This message contains images. If you don't see images, click here to view.
Advertise in this news brief.




Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit May 19, 2015

Home   About   Join   Members   Events & News   Press   Contact     

 


IAPSC NEWS

IAPSC welcomes new president
At the Annual Conference banquet on April 21, 2015 in Napa, California, IAPSC welcomed newly elected President Harold Gillens, PSP, CFC, CHS-III (left) and thanked outgoing President Frank Pisciotta, MPA, CSC (right) with a plaque recognizing his two years of excellent leadership of the Association.
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
  


Call for IAPSC member comments — AG-01 CAD symbols
IAPSC
The comment period for the Architectural Graphics Standard – CAD Symbols for Security System Layout – Release 3.0 (AG-01) draft is now open. IAPSC members are invited to submit written comments, edits and updates may be submitted for review to Frank Pisciotta (fp@securingpeople.com) by Friday, May 22 at 12 p.m. PST. Please note that the draft is not an exhaustive document. Formatting will be completed before the document is published.

Download the AG-01 Draft

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


IAPSC Successful Security Consulting Seminar at ASIS 2015
Early bird registration through May 31!

IAPSC
This popular, one-day intensive program presented by leading technical and management security consultants will show you how to develop, market and deliver security consultant services and how to avoid the costly mistakes that can sabotage the success of your clients’ or your own security program. The program is filled with practical information on just how to offer and deliver security consulting assignments starting with establishing your practice, finding clients, networking with other consultants, and executing security management and technical aspects of consulting from the initial consulting assignment through security assessments, designs and specifications, procurement, and implementation. A comprehensive workbook of sample proposals and reports will be provided each attendee. ASIS Seminar attendees who would potentially benefit from this course include:
  • Security consultants
  • Manufacturers
  • Dealers/installers
  • System integrators
  • Internal consultants (management & technical)
  • Systems designers, specifiers, engineers & architects
  • Security professionals (corporate and government)
  • Law enforcement professionals
Program # 1509-CONSU
Register now

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Save the date
IAPSC Annual Conference 2016 on April 17-20
Charleston, SC


Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


BUSINESS & MANAGEMENT


Stadium security and safety gets continental look
FIFA.com
The FIFA/CAF Regional Seminar for National Security Officers ended on a high note with participants hailing the importance of an opportunity to discuss issues of security and safety at the various stadia. The overall aim of the seminar was to provide assistance and equip the Security officers to handle related issues in their respective associations.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


How retailers can protect against security breaches
SecurityInfoWatch
When you swipe your card to pay at a store, how safe is your data? According to Symantec, the security of your data varies greatly depending on the sophistication of the payments system of the retailer you're visiting. Outdated point of sale systems are notoriously insecure and, according to Symantec, are particularly vulnerable due to a lack of encryption and reliance on outdated software. Symantec recently released its annual Security Threat Report, which unveiled shocking statistics about the state of security in retail.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


9 steps to minimize violence in your workplace
Corporate Counsel
Employers are beginning to realize that the violence isn't occurring solely on movie screens anymore, but also in unlikely places of business across the United States. As a result, employers are asking the obvious next question: "What can I do to protect my company and my employees?" Like workplace accidents involving machinery, injuries from workplace violence can be avoided (or at least severely limited) if some proactive measures are taken. Here are nine steps that are critical components of a successful workplace violence prevention program.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Biometrics a major part of personal security, expert says
Deseret News
The future of protecting personal and financial information may lie close to the human body. Specialists in the fields of biometric security and computer forensics say fingerprints, and retinal and iris scans are likely to become a regular component of "two-factor authentication" security systems in the years to come. "You think about it, it's a very secure future, right?" noted VLCM director of security Nate Stephenson. "Nobody can copy your finger. Nobody can copy your eye. Nobody can copy the veins and the heart rate that you have that’s unique to you."
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Missed an issue of IAPSC News? Click here to visit the IAPSC News archive page.


Health care workplace violence injuries up from 2012-2014
Medscape
From 2012 to 2014, workplace violence injury rates increased for all health care job classifications and nearly doubled for nurse assistants and nurses, according to data from the Occupational Health Safety Network. "The health care and social assistance sector accounts for the greatest proportion (20.7 percent) of private industry nonfatal occupational injuries among all sectors," write Ahmed E. Gomaa, M.D., from the Division of Surveillance, Hazard Evaluations and Field Studies, National Institute for Occupational Safety and Health, and colleagues in an article published in the April 24 issue of the Morbidity and Mortality Weekly Report. "The most common injuries are due to patient handling; slips, trips, and falls; and workplace violence."
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Single-option lockdown response is a failure for school shootings
Emergency Management
When drive-by drills, known as lockdown in most of the country, were widely used in response to school shootings with little or no adaptation of tactics, we began down a path that ultimately led to the tragic shooting at Sandy Hook that took 26 innocent lives. There were stops along the way in places called Columbine, Virginia Tech, Aurora and many others. These were all opportunities to learn that our model for response was at great risk from those who would seek to use our plan (or lack of plan) against us.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


TRAVEL & TRANSPORTATION


United will reward people who flag security flaws — sort of
Wired
United Airlines announced it's launching a bug bounty program inviting researchers to report bugs in its websites, apps and online portals. The announcement comes weeks after the airline kicked a security researcher off of one of its flights for tweeting about vulnerabilities in the Wi-Fi and entertainment networks of certain models of United planes made by Boeing and Airbus.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


IT SECURITY


Top security tools in the fight against cybercrime
Network World
Cybercrime is a massive global threat, and U.S. businesses are the No.1 target. For tips and advice about how best to defend against cyberattacks, Network World asked security pros to name their No.1, most valuable security tool. Many of the experts we interviewed pointed out that there is no silver bullet when it comes to security.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Traditional security approaches produce too many false positives
BetaNews
According to 62 percent of IT professionals, traditional security approaches produce too many alerts and false positives for them to handle. This is among the findings of a new study from research firm Enterprise Management Associates (EMA), sponsored by machine learning and automation specialist Prelert, which shows that 25 percent of organizations know they experienced a breach or significant cyber attack that incurred loss last year.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE
 



IAPSC News
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Esther Cho, Content Editor, 469.420.2671  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
iapsc@iapsc.org | www.iapsc.org

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

May 5, 2015
April 21, 2015
April 7, 2015
March 24, 2015






7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063