This message contains images. If you don't see images, click here to view.
Advertise in this news brief.




Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit July 29, 2014

Home   About   Join   Members   Events & News   Press   Contact     

 



IAPSC will be at ASIS 2014 — Come visit us!
IAPSC
Join IAPSC for two opportunities to connect with association members and colleagues in the security industry at the Georgia World Congress Center in Atlanta. Our networking reception for members and their invited guests will be the evening of Sunday, Sept. 28. Also, be sure to visit our information and membership booth on Monday, Sept. 29 or Tuesday, Sept. 30. Member volunteers will be available to answer questions about IAPSC and the benefits of membership. To get details, RSVP for the reception, or to volunteer for a time slot at the booth, contact: iapsc@iapsc.org.
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE  




Becoming a Successful Security Consultant Seminar
IAPSC
The only course offered on how to successfully launch a new security consulting practice, develop a trust partnership with clients, and deliver essential security consulting services or jump-start an existing practice. This course is instructed by experts from IAPSC and offered as an ASIS 2014 Pre-Seminar on Sunday, Sept. 28 in Atlanta. Registration is now open.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


IAPSC 2015 — Save the date
IAPSC
Mark your calendar for the IAPSC Annual Conference, the largest and most exclusive gathering of top security consultants, on Sunday, April 19-Wednesday, April 22, 2015 at the Meritage Resort & Spa in Napa, California. Conference planning is already underway, led by Committee Chair Lynda Buel, CPP, CFE, CSC and registration is set to open later this year.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article




Welcome new IAPSC member
IAPSC
Izzet M. Fert is the CEO and Senior Executive Consultant of FMPluS International Consultancy LLC based in Istanbul, Turkey. His company focuses on security needs analysis, specification preparation, procurement process management, contract preparation, and process management through training and control.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


IAPSC member John M. White publishes new book and article
IAPSC
IAPSC member John M. White, CPP, CHPA, President/CEO of Protection Management, LLC, has authored a new book entitled Security Risk Assessment – Managing Physical and Operational Security, and he was published in the Healthcare Security Alert publication (Volume 22, Number 7) in this article about Safety & Security Concerns with Mental Health Patients.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Feds pursue cloud forensics standards
Information Week
The National Institute of Standards and Technology has released a draft report for public comment that sets forth the daunting challenges forensic examiners face in tracking down and using digital information stored in the cloud. The draft report, "NIST Cloud Computing Forensic Science Challenges," sets forth 65 challenges of cloud forensics divided into nine categories that a working group drawn from the government, private sector and academia has identified in the course of its examination of the challenge.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Rise of the digital risk officer?
CIO
A new security role called the digital risk officer is emerging in response to new cyber threats introduced by the Internet of Things, according to Gartner United States distinguished analyst Paul Proctor. He has forecast that some enterprises will have a DRO or equivalent role by 2017 to handle risks that may emerge from the IoT. According to Proctor, the scope of a DRO is "very different" to that of a chief information security officer, or CISO.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Pilot group calls for cohesive risk appraisal of war zones
AIN
The European Cockpit Association has called for "intense scrutiny" of the air transport industry's assessment of risks and the principles of flying over conflict zones in the wake of the July 17 loss of Malaysia Airlines Flight MH17. Although appropriate risk assessment apparently did occur in the case of Ukraine, it worked for the carriers of only some countries. The fact that some airlines had avoided the area based on their own assessment shows that they enjoyed access to good intelligence and advice from the most powerful national security services, the ECA noted.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


How to identify, report and prevent workplace violence
The Business Journals
The prevalence of workplace violence in America today is stunning. Workplace violence caused the death of 780 Americans in 2011. According to the National Center for the Victims of Crime, millions of workers experience violence or the threat of violence in their workplace every year. Every employer has a duty to provide a safe and secure work environment. The core of all prevention is better intelligence — information you need to make critical business decisions. In the case of workplace violence, these decisions may literally save a life.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Conduct a security risk assessment
Processor
Identify your weak areas. Check. Stay on top of new cyberattack techniques. Check. Think about strategies for disaster recovery and business continuity. Check. Conduct a security risk assessment. What? As you're working through your security to-do list, it's often easy to chalk up the task of a regular security risk assessment as being too time-consuming and lacking a relevant reason to perform. But that couldn't be further from the truth.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


7 key elements of a workplace investigation
By D. Albert Brannen
Many issues that arise in the workplace require employers to conduct a prompt and thorough investigation. Among other things, employers should investigate allegations or reports of theft, fraud, harassment, discrimination, retaliation, workplace violence or threats, substance abuse, security breaches, inappropriate use of the employer's computers or other property, or other types of misconduct or poor performance. Although the underlying allegations may be different, certain basic elements should be a part of every investigation, as outlined in this article.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Cyber espionage by Google Glass is the next major threat to enterprise security
Computing
For many, Google Glass and other wearable devices might appear to be the latest overhyped fad. However, when smartphones first arrived, few would have suspected they'd become such an integral part of working life in the modern enterprise. The same could be said for tablets, which are seeing more applications added to match demand for enterprise use — Microsoft Word for Apple's iPad being a notable example.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


NGA, DHS and DoD agree on joint plan to strengthen cybersecurity
Fierce Government IT
State governors and the Homeland Security and Defense departments said they've agreed on a joint plan to help strengthen cybersecurity across the United States. The National Governors Association said in a press release that the joint action plan on cybersecurity was adopted by the presidentially appointed Council of Governors and the two departments during NGA's summer meeting in Nashville, Tennessee. The plan, the group said, creates a framework to guide state-federal discussions around information sharing, incident response and operational coordination.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


Intelligence security initiatives have chilling effect on federal whistleblowers, critics say
The Washington Post
In early April, Sen. Charles E. Grassley summoned FBI officials to his Capitol Hill office. He said he wanted them to explain how a program designed to uncover internal security threats would at the same time protect whistleblowers who wanted to report wrongdoing within the bureau. The meeting with two FBI officials, including the chief of the bureau's Insider Threat Program, ended almost as soon as it began. The officials said the FBI would protect whistleblowers by "registering" them.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article
READ MORE


TRENDING ARTICLES
Missed last week's issue? See which articles your colleagues read most.

    5 strategies for handling workplace violence (EHS Today)
Cops on campus: A security 'no-brainer' (Emergency Management)
How to teach humans to remember really complex passwords (Wired)
Government security: Saying 'no' doesn't work (Information Week)

Don't be left behind. Click here to see what else you missed.
 



IAPSC News
Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Esther Cho, Content Editor, 469.420.2671  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
iapsc@iapsc.org | www.iapsc.org

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

July 15, 2014
July 1, 2014
June 17, 2014
June 3, 2014






7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063