This message contains images. If you don't see images, click here to view. Advertise in this news brief.
|

|
|
|
IAPSC Conference exhibit-only pass — free for April 28 and 29
IAPSC
As an exclusive offer for our peers in the New Orleans and outlying areas we would like to invite you to visit our exhibit area featuring a wide variety of products and services which may be recommended by security consultants to their clients worldwide at no cost to you. Or, if you are interested in attending the dynamic conference sessions and activities there's still time to register for the full conference. Come browse and interact with our sponsors offering the newest and proven products and services and interact with some of the leading security experts in the world. The IAPSC Conference is the largest and most exclusive gathering of top security consultants in the nation. This year's conference offers a wide range of topics focused on Building the Business, Practice Management, Forensics & Physical Security, and Technical Security.
|
|
Share this article:
    |
|
|
Get certified in the 'Big Easy' April 30
IAPSC
Don't miss this opportunity to obtain your Certified Security Consultant (CSC) while you're at the annual conference. This is the only certification of its kind in our profession and carries with it the body of knowledge to further enhance your credentials to clients and expertise in court as an expert. This new addition to the annual conference allows you to attend the dynamic conference program and activities and also take the exam to become certified. In addition, test takers will have the chance to review the exam domains with a CSC certified IAPSC member. You can obtain more information on this unique opportunity by visiting here.
Becoming a Successful Security Consultant — an IAPSC Pre-seminar at ASIS 2014
IAPSC
Save the date — Sept. 28
Join IAPSC at ASIS 2014 in Atlanta, Ga., for the only course offered on how to successfully launch a new security consulting practice, develop a trust partnership with clients and deliver essential security consulting services or jump-start an existing practice. This popular one-day intensive program will teach you how to develop, market and deliver essential consulting services, and avoid the expensive mistakes that can sabotage your success. The program is filled with practical information that will save you time, money and frustration. Take home a comprehensive workbook of sample proposals and reports that give you a clear advantage when competing and delivering on a security consulting assignment. More information coming soon!
Check your stats — a new website tool for IAPSC members
IAPSC
As part of our continuing efforts to provide IAPSC members with value-added member benefits, we've launched a new feature that provides statistics on how often a consultant listing appears in search results on the IAPSC website, and how many times your listing was clicked on for more detailed information. Members, this information is now available on your profile page. Log in now to view your statistics!
Boston Marathon a case study in lessons learned following last year's bombing tragedy
SecurityInfoWatch.com
Things were different at the Boston Marathon this year. Meb Keflezighi became the first American man to win the Boston Marathon since 1983 and the second-oldest runner to ever take the crown. And unlike past races where it was a virtually open venue for both spectators and participants alike, strict physical security measures and a robust police presence made for long security lines, barricaded race routes, random searches, bans on backpacks and a zero tolerance for rouge runners who used to be part of the Marathon's charm — remember Rosie Ruiz?
Fitting the HIPAA security risk assessment tool into security plans
HealthITSecurity.com
How exactly health care organizations will use the recently released HIPAA Security Risk Analysis Tool remains largely up to each organization. However, Mark Swearingen, shareholder at Hall, Render, Killian, Heath, & Lyman, discussed with HealthITSecurity.com how providers will use the tool and its long-term value to organizations of all shapes and sizes.
What is DLP anyway?
Biztech
IT chiefs have varying definitions for DLP. The "L" is "leak" for some and "loss" for others. Some say the "P" is for "prevention," others say "protection." But whether it's data loss prevention or data leak protection, defining the best strategy for using this umbrella security approach remains a bit elusive for many organizations.
SEC announces examinations of Wall Street firms' cybersecurity measures
Security Management
U.S. securities regulators are moving to make Wall Street firms more proactive in preventing cyberattacks, according to an announcement by the Securities and Exchange Commission recently.
In a Risk Alert released by the SEC's Office of Compliance Inspections and Examinations on April 15, the SEC warned firms that it will be conducting examinations of more than 50 registered broker-dealers and investment advisers to assess their cybersecurity measures.
Data storage security: Securing the physical data center
Enterprise Storage Forum
We know that your data center's network security is important to you. How important is your data center's physical security?
The data in corporate and co-location data centers is easily doubling and tripling in size. Cisco projects that the amount of incoming and stored data stored in the data center is currently approaching 3ZB (as in zetabytes) and will triple by 2017. That is a lot of data to secure.
Courthouse violence unpredictable despite security
The Associated Press via SecurityInfoWatch.com
When Utah's new federal courthouse opened recently, it came with security improvements that are becoming standard around the country: separate entrances and elevators for judges, defendants and the public; bullet-resistant glass and paneling; and vehicle barricades to keep car bombs at bay. Even the design of the courtrooms, with plenty of sunlight and space, can help calm witnesses or defendants in high-stress cases, some judges believe.
10 top information security threats for the next 2 years
CIO
Each year, the Internet Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its "Threat Horizon" report to provide members with a forward-looking view of the biggest security threats over a two-year horizon. Here are the top 10 threats through 2016.
Missed last week's issue? See which articles your colleagues read most.
|
| |
|
|
IAPSC News
Colby Horton, Vice President of Publishing, 469.420.2601 Download media kit
Ashley Whipple, Senior Content Editor, 469.420.2642 Contribute news
International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915
iapsc@iapsc.org | www.iapsc.org
Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.
This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!
|
|
Recent issues
April 8, 2014
March 25, 2014
March 12, 2014
Feb. 11, 2014
|
|
|
|
|
7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|