This message was sent to ##Email##
|
March 22, 2016 |
| | | |
|
|
IAPSC
The IAPSC invites you to join other best-in-class independent security consultants at the IAPSC Annual Conference 2016 on April 17-20 in Charleston, SC. Participants may be eligible to receive 14.5 hours of CPE credit toward ASIS re-certification or other professional certifications.
In addition to numerous opportunities to connect with your colleagues and valuable one-on-one time with leading security manufacturers, the conference will host a focused 3-days of discussion on topics affecting our industry today including: Cybersecurity — What Physical Security Consultants Need to Know, International Counter-Terrorism, Data Retention and Liability, Maximizing Opportunities through Teaming, Global Travel Risk Management, and many more! View the Full Program.
REGISTER NOW
IAPSC
William LaTorre is the President of LaTorre Consulting Inc. in the Greater Philadelphia Area. Major service specializations include expert witness testimony, liquor law compliance, and security assessments and training. Mr. LaTorre is also currently the Business Development Director at HCPHUB. Prior to his current position, he served as the School Site Manager and Consultant for Signal 88 Security and had a 20 year career with the Pennsylvania State Police, culminating in service as District Office Commander from 2008-2012. Learn more by visiting his IAPSC profile HERE.
IAPSC
The 2016 election will be held in-person at the IAPSC Annual Members Business Meeting on Tuesday, April 19 at 4:30 p.m. at the Mills House in Charleston, South Carolina. Members who will NOT attend the business meeting may vote using a proxy ballot. Completed proxy ballots must be received by the IAPSC no later than Friday, April 1, 2016. Proxy ballot, voting procedure, and candidate statements may be found in the Members' Library under "Governance."
IAPSC
An amendment to the IAPSC By-laws has been proposed relating to the retired member category and will be presented for a member vote at the Annual Members Business Meeting on Tuesday, April 19, 2016 at 4:30 p.m. at the Mills House in Charleston, South Carolina. Members who will NOT attend the business meeting may vote using a proxy ballot. Completed proxy ballots must be received by IAPSC no later than Friday, April 15, 2016. A copy of the current IAPSC By-laws may be downloaded here. The proposed amendment and proxy ballot may be downloaded from the in the Members' Library under "Governance."
IAPSC
The Interest Groups facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members to survey the needs of the membership in their specialized areas and discuss current topics, best practices and guidelines, challenges members are experiencing, and trends in the industry. These groups may also be a forum for collaborating on working group projects, seminars, and networking activities. It's easy to participate in the monthly teleconference from your computer or your phone, via GoToMeeting.
We hope to connect with you at an upcoming Interest Group session:
April 15 @ 9 a.m. PDT — Cybersecurity
May 20 @ 9 a.m. PDT — Forensics and Security Management
June 17 @ 9 a.m. PDT — Security Design and Engineering Interest Group
Sign up now on-line here or by contacting iapsc@iapsc.org.
IAPSC
Join us for the IAPSC "Successful Security Consulting" Workshop on Tuesday, April 5, 2016 8:30 a.m.-5 p.m. at Sans Expo Las Vegas. This popular one-day intensive seminar will show you how to develop, market and deliver security consultant services effectively. Learn how to avoid the costly mistakes that can sabotage the success of your security program. View the SSC program outline and register now.
IAPSC
On behalf of ISC and SIA, we'd like to invite you to join us at ISC West 2016 at the Sands Expo in Las Vegas. ISC West is the leading physical security event to unite the entire security channel, from dealers, installers, integrators, specifiers, consultants and end-users of physical, network and IT products. The Exhibit Hall will be open April 6-8 and SIA Educational sessions will be April 5-7. IAPSC Members: Contact us for FREE exhibit hall registration.
Los Angeles Times
U.S. cities have stepped up security measures in the wake of the deadly bombings in Brussels, although Department of Homeland Security officials said no credible threats have been detected against U.S. targets. Airports and transit systems around the country were placed on heightened alert because of concerns about possible copycat attacks. Some cities added extra bomb-sniffing dogs and foot patrols to major transit hubs and airport terminals.
READ MORE
U.S. News & World Report
The Homeland Security Department formally began sharing details of new digital threats with private business and other government agencies, a culmination of a longtime effort to improve cybersecurity.
"This is the 'if you see something, say something' of cybersecurity," said Homeland Security Secretary Jeh Johnson at the agency's Virginia-based data sharing hub, the National Cybersecurity and Communications Integration Center.
A federal law passed at the end of 2015 was intended to encourage corporations to share information about cyberthreats, making it harder for businesses to be targeted by threats used elsewhere.
READ MORE
Business Solutions
If cybersecurity were judged by newspaper headlines alone, we would have to conclude that retail was the number one vertical being targeted. However, according to the latest Verizon Data Breach Investigations Report, U.S. government agencies ranging from the Army to the IRS receive the most attacks (more than 70 breach incidents per day). Even the financial services industry accounts for approximately twice as many data breach incidents as retail. Yet retail is the most newsworthy because that is where consumers spend their money, often in the form of credit/debit payment.
READ MORE
Emergency Management
Health care providers are starting to make progress on routinely sharing patient data between care settings, although plenty of challenges remain regarding the interoperability of different software systems. One sector that has been excluded from the health information exchange ecosystem, however, is emergency medical services (EMS).
READ MORE
CSO Online
Creating an effective security program in your organization starts with staffing a team of innovative and smart people to support the security mission. In our first edition of Security Sessions, Josh Feinblum of Rapid7 shares his experience and insight on building a security group.
READ MORE
Security Intelligence
Major League Baseball's spring training will wrap up in a matter of weeks, and baseball stadiums everywhere are getting ready for opening day — you might even be able to smell the peanuts already. But when it comes to your sensitive data security, do you know who’s on first? More importantly, do you know who's stealing home — and potentially stealing your sensitive data, too?
Unfortunately, most organizations don't have this much awareness of or control over insiders accessing sensitive data. Sometimes they have no awareness of who has access to sensitive data. This is particularly problematic and risky when it comes to privileged users, who have access to everything important.
READ MORE
BetaNews
Despite the inherent insecurities of the cybersecurity industry, a new report from Barkly, an endpoint security company, reveals that the biggest issue IT security teams have to face with current security solutions is that they slow down the system.
When asked about the options of productivity vs security and the potential downfalls of security solutions, 41 percent of respondents said that they were dissatisfied with their current solution, not because it failed to deliver security, but because it slows down their system.
READ MORE
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|