This message was sent to ##Email##
|
November 15, 2017 |
| | | |
|
|
|
IAPSC member comments on Forensic Methodology best practice
|
   |
IAPSC
The revised second draft of proposed revisions to the IAPSC Best Practice document "Forensic Methodology" is now available for member comment. You will see a clean version as well as a red-line version.
Per the established protocol, IAPSC members now have an additional 45 days to provide comments. Once the 45 days are up, the Best Practices committee will review the comments and respond as necessary.
Comments must be received by Saturday, December 23, 2017 via email to iapsc@iapsc.org or at the IAPSC office address below.
Members: Log in and click HERE to visit the Members' Library and download the proposed revisions from the "Best Practices" folder. There is a clean version as well as a red-line version available.
The IAPSC Awards Committee is now accepting nominations for 2018
|
   |
IAPSC
The Awards Committee is responsible for nominating candidates for these awards:
The Charles A. Sennewald Distinguished Service Accolade is awarded by the IAPSC to a security executive, educator, author, or industry leader who has made an outstanding and significant contribution to the security profession.
Meritorious Life Membership is awarded to an IAPSC member in good standing for more than 10 years who has made significant and measurable contributions to the association through their service and leadership.
The Outstanding Security Performance Awards (OSPAs) recognize and reward companies and individuals across the security sector in 11 categories including Outstanding Security Consultant.
Nominations should be submitted to the attention of Awards Chair Dave Aggleton via iapsc@iapsc.org. Each nomination must include the CV for the candidate and justification for their nomination. Meritorious candidates must be nominated by two other members.
Promoted by
|
|
|
 |
IAPSC
The conference will be held on April 29-May 1, 2018 at the Kona Kai Resort in San Diego, CA.
Call for Conference Committee volunteers:
IAPSC is seeking volunteers to assist Conference Chair Rene Rieder with planning the conference agenda, including presentations, sponsor involvement, and social activities.
Call for Topics:
The IAPSC Conference Committee is also seeking suggestions from members for session topics to be presented or discussed.
Please contact iapsc@iapsc.org to volunteer or share your topic ideas.
Save the Date:
Conference Registration opens December 1st
Interested in exhibiting or sponsorship? Click here to download the 2018 sponsor brochure.
IAPSC New Members Orientation Webinar
|
   |
IAPSC
New members of the IAPSC are invited to participate in an orientation webinar on *new date* Tuesday, November 28, 2017 at 9:00am EST / 12:00pm PST. This presentation will review the current membership benefits and opportunities to help make sure you are getting the most out of your membership, as well as to give you the opportunity to ask questions and remotely connect with some of your fellow members. Contact acorley@iapsc.org to RSVP and receive the meeting login instructions.
 |
|
HID Mobile Access allows members of your organization to access doors, gates and more with a mobile device. Schedule a consultation here to learn more. MORE
|
|
IAPSC
The following article by IAPSC member Wael Lahoud was published in the Canadian publication Grow Opportunity.
Over the past five years, Canadian businesses have seen the threat of hacktivism, cyber extortion and the incidences of data breaches grow exponentially. No industry is immune to these threats, not even license producers of cannabis across Canada.
READ MORE
IAPSC
IAPSC member Jim Kelton was quoted in the following article from Retrofit Magazine, showing the interconnection between cybersecurity and building (physical) security.
"We've seen an increase across the board in the [frequency of] cybersecurity attacks," he says. "Attackers can't always distinguish one organization from another, so commercial buildings may be at the same risk as even, let's say a high-tech firm; hackers are looking for low- hanging fruit, the path of least resistance, to try and see where they may be able to exploit a vulnerability."
READ MORE
IAPSC
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges and trends in the industry.
It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
IAPSC Membership Renewal — Coming Soon
|
   |
IAPSC
It's almost that time of year! Keep an eye out on December 1st for information about how to renew your annual IAPSC membership for 2017. Or feel free to contact the IAPSC office for information at any time: iapsc@iapsc.org or 415-536-0288.
Security Info Watch
Following the recent shooting at First Baptist Church in Sutherland Springs, Texas, that left 26 people dead and 20 others wounded, questions immediately began to swirl — as they typically do following active shooter events — about what houses of worship need to do to mitigate similar incidents moving forward.
READ MORE
The New York Times
A serial leak of the agency's cyberweapons has damaged
morale, slowed intelligence operations and resulted in
hacking attacks on businesses and civilians worldwide. America's largest and most secretive intelligence agency had been deeply infiltrated.
READ MORE
Tech Genix
Hybrid cloud systems represent an alluring option for enterprises. This is because you are able to couple a private cloud to public cloud systems to achieve the best possible performance level. However, hybrid cloud systems come with their own unique risks. Let us take a look at some of them.
READ MORE
Retrofit
Your building automation system has been compromised and a hacker is threatening to shut down the HVAC in your facility in exchange for a large ransom in untraceable Bitcoin currency. What do you do? If this scenario seems far-fetched or unlikely, you may need to pull your head out of the proverbial sand and consider what follows very seriously.
READ MORE
Tech Target
The cloud provides many benefits for disaster recovery, and enables an enterprise to safeguard its data across multiple regions. But that doesn't mean the work stops there. We asked members of the SearchCloudComputing Advisory Board to share their top advice for disaster recovery in the cloud.
READ MORE
Lexology
Cyber security is certainly a digital risk that is 'of the moment' as recent headline attacks have helped to highlight the issue and bring it to the fore. Indeed, the rapid onset of the digital age and smart mobile technology means that criminal activity can take place far more remotely than ever before — increasing the risk of an attack in the process.
READ MORE
CSO
According to ESG research, 45 percent of organizations report having a problematic shortage of cybersecurity skills in 2017. Of course, this applies to all areas of cybersecurity but recent ESG research shows that the skills shortage has a direct impact on security analytics and operations.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|