This message was sent to ##Email##
|
January 23, 2018 |
| | | |
|
|
Successful Security Consulting Workshop — April 29, 2018 in San Diego, CA
|
   |
IAPSC
ASIS International (ASIS), the world's largest association for security management professionals and the International Association of Professional Security Consulting (IAPSC), the most widely respected and recognized security consultant association in the industry, announced that in 2018 they are collaborating in offering a specialized training course for those who are interested in becoming security consultants.
The course takes place at the Kona Kai Resort in San Diego, CA on Sunday, April 29, 2018 from 8:00 am – 5 pm (with a welcome reception on the evening of April 28).
This one-day intensive Successful Security Consultant (SSC) training course will mirror the course that has been offered collaboratively at the ASIS Annual Conference over many years, but is now a pre-conference course to the IAPSC Annual Conference. The course explains how to successfully launch a new security consultant practice or jump-star t an existing one. Taught by a faculty of seasoned consultants, attendees will gain an understanding of how to develop and market oneself as a security consultant and how to avoid the expensive mistakes that can sabotage success as a consultant. The program is filled with practical information such as sample proposals and reports.
Registration is now open! This program is offered as a pre-conference workshop at the IAPSC Annual Conference; however, it may be taken as a stand-alone course.
Download the event flyer for details.
Register Now
IAPSC
This year IAPSC is inviting members and security consultants to join us at the Kona Kai Resort in San Diego, CA on April 29 - May 1. The conference will feature educational sessions designed specifically for security consultants, social gatherings to build your network, the latest security products and services in the exhibit hall, and so much more. Learn more.
This year's presentation topics will include:
- Becoming an Expert Witness: Working with Lawyers
- Security Consulting Landmines & Pitfalls
- Cybersecurity
- Winning the Business
- A behind the scenes site tour of General Atomics Aeronautical Systems, Inc.(GA-ASI)
...and much more! Full program schedule coming soon.
Register now
Interested in sponsorship opportunities and/or an exhibit booth?
Download the 2018 sponsor brochure here.
IAPSC releases updated Best Practices in Forensic Methodology
|
   |
The IAPSC Best Practices Committee, chaired by Norman Bates, Esq., has updated the Best Practices in Forensic Methodology document as of January 2018. IAPSC recognizes that its members will be called upon to perform as Forensic Consultants and serve as Expert Witnesses in a court of law or other legal proceeding. The purpose of these guidelines is to meet the need for a standardized methodology used in the evaluation of premises security cases.
Members may download a copy for FREE by logging in to the Members' Library. Non-members may purchase a copy here.
IAPSC
Jordan Ferrantelli is Senior Security Consultant at Jensen Hughes in Lincolnshire, Illinois. He has expertise in a multitude of verticals, including but not limited to hospitality, healthcare, corporate headquarters, high-rise, and office buildings. Well versed in the physical security industry, inclusive of physical, technical and operational security. This includes: Security system design and review, security Threat and Vulnerability Assessments, Workplace Violence Assessments and Reviews, Loss Prevention Assessments and Benchmarking Analysis. Mr. Ferrantelli earned his MBA from Bellevue University in Business Administration and Management with a concentration in Information Security Management.
View his profile for details.
IAPSC
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges and trends in the industry.
Forensics and Security Management : Friday, Feb. 16, 9 a.m. PT
Security Design and Engineering : Fri., March 16 @ 10 a.m. PST
Cybersecurity : Fri., April 20 @ 9 a.m. PST
It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
|
ONVIF conformant products allow you to create a flexible, cost-effective and future-proof system. ONVIF enables you to choose optimal products from different vendors. The conformant products allow you to be confident in their interoperability and makes integration of products from different vendors easier. Read more
|
|
|
|
|
Reach Your Prospects Every Week
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.
Connect with Highly Defined Buyers and Maximize Your Brand Exposure
|
|
|
|
|
IAPSC
It's time to renew your annual membership in the International Association of Professional Security Consultants. If you have not already done so, you can renew online here, download this form, or call the IAPSC office at +1-415-536-0288. We look forward to your continued involvement!
Nominations for the 2018 IAPSC Board of Directors Election
|
   |
IAPSC
The Nominating Committee is now accepting nominations of members in good standing for the IAPSC Board of Directors election in 2018. Offices of President, Vice President, Secretary, and Treasurer will serve a for the one (1) year term 2018-2019. Elected Directors will serve a two (2) year term 2018-2020. The election will be held and new terms will begin at the Annual Members Business Meeting during the IAPSC Annual Conference on April 29 – May 1, 2018 in San Diego, CA. Nominations are due by February 1, 2018. For more information or to submit a nomination, please contact Nominating Committee Chair John Hatcher.
The IAPSC Awards Committee is now accepting nominations for 2018
|
   |
IAPSC
The IAPSC Awards Committee is now collecting nominations for the following awards: Charles A. Sennewald Distinguished Service Accolade, Meritorious Life Membership, and the Outstanding Security Performance Awards. Each nomination must include the CV for the candidate and justification for their nomination. Candidates for Life Membership must be nominated by two other IAPSC members. Nominations or inquiries should be submitted to the attention of Awards Chair Dave Aggleton.
Security Info Watch
Recently, the National Fire Protection Association announced that it would be fast-tracking a new standard designed to better prepare first responders, private sector organizations and citizens in general on how to respond to active shooters and other hostile events.
READ MORE
The New York Times
To some, the prospect of adding new subway elevators not far from the World Trade Center is a godsend, a desperately needed portal for the disabled to a subway system that is among the least accessible in the nation.
READ MORE
Government Technology
The false missile alert that was sent out from emergency management personnel in Hawaii last week sparked an initial public panic, national outrage, global media coverage and numerous government investigations. Official inquiries are ongoing and many more reports are coming, but what do we know so far? Here are the details and some of the lessons that we can take away.
READ MORE
Security Intelligence
The beginning of a new year is a great time to resolve to improve your customer experience. One of the best places to start is the new account creation process. Financial institutions can spend hundreds, even thousands of dollars per new customer acquisition. Yet too often, potential customers abandon the online account creation process because it is too difficult or confusing.
READ MORE
ZDNet
Uber has ignored a security bug that can allow an attacker to hack into user accounts by bypassing two-factor authentication because the ride sharing company says the flaw "isn't a particularly severe" issue. Two-factor authentication (2FA) is a vital part of protecting online accounts. It adds a second layer of security on top of your username and password — which can be be stolen — by sending a code by text message to your phone, for example, which only you would have access to.
READ MORE
CMS Wire
The last few years have been hot for information security (InfoSec), driven mainly by high profile breaches at Target, Home Depot, Anthem, the DoD, NSA, Equifax and others. Add to that the weaponization of cyber attacks by nation states (think Stuxnet or Russia's attacks on Estonia and elsewhere), and it's no surprise that InfoSec is the priority for governments as well as public and private sector organizations of all sizes and in all industries.
READ MORE
Health Data Management
For years, many IT leaders have outlined and executed security and disaster recovery plans as two separate programs. Now, as IT evolves in a cloud era, this approach is beginning to cause serious issues for organizations.
READ MORE
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|