This message contains images. If you don't see images, click here to view.
Advertise in this news brief.




Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit April 08, 2014

Home   About   Join   Members   Events & News   Press   Contact     

 



A message from the IAPSC president
IAPSC
Frank Pisciotta, MPA, CSC shares details about PR opportunities for attendees at the upcoming annual conference, real results and a member testimonial about the recent IAPSC website upgrades, and feedback on a new course offering at ISC West and ASIS 2014. Read the full President's Message here.
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article




Complete IAPSC Conference schedule — now available!
IAPSC
The IAPSC Annual Conference on April 27-30 in New Orleans has been built to provide you with the tools and knowledge to not only keep you at the forefront of the security industry, but to run your business(es) for maximum profitability. Focusing on four specific tracks, Building the Business, Practice Management, Forensics & Physical Security, and Technical, sessions cover a range of topics including: keys to becoming an expert witness, expanding your reach through teaming on projects, using technology to increase business efficiency, as well as advanced crime forecasting and risk analysis. View the complete conference program here.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Members — vote now!
IAPSC
IAPSC is accepting member votes for the IAPSC Board of Directors election and proposed amendment to the IAPSC Bylaws through April 12. If you will not be present for the live election during the Annual Members Business Meeting on April 29 in New Orleans, please log in to your member account at www.iapsc.org and visit the Members' Library to download the proxy ballots and more information.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Tomographic detection by G.I. Forstater
IAPSC
What exactly is tomographic detection? Tomography is actually a solution to the problem of super imposition of structures when taking slices in X-ray, radio frequency or in our discussion, using Wi-Fi in the gigahertz range. Super imposition is when you get layer upon layer of things you really don't want to see.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


'CSI' IT: Forensic security skills for IT professionals
Computer Weekly
TV shows such as "CSI" have popularized the world of digital forensics, glamorizing the field and piquing the interest of a generation of graduates and career-movers writes Kevin Waugh. Because of this, it would be natural to assume that most businesses could now call on an extensive pool of talented experts in the forensics field capable of investigating technical security issues, such as the source of internal intellectual property leaks, or the theft of sales books by ex-employees moving to rival companies. The reality is somewhat different.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


6 ways the 'Internet of Things' will transform enterprise security
Computerworld
Most enterprise security organizations are unlikely to have a spamming refrigerator on top of their list of things to worry about. But news earlier this year that an Internet-connected fridge was co-opted into a botnet that sent spam to tens of thousands of Internet users is sure to have piqued the interest of at least a few. If nothing, the incident showed how even a benign consumer appliance could pose a danger to enterprises if connected to the Internet without proper security protections.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Want to get published?
MultiBriefs
In an effort to enhance the overall content of IAPSC News, we'd like to include peer-written articles in future editions. As a member of IAPSC, your knowledge of the industry lends itself to unprecedented expertise. And we're hoping you'll share this expertise with your peers through well-written commentary. Because of the digital format, there's no word or graphical limit, and our group of talented editors can help with final edits. If you're interested in participating, please contact Ronnie Richard to discuss logistics.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


A lesson in social espionage: How to dissect a competitor's social strategy
Search Engine Watch
Competitive intelligence is incredibly important for analyzing and tracking your competitors, whether it's in SEO, PPC or social media. The following exercises, using only public data, only scratched the surface of the analysis and insights that are possible to glean from this data. It shows how much you can learn about an industry, a company or a competitor by carefully dissecting their social activity.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Labor Law: Is your workplace safe?
Work it, Richmond
Karen Michael, an attorney specializing in practical work law solutions, writes: "The most recent workplace violence incident that occurred at Ft. Hood will cause employers to once again question whether this type of thing could happen at their workplaces. I can expect calls from clients, as I have in the past after events like this, asking me what they need to do to make their workplaces 100 percent safe. The reality is, no one can guarantee a 100 percent safe workplace, regardless of what processes or training the employer implements. However, I can offer tips to mitigate the chances and be ready if it happens."
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Repeat after me: Model your security threats 1st
InfoWorld
Organizations often deploy defenses before they know which attacks will nail them. A new book helps security professionals model those threats and design defenses.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


18 must-have paid tools for PPC success
Search Engine Watch
In enterprise PPC, or for tougher tasks like landing page optimization, paid tools are necessary to make an impact — and they usually pay for themselves many times over in improved results. Remember, most paid tools offer free trials, so there's little risk in testing them out. Here are 18 must-have paid tools for PPC success, suggested by eight PPC experts.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Tesla Model S security system vulnerable to outside hacking
The Daily Caller
A security researcher has discovered a way to locate, hack and unlock Tesla Motors premiere Model S from a remote computer using traditional hacking techniques. Nitesh Dhanjani announced his findings at the Black Hat Asia security conference in Singapore recently, where the author of multiple books on hacking revealed that by cracking a six-character password transmitted wirelessly over the Internet, a hacker could locate and gain access to any Model S.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


TRENDING ARTICLES
Missed last week's issue? See which articles your colleagues read most.

    Get certified in the 'Big Easy' April 30 (IAPSC)
IAPSC founder Chuck Sennewald's book 'Security Consulting' receives review from ASIS Dynamics and on SecurityManagement.com (IAPSC)
IAPSC member Randy Atlas contributes to article on active shooters and building security (BUILDINGS)
Shedding light on Sandy Hook (Security Management)

Don't be left behind. Click here to see what else you missed.
 



IAPSC News
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Ashley Whipple, Senior Content Editor, 469.420.2642  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
iapsc@iapsc.org | www.iapsc.org

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

March 25, 2014
March 12, 2014
Feb. 11, 2014
Jan. 14, 2014






7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063