This message was sent to ##Email##
|
July 25, 2017 |
| | | |
|
|
|
IAPSC
Ronald Drayton, Jr., CPP has over 20 years of experience in law enforcement, security/vulnerability assessment, operational requirements, security management, access controls and target hardening, and physical security mitigation. His company, DTN Security Solutions in Flagstaff, Arizona, specializes in physical security surveys, security management, and executive/corporate security policy development. Mr. Drayton holds a Master of Science in Information Assurance from Norwich University and a Bachelor's degree from the University of Pittsburgh.
READ MORE
IAPSC
We would like to invite you to visit the IAPSC Membership Booth at ASIS Annual Seminar and Exhibits (ASIS 2017) in Dallas, September 25-28. IAPSC will be at Booth 4095 on Tuesday and Wednesday. Stop by to speak with current members about how to become a member or get the most out of your current membership.
Members:We are seeking volunteers to help staff the booth and spread the word about IAPSC. To sign up for a time slot on Tuesday, Sept. 26 or Wednesday, Sept. 27, contact iapsc@iapsc.org.
Enjoy a FREE expo-only pass: Register before August 11th HERE. Use source code: 537E17
Receive a $75 discount on the All-Access Pass (includes all educational sessions, keynotes, receptions, and show floor access): Use discount code: INVITE75
Promoted by
|
|
|
 |
IAPSC
As a member, you already meet the qualifications to sit for the exam, so why not take the next step and get the certification that demonstrates your depth of knowledge, professional objectivity, integrity and skills as a security consultant? IAPSC offers a substantial discount for members who apply to become a CSC.
The CSC is another wrench in your marketing toolbox that separates you from the competition. Clients will recognize the value of certification, especially one that has the backing and credibility of the premier security consulting association. Reference materials and additional information about the exam are available on the IAPSC website.
To become certified, members must submit the application form and then study for and pass the exam. Learn more at www.iapsc.org.
IAPSC
ASIS 2017 will be hosting the U.S. Outstanding Security Performance Awards (OSPAs) which recognize and reward companies and individuals across the security sector for aspiring to excellence and perpetuity research. A panel of leading industry figures, including Harold Gillens and Dave Aggleton from the IAPSC, will select winners from finalists and the awards will be presented at a business lunch to take place on the 27th of September in Dallas. Nominations are now open for the 2017 U.S. OSPAs, and we encourage you to apply. Please visit the program website for details.
 |
|
HID Global® is the leading provider of products and services that help organizations manage secure identities. Visit our Consultant Corner to join our growing community. MORE
|
|
IAPSC
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges and trends in the industry.
It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
IAPSC
Registration is now open for this popular seminar: Sunday, Sept. 24, 2017 in Dallas, TX, prior to the ASIS 2017 Seminar & Exhibits. This unique, one-day intensive program will show you how launch a new security consultant practice or jump-start an existing one. Learn from a faculty of seasoned consultants how to develop and market yourself as a security consultant and how to avoid the expensive mistakes that can sabotage your success. The program is filled with practical information that will save you time, money, and frustration. Take home a comprehensive workbook of sample proposals and reports that give you a clear advantage when competing for a security consulting assignment. Register Now.
By Bambi Majumdar
Kent Walker, Google's SVP and general counsel, recently delivered a speech that has opened the floodgates for new debates and discussions on cybersecurity. Walker stated that with each new advance in communications, law enforcement agencies have had to adapt and update their legal and technological systems. Today, those challenges warrant an update to the legal framework that was implemented long before the widespread advent of cloud computing.
READ MORE
Tech Crunch
Google's big experiment in digital counter-terrorism has begun to roll out recently. Collaborating with its own in-house think tank, Jigsaw, the new effort seeks to bury ISIS-related propaganda on YouTube. Now, when a potential ISIS recruit searches for known extremist content using a predefined set of keywords, they'll instead be redirected to videos that deconstruct and confront the terrorist group. The project is called the Redirect Method.
READ MORE
CSO
Whatever the role, good communication regarding the duties and expectations of a security professional is key to that person's success. That communication starts with a solid, thorough job description. It will be an important benchmark when hiring for the role, and a touch point for performance once the candidate is on board. The job description is also a baseline that helps security team managers keep pace as many roles evolve.
READ MORE
Info Security
Compliance and regulation and the unpredictable behavior of employees have the biggest impact on data security, according to research. A survey of 304 IT professionals by HANDD found that 21 percent of respondents felt regulation, legislation and compliance will be one of the greatest business challenges to impact data security, while 21 percent believe that the behavior of employees and their reactions to social engineering attacks also pose a big challenge.
READ MORE
Security Info Watch
According to the Occupational Safety and Health Administration, from 2002 to 2013, the rate of serious workplace violence incidents, which are defined as those requiring days off for an injured worker to recover, were more than four times greater in healthcare than private industry on average. The most recent statistics compiled by the International Association for Healthcare Security and Safety also paint a grim picture with regards to the rate at which incidents of violence are occurring in hospitals.
READ MORE
CSO
Another day, another data breach because of poorly configured cloud-based systems. The latest incident, in which up to 6 million customer details for Verizon's United States customers was exposed, is yet another reminder both the cloud provider and the organization share the responsibility for cloud security. There is a misconception that the cloud service provider is in charge of securing the cloud environment. That is only half the story.
READ MORE
Security Management
Multiple researchers — working independently — uncover the same security flaws more consistently than previously believed, according to a new report from Harvard. Taking Stock: Estimating Vulnerability Rediscovery looked at a dataset of more than 4,300 vulnerabilities discovered between 2014 and 2016 for Android, and the Chrome and Firefox browsers. Vulnerabilities are flaws that allow cyber criminals, as well as intelligence and law enforcement agencies, to gain access to targeted systems.
READ MORE
Healthcare Informatics
During a recent webinar hosted by the Center for Connected Medicine, healthcare IT security thought leaders examined the proliferation of internet-connected devices in healthcare and parsed the challenges of cybersecurity and the internet of medical things in an evolving threat environment.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|