This message contains images. If you don't see images, click here to view.
Advertise in this news brief.

Text Version   RSS   Subscribe   Unsubscribe   Archive   Media Kit July 14, 2015

Home   About   Join   Members   Events & News   Press   Contact     



IAPSC members' only cybersecurity interest group — 1st meeting July 17
IAPSC Members are encouraged to participate in this 1-hour Web-based audio/video conference call coming up on Friday, July 17, 2015 at 9 a.m. Pacific/12 p.m. Eastern. Initial topics to be covered: NIST cyber security framework, security and privacy controls for federal information systems and organizations, data breaches, and international security considerations. Meeting chairs are Jim Kelton and Michael Bacon.

The Forensics and Security Management Interest Group (Ken Wheatley and Norman Bates, co-chairs) will have its first meeting on Friday, Aug. 21 at 9 a.m. Pacific/12 p.m. Eastern.

To attend, IAPSC members may RSVP to

The purpose of the Interest Groups is to facilitate member relationship-building across areas of specialty and interest. They will provide new opportunities for IAPSC members to survey the needs of the membership in their specialized areas and discuss current topics, best practices and guidelines, challenges members are experiencing, and trends in the industry.
   Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Sennewald's 'Planning and Budgeting' featured in ASIS Security Spotlight: The Business Case for Security
This detailed chapter from Chuck Sennewald's yet-to-be-released Effective Security Management, 6th Edition, uses examples to describe the intrinsic relationship between plans and budgets. A budget breathes life into a plan and gives the plan direction, Sennewald contends, and plans must be based on good judgement and good decision-making estimates about the future. In an optimal scenario, senior management initiates the process by establishing acceptable expenditure guidelines. Next, security managers submit courses of action, with costs, for achieving organizational goals. Senior management, then, makes decisions based on the security manager’s recommendations. To access the chapter for free, visit the link below.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Welcome to IAPSC's newest members!
Don McGray, CPP
Security Management Consultant
Next Step Solutions, Inc.

Mr. McGray has over 30 years of security experience including corporate and military experience. He recently retired from Aramco Services Company (ASC) in Houston Texas, a subsidiary of Saudi Aramco, where he served as Supervisor over the following departments: Security Operations, Background Investigations, and Corporate Training. In December 2013, he moved to Huntington Beach, CA to be closer to his granddaughter and her family. He also retired from the US Air Force Reserves as a Lieutenant Colonel after a 32 year career. His military career included 6 years as Weapon Systems Officer (WSO) in the F-4 Phantom fighter aircraft; 17 years in Security forces, including 6 years as Commander, Security Forces at Ellington ANGB Texas; and his final 9 years as an Air Force Air Operations Officer assigned to the 75th Division, U.S. Army Reserves in Houston, TX. Don specializes in the management side of security such as conducting risk assessments, high rise security programs, as well as the development of physical security, investigative, and training programs.

Robert A. Gardner, CPP
Independent Security Advisor
Expert Witness

Mr. Gardner is a Board Certified Security Management Professional with multi-state Security Consultant, Private Patrol and Private Investigator "Qualified Manager" licenses. His background includes more than 40 years of training and experience in evaluating, developing, and managing security and crime prevention programs. For 25 of those years he served as both a private sector Security Consultant and a public sector Peace Officer. He is a former Corporate Security Manager, Police Crime Prevention Specialist, Detective Supervisor, Police Training Manager, and Internal Affairs Sergeant.

He provides security and crime prevention planning and management support, risk and needs assessment, physical security design, security audits, forensic security consulting and expert witness services from offices in Santa Paula, CA; Sacramento, CA; Las Vegas, NV and Scottsdale, AZ. My clients include small businesses; estate & executive residential home owners; government agencies; hotels, nightclubs and casinos; small airports; remote/isolated facilities; and attorneys.

Bryan Strawser
Principal Consultant & CEO
Bryghtpath LLC

Bryan Strawser is Principal Consultant, Founder, and CEO of Bryghtpath LLC, a Saint Paul, Minnesota based global risk and resiliency consultancy that works with the world's leading brands, non-profits, and public agencies to develop stronger organizational resilience to disruptions around the world. Bryan's areas of expertise include business continuity & resiliency, crisis & emergency management, enterprise risk management, crisis communications, global security, and public/private partnerships. Prior to launching Bryghtpath, Bryan spent 21 years in the corporate security function at Target Corporation. Most recently, Bryan led Target's global crisis management & business continuity team where he had responsibility for Target's overall organizational resiliency, business continuity, global intelligence, and crisis management functions. Bryan has served as a board member & committee chair at the National Emergency Management Association and as Vice-Chairman of the Retail Industry Leader's Association Disaster Recovery & Preparedness Committee.

Bryan holds multiple professional certifications in business continuity, physical security, emergency management, information security and project management.

Learn more about Bryan and Bryghtpath LLC at

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

IAPSC will be at ASIS 2015 in September — Come and see us!
Join IAPSC for two opportunities to connect with association members and colleagues in the security industry during ASIS 2015 in Anaheim, CA. The IAPSC networking reception for members and their guests will be the evening of Sunday, Sept. 27 from 5-7 p.m. Also, be sure to visit our information and membership booth on Monday, Sept. 28 or Tuesday, Sept. 29. Members will be available to answer questions about IAPSC and the benefits of membership. To get details, RSVP for the reception, or to volunteer for a time slot at the booth, contact:
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

IAPSC Successful Security Consulting Seminar at ASIS 2015
Sunday, September 27, 8 a.m.-5 p.m.

