This message was sent to ##Email##
|
March 21, 2018 |
| | | |
|
|
Security consulting as a profession is expanding and there are vast career opportunities in this field. We’ve designed this year’s IAPSC Annual Conference for security consultants, and those interested in becoming consultants, to ready themselves to meet their client needs in this time of explosive demand.
Helping the security consulting professional stay at the forefront of client concerns is a primary focus of the IAPSC. The conference includes timely topics such as: future trends in security technology, threat assessment in the private sector, cybersecurity, and more. It will culminate in a private facility site tour of General Atomics Aeronautical Systems, Inc. where attendees will have the opportunity to meet the makers of the predator drone. New or prospective consultants are encouraged to attend the popular Successful Security Consulting pre-conference workshop on Sunday.
This year it will also be our distinct pleasure to welcome our IAPSC Founder, Chuck Sennewald, and his wife Precious as our honored guests for the conference and awards banquet.
We’ve included plenty of time in the program agenda for networking to build relationships with other consultants that can lead to teaming. In addition, the conference includes exhibits of the latest industry products and services so attendees can stay current on what’s new and what’s in development to best serve their clients.
Don't miss this gathering of the world’s top security consultants in San Diego, CA on April 29-May 1, 2018.
View the Program Agenda
Register Now
Promoted by
|
|
|
 |
IAPSC
Proxy Ballots are now available for members of the IAPSC who will not be attending to vote in-person at the IAPSC Annual Members Business Meeting during the Annual Conference in San Diego, CA. Proxy ballots must be received by the IAPSC office by April 14th in order to be counted. To download the final candidate statements and proxy ballot, please log in to the Members’ Library at www.iapsc.org and look under the Governance tab.
IAPSC
Jim Townzen is the Vice President of Security Risk Solutiosn for Townzen & Associates, Inc. in Tumwater, Washington. Jim has 25 years of experience in installation, service, design and planning of all types and sizes of access control, intrusion and video systems. This unique combination of skills are invaluable when helping clients select technology and create a functional serviceable system that they will be happy with for many years.
View his IAPSC Profile.
|
ONVIF conformant products allow you to create a flexible, cost-effective and future-proof system. ONVIF enables you to choose optimal products from different vendors. The conformant products allow you to be confident in their interoperability and makes integration of products from different vendors easier. Read more
|
|
|
|
|
Reach Your Prospects Every Week
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.
Connect with Highly Defined Buyers and Maximize Your Brand Exposure
|
|
|
|
|
IAPSC
Perimeter protection is a facility’s first line of defense. In a security-sensitive environment, advanced strategies that layer complementary detection and assessment technologies to mitigate risk are essential when critical infrastructure and assets are at stake. Why attend? VIDEOTEC assessment cameras protect perimeters and critical assets in the most harsh & hazardous environments. When paired with integrated technologies, smart perimeter solutions DETECT, DETER, DENY, DELAY and DEFEND. In this webinar, we will cover: Value of proper assessment cameras; Complementary technologies; and Strategical and tactical evaluations of perimeter security.
Register here
IAPSC
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges and trends in the industry.
Cybersecurity : Fri., April 20 @ 9 a.m. PST
Forensics and Security Management : Fri., May 18 @ 9 a.m. PST
Security Design and Engineering : Fri., June 15 @ 10 a.m. PST
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges, and trends in the industry. It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
Security InfoWatch
The reality of seeing a global cyber-attack that results in a real-life disaster seems to be growing daily. While government officials and other cybersecurity experts have been sounding the alarm bell for years about the potential physical threats posed by malicious online actors, they only thing that appears to be holding back catastrophe is mere dumb luck, which could soon run out.
READ MORE
CNBC
Just 13 percent of government employees believe they have complete personal responsibility for the security of their work devices or information, according to a survey by security services firm Dtex Systems.
READ MORE
CNN
More companies are ditching passwords and using fingerprints and other biometrics to stop hackers. Biometric authentication uses face, fingerprint or iris scans to quickly confirm a person's identity. You probably already use itap by touching the home button to unlock your phone.
READ MORE
Healthcare Informatics
About 62 percent of healthcare executives admitted to experiencing a cyber attack in the past year, with more than half losing patient data as a result, according to a new survey from Merlin International, a cybersecurity solutions provider for healthcare organizations, in partnership with the Ponemon Institute.
READ MORE
Dr. Eric Cole
The king of rock and roll, Elvis Presley was famous for "Taking Care of Business." But when it comes to your business's cybersecurity dashboard, do you have the right metrics and visibility to mount a proper cyber defense? No matter how many news stories about hacks, information theft and cyber espionage surface within your Facebook or Twitter feed, the idea that it could happen to your organization sometimes remains just that.
READ MORE
Forbes
Issues that carry the label of “epidemic” threaten humanity on a broad scale and have been the motivation behind some of our most shining achievements. Theft and security breaches related to identity are not just technology problems or nuisances to be tolerated; they have escalated to levels fitting of the label “global epidemic.”
READ MORE
Security Magazine
New research reveals the U.S. cities that are best at password security, with Minneapolis topping the list.
A study by password manager Dashlane scores cities based on several metrics, including average password strength and average number of reused passwords.
READ MORE
IsBuzzNews
Researchers have found that a number of connected home gadgets, including baby monitors and security cameras, can be hacked in minutes using a simple Google search.
READ MORE
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|