This message was sent to ##Email##
To advertise in this publication please click here
|
|
|
.IAPSC NEWS
IAPSC Webinar — Physical Security & Antiterrorism Technical Design Concepts
IAPSC
Presented by Sean A. Ahrens, CPP & Deborah Blass, PETuesday, December 1 | 12:30 PM (ET)
Depending on the project, a threat and risk assessment may require an evaluation of non-standard threats, which may be expressed through Chemical, Biological, Radiological, Nuclear or Explosives. Although operations and security cameras are typical controls for these types of threats, additional mitigation strategies may need to be employed, which require more technical and structural engineering expertise to adapt the building infrastructure (i.e. progressive collapse resistance, impact resistance, or blast resistance).
This webinar is intended to give basic technical education into building hardening strategies, and the context, implications, and cost ramifications for the inclusion of these controls.
About Our Speakers:

Deborah Blass, PE Associate | Resilience, Security & Risk Arup
Deborah Blass is an Associate in Arup’s San Francisco office, specializing in physical security, blast engineering, and protective design. She is a registered professional engineer (PE) in the States of California and New York and an industry subject matter expert in mitigations for security risks including terrorism such as blasts and the use of vehicles as a weapon.
Deborah has experience managing physical security projects across sectors including aviation, transit, corporate, and government, and coordinating security requi,rements among multiple design disciplines and stakeholders. Her technical experience includes structural analysis, and developing façade, and building detailed design solutions for security threats. Deborah also has considerable experience with assessing and advising of security risks, site security design, and identifying and applying appropriate industry guidelines and criteria.

Sean A. Ahrens, CPP Security Market Group Leader Affiliated Engineers, Inc.
Sean Ahrens is a well-known security/resilience leader; whose achievements span the globe. He has facilitated threat, risk, vulnerability, and, audit/analysis. Mr. Ahrens is known for the physical, technological, and operation security controls that he has developed for some of the most iconic projects, both domestically and internationally. Culminating decades of achievement in the security space, Mr. Ahrens, in 2014, received two awards for security innovation for his contributions on the Doha, Qatar Petroleum Headquarters project — a 22 million square foot campus in Doha, Qatar.
Mr. Ahrens has also offered security thought leadership in the development of security standards and guides. A former founding member of the ASIS (American Society for Industrial Security) commission on guidelines, he has contributed to a number of security guides and standards and continues his work now with the Council on Tall Buildings and Urban Habitat (CTBUH). In this role, he is developing a security guideline to assist developers and owners in the selection of security controls for their respective iconic properties.
He continues his thought leadership with resilience, master planning, risk/threat/vulnerability assessment, and security technology design. His experience includes surveillance, control enter design, convergence, PSIM, access control, door hardware, intrusion detection, and he has professional competence in higher threats/vulnerabilities involving chemical, biological, radiological, and nuclear threats, force protection, and related pedestrian and vehicle screening technologies.
|
|
|
 |
|
Overtur™ is Allegion’s digital environment for simplifying design, specification and management of door openings, including access control, between Divisions 8 and 28. It serves as a central hub of access control hardware information that allows team members to collaborate on a project in a single platform.
|
|
IAPSC
IAPSC’s 2021 Annual Conference will be held June 7-9 at the Sheraton Gunter in San Antonio, Texas.
IAPSC staff is working closely with the venue to ensure we are proactively following safe meeting practices based on CDC and local guidelines. We look forward to sharing our plans with you. Please stay tuned for more details and registration coming soon! In the meantime, please visit IAPSC’s website for hotel information.
Please contact IAPSC staff via email at iapsc@iapsc.org with any questions.
IAPSC
Earning the Certified Security Consultant designation demonstrates your depth of knowledge, professional objectivity, integrity, and skills as a security consultant. The CSC requires a combination of experience, education, independence, ethics, and successfully passing an online examination.
The exam is open to both members and non-members as well as independent (external) and internal consultants. IAPSC members are pre-qualified to sit for the exam and receive a discount on the certification fee.
Learn more here and apply today!
.GOVERNMENT
Foundational Excellence: How a 'Connected Government' Strategy Can Support It Needs
Security Magazine
Government can no longer afford to pursue monolithic, exquisite technology solutions. Given rising citizen expectations and the fast-changing technology landscape, state and local governments need to work closely with key stakeholders, including both citizens and IT vendors.
