This message contains images. If you don't see images, click here to view.
Advertise in this news brief.




Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit July 15, 2014

Home   About   Join   Members   Events & News   Press   Contact     

 



IAPSC appoints new Bylaws and Education Committee Chairs
IAPSC
Leslie Cole, CST, CPP, was recently appointed as the new chair of the IAPSC By-Laws Committee. IAPSC would like to thank prior chair Curtis Baillie, CSC, for his valuable contributions while serving multiple years in this role. Rich Grassie, CPP, was appointed as chair of the new Education Committee, a merger of the Successful Security Consultant seminar and Certified Security Consultant designation committees aiming to enhance the association’s educational offerings. Any members who would like to volunteer for a committee should contact iapsc@iapsc.org.
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article




Becoming a Successful Security Consultant Seminar
IAPSC
The only course offered on how to successfully launch a new security consulting practice, develop a trust partnership with clients, and deliver essential security consulting services or jump-start an existing practice. This course is instructed by experts from IAPSC and offered as an ASIS 2014 Pre-Seminar on Sunday, Sept. 28 in Atlanta, GA.

Registration is now open.

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


IAPSC reception at ASIS on Sept. 28
IAPSC
Join IAPSC for this opportunity to connect with association members and other colleagues in the security industry before ASIS 2014. The event is open to IAPSC members and their invited guests. Mark your calendar for the evening of Sunday, September 28, 2014. To get details or RSVP: iapsc@iapsc.org
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


SPONSORED CONTENT


IAPSC 2015 — Save the date
IAPSC
Mark your calendar for the IAPSC Annual Conference, the largest and most exclusive gathering of top security consultants, on Sunday, April 19 - Wednesday, April 22, 2015 at the Meritage Resort & Spa in Napa, California. Conference planning is already underway, led by Committee Chair Lynda Buel, CPP, CFE, CSC and registration is set to open later this year.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Welcome new IAPSC member
IAPSC
Dr. Ahmed M. Alansary is the owner of Saudi Ansary Security Consultancy SASECON, a private firm located in the capital of Saudi Arabia, Riyadh. They provide a wide range of security consultations for government and private sectors with a focus on security risk assessments and training. Dr. Alansary holds a Ph.D. in Politics from Newcastle University in England.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE




5 strategies for handling workplace violence
EHS Today
It seems as if shootings in schools and worksites are so common that they only dominate the headlines for a news cycle or two. But even if the public is becoming desensitized to workplace violence, employers are keenly aware of the dangers and repercussions of violent incidents. In 2012, according to the Bureau of Labor Statistics, 475 people died in workplace homicides, 381 of which were shootings.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Expert: US utilities unprepared for EMP threats
SecurityInfoWatch
Pressure is mounting in Washington for lawmakers to increase the federal government’s role in helping to protect the U.S. electric grid. The Wall Street Journal reported that two research groups – the Congressional Research Service and the Battelle Memorial Institute – are urging Congress to look into the security measures currently being utilized by the nation's utility companies to determine where things could be improved.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Government security: Saying 'no' doesn't work
Information Week
Governments are cautious. They love security rules and access management and generally lean towards saying "no" to most things. Some of that is certainly required, but Edward Snowden and other security breaches have shown that rules aren't actually very effective when dealing with social engineering attacks.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


3 technologies claiming to secure messages in the post-Snowden era
Government Technology
Privacy-related apps and technology are on the rise in the post-Snowden era of the Internet, and they likely won't slow down as long as revelations about NSA leaks keep popping up in the media. Reuters reported in February that the mobile security management market was worth $560 million in 2013, but will grow into $1 billion by 2015, according to ABI Research. Here are three apps and projects that exemplify the digital paranoia that's taking shape.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Cops on campus: A security 'no-brainer'
Emergency Management
It's hard to wrap your mind around the fact that someone would enter a school building and declare open season on kids. It's even harder to determine a strategy for how to mitigate that. There's a growing catalog of "solutions" to help with the problem. There are a number of trainings available, including the Run, Hide, Fight video and ALICE (Alert, Lockdown, Inform, Counter, Evacuate) training. There's the mental health issue, the gun issue and there are myriad solutions — buzzers, cameras, locks, bulletproof desk tops. It seems school districts are grasping at straws, trying to come up with a fix.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Defending the digital frontier
The Economist
Data breaches are becoming ever bigger and more common. Last year over 800 million records were lost, mainly through such attacks. Among the most prominent recent victims has been Target, whose chief executive, Gregg Steinhafel, stood down from his job in May, a few months after the giant American retailer revealed that online intruders had stolen millions of digital records about its customers, including credit- and debit-card details. Other well-known firms such as Adobe and eBay have also been hit.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


How to teach humans to remember really complex passwords
Wired
If passwords are considered the bane of the data security industry, it's partly because humans are awful at choosing them: By some counts, we still pick "password" a facepalm-inducing one in 20 times. But a study from two researchers at Microsoft and Princeton suggests there's hope for those much-maligned secret strings of charters. Randomly generate a long, nearly uncrackable password, and it can be surprisingly easy to burn it into your neurons.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Still showing up at TSA airport security: Guns, knives, bear spray, grenades
Christian Science Monitor
Here's some of what the TSA found during one recent week: 42 firearms, 74 credit card knives, inert grenades and a live smoke grenade, eight ounces of bear repellant, knives in the handles of brushes and combs and 17 stun guns. Of the 42 firearms, 35 were loaded and nine had rounds chambered.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Bill aims to ease terrorism, laundering fears around foreign money transfers
U.S. News & World Report
A recently proposed piece of legislation would streamline the regulation of money transfers to individuals and businesses in foreign countries, a practice that's become increasingly unattractive for banks who see the business as too risky. The bill, which accomplishes something President Barack Obama has requested in his past three budgets, has already passed in the House and is expected to pass in the Senate this summer.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


TRENDING ARTICLES
Missed last week's issue? See which articles your colleagues read most.

    IAPSC thanks 2014 Conference Committee — Begins recruiting volunteers for 2015
10 critical security habits you should be doing (but aren't) (PCWorld)
Airport breach a sign for IT industry to think security, not money (CIO)

Don't be left behind. Click here to see what else you missed.
 



IAPSC News
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Esther Cho, Content Editor, 469.420.2671  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
iapsc@iapsc.org | www.iapsc.org

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

July 1, 2014
June 17, 2014
June 3, 2014
May 27, 2014






7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063