This popular, one-day intensive program presented by leading technical and management security consultants will show you how to develop, market and deliver security consultant services and how to avoid the costly mistakes that can sabotage the success of your clients’ or your own security program. The program is filled with practical information on just how to offer and deliver security consulting assignments starting with establishing your practice, finding clients, networking with other consultants, and executing security management and technical aspects of consulting from the initial consulting assignment through security assessments, designs and specifications, procurement, and implementation. A comprehensive workbook of sample proposals and reports will be provided each attendee. Program # 1509-CONSU

Register Now

Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Mark your calendar — IAPSC Annual Conference is in Charleston!

Share on FacebookTwitterShare on LinkedinE-mail article


Study: Retailers' shrink reduction efforts pay off
With each passing year it seems as though shrink statistics for retailers become even bleaker than the last. Shoplifting and employee theft are nearly always trending upwards despite the best efforts of loss prevention departments. Finally, however, there may be a bit of good news on the shrink front. According to the 2015 National Retail Security Survey conducted by University of Florida in partnership with the National Retail Federation, inventory shrink averaged 1.38 percent of retail sales in 2014, resulting in the loss of $44 billion.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Missed an issue of IAPSC News? Click here to visit the IAPSC News archive page.

Watchdog urges TSA to improve security of boarding passes
USA Today
A federal watchdog repeated a recommendation for the Transportation Security Administration to make airline boarding passes more secure, a day after computer problems at United Airlines and the New York Stock Exchange sparked concerns about the threat of cyber terrorism. TSA and airlines have resisted encrypting bar codes as technically difficult and expensive. TSA is exploring a different technology to authenticate boarding passes and said that it screens travelers through many layers of security.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Grid security as a service?
The technical issues that interrupted service for the Wall Street Journal, the New York Stock Exchange and United Airlines on July 8 illustrate how dependent the economy is on technology. As IT staff worked to fix the problems, at least their computers and phones worked, and the lights and AC were on. A failure of the electrical grid, on the other hand, would make the problems at the NYSE look like, well, just glitches. For some time, experts have been warning about security of the electrical grid and smart grid vulnerabilities, as utilities are increasingly connecting to the Internet for smart metering and collecting data on equipment condition and power use through embedded sensors.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Is 'Robocop' a reality? Not yet, but technology is inching us closer
By Danielle Wegert
When the original "Robocop" movie came out in 1987, robots were merely a far-fetched futuristic concept of "The Jetsons." By the time the rebooted "Robocop" movie was released in 2014, robots were real. They aren't taking over the world — just yet — but they are here. Across the U.S., law enforcement agencies are beginning to use robotic technology in threatening situations, and they may soon perform many of the regular duties of a police officer.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


Top security experts say government limits on encryption present risks
Tech Crunch
A group of top cybersecurity experts reported that giving law enforcement special access to encrypted data for investigations would pose "major security risks." The Massachusetts Institute of Technology's Computer Science and Artificial Intelligence Lab report included input from cryptography expert Bruce Schneier and researchers from MIT, Stanford University, Columbia University, Cambridge University, Johns Hopkins University, Microsoft Research, SRI International and Worcester Polytechnic Institute.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Mexican official: Border security a 'shared responsibility'
Texas Tribune
During a visit to Texas, Mexican Foreign Affairs Secretary José Antonio Meade Kuribreña met with Gov. Greg Abbott at the Governor's Mansion, where an Abbott spokesperson said they discussed border security, infrastructure and trade. Abbott said at a news conference that he had also accepted Meade's invitation to visit Mexico. Meade, who previously served as a secretary of energy and secretary of finance under former Mexican President Felipe Calderón, also visited the University of Texas at Austin, where a deal was signed to allow top science and technology researchers to work temporarily at the university.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article


The dinosaurs of cybersecurity are planes, power grids and hospitals
Tech Crunch
As we continue down the path toward complete connectivity — in which all devices, appliances and networks connect to each other and the Internet — it is evident that much of our longstanding technology can no longer keep up. And it's not an issue affecting only tech companies and web-connected devices, it’s affecting systems and infrastructures that most would expect to be the safest in the world. Even airplanes are at risk, and the recent breach of the Office of Personnel Management demonstrates that government networks can be breached as easily as those in the private sector.
Share this article:   Share on FacebookTwitterShare on LinkedinE-mail article

Colby Horton, Vice President of Publishing, 469.420.2601
Download media kit

Esther Cho, Content Editor, 469.420.2671  
Contribute news

International Association of Professional Security Consultants
575 Market Street, Suite 2125, San Francisco, CA 94105
Tel: 415-536-0288 | Fax: 415-764-4915 |

Be sure to add us to your address book or safe sender list so our emails get to your inbox. Learn how.

This edition of the IAPSC News was sent to ##Email##. To unsubscribe, click here. Did someone forward this edition to you? Subscribe here — it's free!

Recent issues

June 30, 2015
June 17, 2015
June 2, 2015
May 19, 2015

7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063