hours of CPE credit toward ASIS re-certification or other professional certifications.
In addition to numerous opportunities to connect with your colleagues and valuable one-on-one time with leading security manufacturers, the conference will host a focused 3-days of discussion on topics affecting our industry today including: Cybersecurity — What Physical Security Consultants Need to Know, International Counter-Terrorism, Data Retention and Liability, Maximizing Opportunities through Teaming, Global Travel Risk Management, and many more! View the Full Program.
REGISTER NOW
IAPSC
The Interest Groups facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members to survey the needs of the membership in their specialized areas and discuss current topics, best practices and guidelines, challenges members are experiencing, and trends in the industry. These groups may also be a forum for collaborating on working group projects, seminars, and networking activities. It's easy to participate in the monthly teleconference from your computer or your phone, via GoToMeeting.
We hope to connect with you at an upcoming Interest Group session:
March 18 @ 9 a.m. PDT — Security Design & Engineering
April 15 @ 9 a.m. PDT — Cybersecurity.
May 20 @ 9 a.m. PDT — Forensics and Security Management.
Sign up now by contacting iapsc@iapsc.org
IAPSC
Join us for the IAPSC "Successful Security Consulting" Workshop on Tuesday, April 5, 2016, 8:30 a.m.-5 p.m. at Sans Expo Las Vegas. This popular, one-day intensive seminar will show you how to develop, market and deliver security consultant services effectively. Learn how to avoid the costly mistakes that can sabotage the success of your security program. IAPSC Education Chair Frank Pisciotta is managing the program with the following presenters: David Aggleton, Harold Gillens, Ken Wheatley, and John White.
View the SSC program outline and register now.
IAPSC
On behalf of ISC and SIA, we'd like to invite you to join us at ISC West 2016 at the Sands Expo in Las Vegas. ISC West is the leading physical security event to unite the entire security channel, from dealers, installers, integrators, specifiers, consultants and end-users of physical, network and IT products. The Exhibit Hall will be open April 6-8 and SIA Educational sessions will be April 5-7. IAPSC Members: Contact us for FREE exhibit hall registration.
IAPSC
On March 3, 2016, the U.S. Department of State’s Bureau of Consular Affairs released an updated version of its Worldwide Caution. This report is an annotated version of that document, produced by the Overseas Security Advisory Council (OSAC) Research & Information Support Center (RISC).
Read the report here.
IAPSC
NYA International, a global risk and crisis management consultancy, has released their Global Kidnap Report dated February 2016. Here is a link to view the report.
InfoWorld
The National Security Agency tried to drum up support from the security industry for its plans to continue its cybersecurity operations. The NSA has two key missions: foreign intelligence-gathering and information assurance. One mission helps the other, as intelligence gathered by one side can be used by the other team to improve how government networks and private sector networks are protected. The NSA will pull together its offensive and defensive capabilities as part of the NSA21, or NSA in the 21st century, plan, said Michael Rogers, commander of the United States Cyber Command and director of the NSA, at the RSA Conference.
READ MORE
By Yvette Craig
The showdown between the FBI and Apple has become a dizzying kaleidoscope of issues reaching from the campaign trail to office cubicles around the country. The dispute could affect privacy, security and safety in the United States. And law enforcement officials, whose duty is to protect public safety, are wondering what implications this will have on future criminal cases. Law enforcement professor Christopher L. McFarlin says the answer isn't so simple.
READ MORE
Dark Reading
U.S. commanders mounted a cyberoffensive against Islamic State in Syria for the first time in recent weeks by deploying military hackers against the extremist group's computer and cellphone networks, according to the Pentagon. The digital assault, launched from Ft. Meade in Maryland, marked the first major integration of U.S. Cyber Command into a major battlefield operation since the command was established in 2009.
READ MORE
National Law Review
In recent years, churches, movie theaters, schools, and office buildings have all been affected by headline-grabbing violence. Not all workplace violence makes the news, however. The United States Department of Labor defines workplace violence as "any act or threat of physical violence, harassment, intimidation, or other threatening disruptive behavior that occurs at the work site," noting that workplace violence may include anything from "threats and verbal abuse" to physical assaults and homicide.
READ MORE
Security Intelligence
Breaches and identity theft involving medical data are on the rise. According to the Ponemon Institute, criminal attacks in health care have increased by 125 percent since 2010 and are now the leading cause of medical data breaches. The study also found that 91 percent of health care organizations have experienced at least one data breach, costing more than $2 million on average per organization. The American Action Forum estimated that medical breaches have cost the U.S. health care system more than $50 billion since 2009.
READ MORE
TechCrunch
Cybercrime is an enormous problem — a nemesis of the federal government, America's biggest corporations and tens of millions of individuals. But there is now legitimate hope that a big piece of the cybercrime problem can eventually be solved. Despite the fact that the highest-level attacks are very sophisticated, more than 90 percent are lower-caliber attacks built on the foundation of off-the-shelf components, purchased in shady underground marketplaces.
READ MORE
NPR
Apple's legal battle with the FBI over iPhone encryption continues: A federal magistrate, at the FBI's request, has ordered the tech giant to write software to help investigators circumvent iPhone security features to access a phone used by one of the San Bernardino shooters. Apple is fighting the order, calling it dangerous, illegal and unconstitutional.
READ MORE
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|