This vision — call it “Connected Government” — will drive IT modernization. It’s a relationship-based approach to technology that will help state and local governments meet the immediate challenges of remote work and virtual citizen service, while also helping government IT leaders keep pace with innovation.
|
|
Why Innovation Is So Important to America's Global Leadership
The Hill
From health care to finance, education to navigating space, agriculture to climate research, and from Hollywood to the Pentagon, innovation has been America’s lifeblood. Innovation is new or improved art, products, processes, services, business models, or technologies.
|
|
|
Promoted by Murray Associates
Spies, hackers, terrorists and nosey neighbors are targeting business Wi-Fi big time. And, why not? Business information is valuable, ransomeware pays, and voyeurs seek entertainment. Our 20-point checklist will help you secure your system. Most Wi-Fi systems are sitting ducks, especially with employees working from home. Wi-Fi is used by smartphones, printers, VoIP phones, security cameras, smart TVs, smart speakers and all other IoT devices. Wi-Fi is also the gateway to your network, where everything else can be remotely attacked by outsiders. Additionally, many bugging devices use Wi-Fi…
|
|
|
Major VPN Security Bug Still Plagues Several Government and Bank Websites
Tech Radar
In what’s equally sad and shocking, a hacker has posted an exploit that can be used to steal VPN credentials using a 2018 vulnerability that was publicly disclosed over a year ago.
It is reported that a series of one-line exploits can reveal authentication information from about 50,000 compromisable targets.
|
|
.BUSINESS & MANAGEMENT
Call Boxes in a Mobile Age
Security Industry
I am attending a university orientation tour, and our guide is talking about the importance of safety/security and policing at the university. This piques my interest. The guide points to a call box and says, “These call boxes are located throughout the campus and directly call the police,” boasting about the campus law enforcement response time.
|
|
|
With Profile T, ONVIF employs a media service that can support video compression formats, including H.265. The profile is also designed to support audio compression formats, with the ability to include video and audio codecs as needed in the future without having to redesign its media service.
|
|
|
|
|
Thousands of industry professionals subscribe to association news briefs, which allows your company to push messaging directly to their inboxes and take advantage of the association's brand affinity.
Connect with Highly Defined Buyers and Maximize Your Brand Exposure
|
|
|
|
|
COVID's Impact on Black Friday Security
Security Info Watch
Black Friday, the annual day after Thanksgiving sales held by retailers to ignite their busy holiday shopping season, has typically been marked by deep discounts and throngs of people filling malls and stores across the nation. These crowds, some of which begin lining up hours before stores even open, have also been a major security concern over the years as employees and customers have been trampled or even violently assaulted as people try to be the first to get their hands on the most highly-coveted goods.
|
|
Scams Ramp Up Ahead of Black Friday Cybercriminal Craze
Threatpost
The number of online holiday shoppers this year is expected to skyrocket due to the pandemic — and consequently, consumers can expect an onslaught of scams, phishing attacks and other malicious activities.
The risk of infection is driving consumers to shop from the safety of their homes, rather than venture out into stores. In fact, a recent study revealed that 62% of consumers shop more online now than before COVID-19.
|
|
Which Countries and Hackers Are Targeting COVID Vaccine Developers?
The Guardian
Russia’s best-known hacker groups —Fancy Bear and Cozy Bear — are considered to be linked to the country’s intelligence organisations, according to western security agencies.
Fancy Bear, the better known of the two, is linked to GRU military intelligence and is accused of being behind the hack of US Democratic party computers in the run-up to the 2016 presidential election, the product of which was widely leaked.
|
|
.IT SECURITY
How to Enhance Cybersecurity During the COVID-19 Pandemic
TechiExpert
Due to the current outbreak of the coronavirus pandemic, the world is already in the middle of economic disruption. Cybercrime and fraud is an added hassle that adds fuel to fire. Businesses can no longer afford to face any more losses these days. Unfortunately, criminals have taken advantage of the current situation and fraudulent activities have become more common than before.
|
|
New Study Says Cyber Security Technology Isn't as Effective as It Should Be
Security Boulevard
A new study by Debate Security finds that the efficacy problems in cyber security are more related to economic issues rather than technology issues. It found that companies when evaluating which cyber security software to purchase, didn’t include evaluating efficacy of the solution as a consistent factor in deciding to choose and implement a solution.
|
|
Ransomware-as-a-Service: The Pandemic Within a Pandemic
Intel 471
Ransomware is a massive problem, but you already knew that.
Technical novices, along with seasoned cybersecurity professionals, have witnessed over the past year a slew of ransomware events that have devastated enterprises around the world.
|
|
Why It's Time to Rethink Information Security
Fast Company
The pandemic has fueled a process of rapid digitization that’s transforming how people work and has huge implications for the way organizations will operate.
The pandemic has accelerated several trends we’ve been watching for years, from the adoption of cloud-based business processes and seamless collaboration, to the protection of employees and systems from “bad actors."
|
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|