This message was sent to ##Email##
|
October 4, 2016 |
| | | |
|
|
|
IAPSC
IAPSC is proud to introduce its new Annual Sponsorship Program. The new sponsorship model offers our sponsoring partners year-round exposure and networking with our consultant members. Among the benefits are: participation in the 2017 Annual Conference in Austin, TX, features in the IAPSC newsletter, invitation to exclusive member-only events, and much more! IAPSC members are encouraged to spread the word to companies who may be interested. View sponsorship levels here.
IAPSC
On Nov. 16, IAPSC members William J. Birks, CPP CSC CHS-III, Rene Rieder Jr, CHS-IV, CMAS, PSP, CPP, and Alan H. Brockbank, CPP, CSC will present a half-day workshop at ISC East in New York, teaching the essential traits for success to launch a new security consulting practice or jump-start an existing one. They will cover how to start the business, attracting clients with marketing techniques, and best practices for completing the consulting assignment. Learn more and register now.
IAPSC
William Fallacaro has been the Chief of Security for over 21 years at the Flagler Museum, a national historical landmark in Palm Beach, FL. His areas of expertise include physical security, emergency procedures, policy development, system design, and security training.
Bradley Pyles, PSP, CSE is currently COO for Wach 1 Design and President of BLP Consulting, LLC in Lexington, KY. Prior to that, he has 30 years of experience working with customers in the areas of security design and sales. His areas of expertise include surveillance camera maximized design and detailed light level surveys, particularly in campus environments and other large site areas requiring surveillance.
Michael Pincus, PE, RCDD, CTS is an Associate Principal for Vantage Technology Consulting Group based in Concord, MA. He provides consulting services for a wide variety of project types including higher education, corporate, performing arts, and houses of worship. He works closely with the client to determine system requirements, and provides subsequent system design and project management services.
IAPSC
The International Association of Professional Security Consultants (IAPSC) is offering new resources to help organizations become more effective at creating and distributing security requests for proposals (RFPs). "Success with your security project starts with the security RFP. Too often, organizations fail to ask the right questions or fail to distribute the RFP broadly to qualified professionals," said Harold Gillens, PSP, CFC, CHS-III, President of IAPSC. "As the leading association for professional security consultants, we saw the need to make this process easier and more productive." IAPSC has improved the security RFP process by creating guidelines, templates and a distribution tool for security project RFPs. Found at www.iapsc.org/rfp, the new information and tools make it easier for organizations to successfully navigate the security RFP process.
READ MORE
IAPSC
Fri., October 21 @ 9 a.m. PDT — Cybersecurity
Fri., November 18 @ 9 a.m. PDT — Forensics and Security Management
Fri., December 16 @ 9 a.m. PDT — Security Design and Engineering
These monthly member meetings facilitate member relationship-building across areas of specialty and interest. They provide new opportunities for IAPSC members discuss current topics, best practices and guidelines, challenges, and trends in the industry. It's easy and FREE to participate from your computer or your phone. Sign up now online here or by contacting iapsc@iapsc.org.
IAPSC
Join the IAPSC and our best-in-class independent security consultants at the IAPSC Annual Conference 2017, coming up May 7-9 at the Sheraton Hotel at the Capitol in Austin, TX. Conference highlights include: 3 days of discussion on topics affecting your industry, session tracks that promote specialized learning for your specific expertise and area of interest, business development discussions to help you grow your practice, networking to encourage thought leadership and partnership, and so much more. So book your flights, slip on your cowboy boots, and join us in May! Hotel reservations are now available at the Sheraton for $189/night. Reserve your hotel room now.
Conference registration will open in November 2016.
Reuters
The U.S. government will open the doors next week to a new agency, with stronger data protections, meant to shorten by many weeks the time it takes to vet government workers seeking "secret" and "top secret" security clearances.
The National Background Investigations Bureau will be headed by Charles Phalen, who has worked as a security executive at the CIA, the FBI and defense contractor Northrop Grumman, officials said on a conference call with reporters.
READ MORE
The White House
Earlier in September, we accompanied President Barack Obama to the G-20 Summit in Hangzhou, China. It was a productive summit across the board. But perhaps the most significant moment came when President Obama and President Xi stood together and formally joined the landmark Paris Agreement, committing the two nations responsible for roughly 40 percent of global carbon emissions to take serious and sustained action to combat climate change.
READ MORE
Fortune
It's not just outside hackers that the FBI has to worry about.
Making sure outside attackers don't hack the Federal Bureau of Investigation is obviously one of the law enforcement agency's top priorities. But equally important is ensuring that disgruntled employees or spies don’t sneak off with sensitive data.
FBI chief security officer Arlette Hart described the work involved in preventing so-called insider threats during an appearance at the Structure Security conference in San Francisco.
READ MORE
Industry Week
An estimated 2 million American workers are victims of workplace violence each year, costing businesses billions of dollars annually in impaired productivity, employee turnover, security measures and legal costs, according to the U.S. Dept. of Labor. Juries hold employers responsible for these incidents with increasing frequency and in staggering amounts. Recently, in Yowan Yang v. ActioNet, Inc, a California helpdesk technician was awarded nearly $7.4 million in damages following a workplace violence incident where a coworker grabbed the technician's neck and choked him.
READ MORE
BetaNews
Breaches and attacks have run rampant through most major industries, and organizations are beginning to realize the importance of employee and stakeholder security awareness. Healthcare and retail have been in the brightest spotlights with the rise in ransomware and credit card data breaches in the last couple of years, but they are not the only ones facing this challenge. Wombat Security's Beyond the Phish report found that telecommunications and transportation industries also struggle with a wide range of security issues.
READ MORE
SecurityInfoWatch
In the world of information security, there's one problem that surfaces again and again, regardless of which regulatory standard we discuss: failing to understand the difference between compliance and security. Sometimes organizations think they’re the same thing; sometimes they get so consumed by complicated regulations that they stop focusing on security altogether.
Using PCI as an example, the Target breach comes to mind. In what was called an “epic” security breach, upwards of 70 million credit and debit card numbers were stolen in late 2013 from the retail giant, which was validated as PCI-compliant just two months before the breach.
READ MORE
The Wall Street Journal
A report on workplace cybersecurity issues by Wombat Security Technologies found safe use of social media is a top challenge for employees and companies, with 31 percent of participants incorrectly answering questions about how to safely use social media. Other areas where issues were found included protecting and disposing of data securely, identifying phishing threats, protecting confidential information and working safely outside the office.
READ MORE
Business.com
Each year the number of reported corporate data breaches goes up. In 2015 alone the U.S. saw a 38 percent increase in data loss due to cybercrime and malware.
Fortunately for businesses, data security has continued to advance as well, bringing with it an arsenal of tools to ensure proprietary information remains secure.
In this modern day and age, most businesses are turning to local data storehouses and the competent security of cloud storage.
READ MORE
Information Age
For a long time now, data security headlines have been reserved primarily for mass breaches of international enterprises as the IT industry struggles to move on from outdated security systems.Despite grabbing the headlines, it is not only the large enterprises that are targeted by hackers.Smaller organizations would be foolish to ignore the possibility that they will or have already suffered a data breach.
READ MORE
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|