This message contains images. If you don't see images, click here to view.
Advertise in this news brief.




Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit March 12, 2014

Home   About   Join   Members   Events & News   Press   Contact     

 



IAPSC Annual Conference 2014
April 27-30 in New Orleans
Come jam with the IAPSC at the largest and most exclusive gathering of top security consultants in the nation, the IAPSC Annual Conference 2014. This year's conference offers a wide range of topics focused on Building the Business, Practice Management, Forensics & Physical Security, and Technical Security. With each carefully tuned session, you'll interact with top experts who will discuss major trends affecting the security industry, including practical ways to integrate technology to drive business, how to become a true trusted advisor, and advice on how to successfully bring your expertise into the courtroom. The IAPSC Members Annual Business Meeting will also be held during the conference at 8:30 a.m. April 29.
For more information, visit the conference website. Register now.
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article




The wait is over — IAPSC's website upgrades are here!
IAPSC
The IAPSC website now offers more robust capabilities that will drive more business to our members. New and upgraded features include: Find A Consultant — a search engine to find consultants by name, company and/or expertise, Speaker Bureau — a tool to find speakers by area of expertise, Consultant Directory — a tool to view all members, Send Email to Members — a tool for members to contact other members (now sortable by specialty), and View My Profile Activity (coming soon) — a tracking and reporting tool for members to see how often their profile is viewed and how this compares to an average of other members. As of Feb. 27, members are invited to update their website login credentials and consultant profiles
to take full advantage of this member benefit!
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


IAPSC Education at ISC West
IAPSC
This popular, one-day intensive seminar will show you how to develop, market and deliver security consultant services effectively. Learn how to avoid the costly mistakes that can sabotage the success of your security program. IAPSC members are entitled to complementary admission to the exhibit hall, 20 percent off SIA Education@ISC, as well as VIP Executive's Club benefits. Contact iapsc@iapsc.org for the registration link.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Welcome new member: Christopher D. Hayes, JD, CPP
IAPSC
Christopher Hayes joined IAPSC as an Internal Consultant member in his capacity as security manager for Ameridose, LLC. Hayes is currently the security advisor to the general manager and is responsible for multi-site security management, implementing physical security improvements, making recommendations to improve physical security and practices for new and existing facilities, conducting threat and vulnerability assessments, and much more. Prior to Ameridose, he spent almost nine years as the security manager at Cambridge Health Alliance Whidden Memorial Hospital for Securitas Inc. Hayes earned his JD, specializing in business and corporate law, from Massachusetts School of Law in 2002.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Why every security consultant should attend the IAPSC conference
SecurityInfoWatch.com
The International Association of Professional Security Consultants is one of the most widely respected and recognized security associations in the industry. Its rigid membership requirements allow potential clients to select from an elite group of professional, ethical and competent security consultants. The annual IAPSC conference helps consultants build their practices with training and networking opportunities that focus on the following.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


The other shoe drops for Target's CIO
Forbes
To the surprise of few, Target CIO Beth Jacobs resigned recenlty, taking the fall for a massive data breach before the Christmas holidays that reverberated throughout the retailer's quarterly revenues. The only surprising thing: Jacobs didn't resign sooner.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Auditor: Companies prefer not to investigate security breaches
CSO
Mooted mandatory breach-disclosure laws would present a major change to the handling of forensic information-security investigations because Australian companies currently prefer not to investigate security breaches, an experienced forensic investigator has warned. "We do plenty of digital forensic investigations into companies that suffer breaches," Ty Miller, director of penetration-testing and security-auditing firm Threat Intelligence told CSO Australia. "Not one of them, so far, has wanted to go after it legally."
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Floods show a lack of crisis planning is devastating
theHRDIRECTOR
The country may currently be basking in late spring temperature, but the recent floods impacted on businesses across the country, resulting in major disruption to operations and leaving a significant number of small businesses counting the cost of the damage and facing hefty recovery costs. "Many small business owners don't like to think that that the worst might happen to their business," says Jo Eccles, business adviser at the national business organization, The Forum of Private Business, "but when it does it can have devastating consequences."
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Competitive intelligence on the horizon
Strategic Sourceror
To succeed in business, you must understand your competitors and keep up to date on market trends. Competitive intelligence is information that has been analyzed to the point where you can make a decision. It is a tool to alert management to early warning of both threats and opportunities. Basically, it helps you to better understand your industry and influences the actions of your company. A company set up for failure is one that only pays attention to its own operations and does not gauge itself against competitors. Competitive intelligence can be tactical or strategic — tactical focuses on short term gains and improvements while strategic focuses on long-term issues, such as large risks.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Top tips to stop cyber criminals from targeting your small business
The Guardian
Security breaches by cyber criminals can cause huge financial damage to small businesses. Research published last May by the Federation of Small Businesses found that cyber crime costs its members around £785 million per year in total. As well as the financial cost, there's also the potential damage to a company's reputation. However SMEs can increase their online security with a few straightforward steps and without spending a fortune. In this article, seven experts offer their advice on how SMEs can protect their business and customers online, and make sure they've complied with data protection requirements.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Securing software requires design, testing and improvement
Dark Reading
Software makers need to adopt secure development methodologies and make their processes more transparent to assure customers that security is a shared goal, experts told attendees at the RSA Conference in San Francisco recently. On a panel of vulnerability-assessment firms, software companies and customers, speakers stressed that software developers should take the initiative, design for security from the start, frequently test their products, and communicate vulnerabilities and risks to the customer.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


5 ways oversharing can lead to identity theft
ABC News
Everybody knows there are certain things you can't share on the Internet without the risk of serious consequences — photos of yourself in compromising positions, intimate details of your travel plans, or what you really think of your boss, for instance. But there are other morsels of information we share with regularity and without considering the consequences to our own detriment, as one of ZDNET writer Zach Whittaker's colleagues found out recently after granting Whittaker permission to try and hack him.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE
 



IAPSC News
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Ashley Whipple, Senior Content Editor, 469.420.2642  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
iapsc@iapsc.org | www.iapsc.org

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

Feb. 11, 2014
Jan. 14, 2014







7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063