This message contains images. If you don't see images, click here to view.
Advertise in this news brief.

Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit February 10, 2015

Home   About   Join   Members   Events & News   Press   Contact     



IAPSC 'Successful Security Consulting' Workshop
ISC West: Free Exhibit Hall Pass for Members


On behalf of ISC and SIA, we'd like to invite you to join us at ISC West 2015 at the Sands Expo in Las Vegas. The Exhibit Hall will be open April 15-17 and SIA Educational sessions will be April 14-16. ISC West allows you to:
  • Kick off your strategic planning for the year
  • Explore over 1,000 exhibitors and brands
  • Stay connected to your colleagues through exclusive networking

IAPSC Members: Contact us to register for the ISC West exhibition hall, produced by ISC Events, for FREE courtesy of SIA.

But that's not all. Join us for the IAPSC "Successful Security Consulting" Workshop on April 14, 8:30 a.m.-5 p.m., Sans Expo Las Vegas. This popular, one-day intensive seminar will show you how to develop, market and deliver security consultant services effectively. Learn how to avoid the costly mistakes that can sabotage the success of your security program.

View the SSC program outline and register now

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Klatt speaks on video surveillance at TechSec Solutions 2015
IAPSC Member Kelly S. Klatt, CPP, the Area Director of Safety & Security at Loews Hotels, presented at the TechSec Solutions event on Feb. 3-4. His presentation with Les P. Vernon and Fredrik Nilsson was entitled "Who's the boss of video surveillance?: IT vs. physical security," exploring a brand new trend in the relationship between physical security departments and IT departments: the emergence of the IT departments as the decision maker on questions of video surveillance.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


IAPSC Annual Conference 2015 — Join us in Napa!
Register by March 2 to SAVE

Join your IAPSC colleagues for the IAPSC Annual Conference 2015, Old Growth vs. New Growth — the Future of Consulting, April 19-22 in Napa, California!

The 2015 program is built to provide you with the tools and knowledge to keep you at the forefront of the industry now and in the future. Sessions cover a range of topics including: cultural site security, security risks associated with infectious disease, terrorism and national security, college campus security, social media marketing, customer retention, and drone security. In addition, four sessions will feature case studies and real world applications of technical security solutions revolving around VMS, perimeter security, and access control.

View the Program
Visit the Conference Website

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


New solution helps retailers protect their customers against identity theft
Security Info Watch
Over the last 12 months, the retail industry has suffered what seems to be an unending string of data breaches. From Home Depot to Michaels and Neiman Marcus, cyber criminals were able to steal a wealth of other consumer information throughout 2014. While the majority of people when they hear about retail breaches become instantly concerned about compromised payment card details and rightfully so, the bigger prize for data thieves is the ability to pilfer not just their debit or credit card number but information they could use to potentially steal their identity.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Obama national security strategy stresses alliances, American values
The Washington Post
President Barack Obama has recommitted his administration to the security strategy he outlined five years ago, placing economic strength, international alliances, American values and rule of law on par with military muscle in advancing U.S. interests and protecting the country from harm. "The question is never whether America should lead, but how we lead," Obama said in the introduction to the second National Security Strategy of his administration, a 29-page document delivered to Congress. The strategy document comes as critics have accused the administration of lacking coherent and workable strategies to address a range of security challenges, from Ukraine and the Islamic State to nonproliferation and cyberthreats.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Uncovering security flaws in digital education products for schoolchildren
The New York Times
To help schools evaluate companies' security practices, the Consortium for School Networking, a national association of school district chief technology officers, published a list of security questions last year for schools to ask before they sign purchase agreements with technology vendors. Security lapses are not limited to education software devised for prekindergarten through 12th-grade students, an annual market estimated at about $8 billion.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Why health care companies need to do more to protect your data
Those seemingly harmless medical forms everyone fills out before seeing a doctor can lead to identity theft if they get into the wrong hands. Names, birthdates and — more importantly — Social Security numbers can help hackers open fake credit lines, file false tax returns and create false medical records. And health care businesses can lag far behind banks, credit card companies and retailers in protecting such sensitive information.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Miss an issue of IAPSC News? Click here to visit the IAPSC News archive page.

Report: Automakers lag in protecting security, privacy of cars
The spread of technology connecting vehicles to the Internet is outpacing efforts by the auto industry and government to protect vehicles from hackers, and raising concerns about data privacy, according to a report by staff for U.S. Senator Ed Markey. The report, based on responses by 16 automakers to questions posed by the Massachusetts Democrat, concludes that while nearly 100 percent of new vehicles on the market contain some kind of wireless communications technology, security measures to prevent hacking of vehicle electronics are "inconsistent and haphazard" across the industry.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Are smart homes security smart?
Help Net Security
A new ENISA study aims to identify both the security risks and challenges as well as the countermeasures required for emerging technologies in smart homes, providing a specific and focused approach, with an overview of the current state of cyber security in this emerging domain. For the compilation of this report, an informal expert group was created to collect input at various stages of the project. It also takes into account existing assessments and publicly available information sources and provides a thematic Threat Landscape in the area of Smart Homes.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


A giant security gap at US airports? Most workers not screened daily
The vast majority of airport employees with direct access to the tarmac and airplanes do not go through any daily security screening, and only two of the country's major airports have systems in place that require all employees with secure access to pass through metal detectors, a CNN investigation has found. CNN was given exclusive access to one of those, Miami International Airport, and on a recent afternoon, employees lined up at a checkpoint where they passed through a metal detector as they reported to work. They gathered their belongings, swiped their badges and opened a door that leads down to the airport's secure ramp area.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Bridging the cybersecurity skills Gap: 3 big steps
Dark Reading
There is a dangerous dearth of qualified Information Security talent in industry today. In the face of mounting threats and an unprecedented number of data breaches, organizations and governments simply aren't coping. Cybercrime is growing rapidly as sophisticated, targeted attacks flood in from diverse sources. The exploitation of vulnerabilities has a very real economic toll that's often underestimated. Economic growth is restricted and job losses are common.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Esther Cho, Content Editor, 469.420.2671  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915 |

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

Jan. 27, 2015
Jan. 13, 2015
Dec. 30, 2014
Dec. 16, 2014

7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063