BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Supply Chain Resilience in an Era of Global Disruption: Protecting Physical Assets and Information Flow 

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Supply Chain Resilience in an Era of Global Disruption: Protecting Physical Assets and Information Flow,” presented by M. Brian Reid, CPP, at Confidential. Read on for what he had to say and don’t forget to register for GSX 2025!

Q: How did you become interested in your topic? 

A: As was likely the case for many who have an interest in this topic, the COVID-19 pandemic heightened my interest in this specific subject. Before that, my work in the fields of business continuity and critical infrastructure assessment focused on in-depth analysis of the field. As the progressive dependency on technology strengthened and deepened the nexus between physical and logical security, I recognized the increased opportunity for events and bad actors to exploit weaknesses in the supply chain and the sheer impact this could have on the availability of goods and services but also the economic fallout across the globe in many instances. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

A: Supply chain resilience represents a critical point of convergence where traditional physical security and cybersecurity intersect with operational continuity, making it essential for security professionals to understand the importance of this concept. The impact of a supply chain disruption can be felt directly by an organization as well as indirectly. The resultant implications can also become interwoven with other aspects of the business, thereby increasing the overall organizational risk profile. Effective security management works much better when we, as security professionals, are as proactive as possible. 

Q: What advice would you give security professionals interested in this topic? 

A: If I could offer some words of advice to mid-career and early-career security professionals, it would hinge on knowledge and networks. Expand your knowledge base beyond traditional physical security silos by building working relationships with and developing an understanding of cybersecurity, procurement, operations, logistics, and business continuity teams. Supply chain resilience requires practitioners to be able to speak the language of security and continuity, as well as possess a solid understanding of operational concepts and best practices. Invest time in understanding how your organization’s supply chains function at a granular level, and also examine the broader protection picture to determine how physical and cybersecurity integrate with business continuity. Additionally, seek opportunities to engage with other professionals in a collaborative and learning-focused environment, such as GSX 2025. 

Q: How do you see this issue evolving in the next 2-5 years? 

A: We live in a rapidly evolving and complex world. Anyone who claims to be able to see future trends 10 years out is either a direct descendant of the French seer Nostradamus or has not considered how interconnected and interdependent most organizational systems are. This rapid rate of change also creates technological obsolescence within a two-period or less timeframe, especially for web-enabled services, many of which manage the supply chain. Technology infrastructure also requires continuous updates; failure diminishes the efficacy of the tools used to detect and protect against threats. However, there are specific general trends that can be extrapolated into the future, allowing for an awareness of what’s on the horizon. These trends and their potential impacts are rooted in regulatory and legal changes, particularly in the EU at this time, such as the CRA and DORA, as well as the use or misuse of emerging technologies, including Artificial Intelligence, among others. 

Q: Why do you attend GSX? 

A: I attend GSX because it provides an environment filled with exceptional networking and learning opportunities through the various educational sessions. It is a must-attend event for security professionals seeking to stay current with the latest security industry trends and best-in-class frameworks. 

The Dark Side Of Artificial Intelligence: Unleashing The Challenges For Global Security Risk Management

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “The Dark Side Of Artificial Intelligence: Unleashing The Challenges For Global Security Risk Management,” presented by Jeremy Prout, CPP, Security Director at International SOS, Meghna Roy, VP, Product Management at Ontic, and Stefanie Drysdale, Senior Vice President at Prescient. Read on for what they had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic? 

SD: AI touches absolutely everything we do now, and security, cybersecurity, and executive protection are no exceptions to that.  Whether it’s being used as an attack tool aimed at us, or we are using it to defend, it’s become such an important part of all our lives and should be factored into our programs. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

JP: Our presentation aims to explore the double-edged sword which is AI in the security space. AI can be a force multiplier for security leaders, allowing for better threat detection, faster decision making and generally improving the overall efficiency of a security department. But our adversaries can also weaponize it with deep-fake misinformation and a myriad of other creative chaoctic tactics. We want to help security professionals understand the capabilities and risks of AI, in order to help organizations in a global, dynamic threat landscape.  

Q: What advice would you give security professionals interested in this topic? 

MR: My advice would be to embrace AI, but with intentionality and vigilance. The opportunities with AI within the security industry are enormous: AI can augment threat detection, automate routine assessments, provide predictive insights, generate reports in minutes, and sift through mountains of data in ways that traditional tools and practitioners simply can’t. AI can be a massive force multiplier for security teams, especially those that are small or understaffed. However, the power of AI comes with new responsibilities. Security professionals must critically evaluate the quality and bias of the data feeding these systems, ensure transparency in how AI-driven decisions are made, and stay ahead of the evolving regulatory landscape across different jurisdictions. 

Start with well-scoped, high-impact use cases. Focus on areas where AI can immediately enhance your organization’s situational awareness or decision-making, such as early threat detection, detecting anomalies in large amounts of data, or real-time intelligence gathering. Avoid trying to “AI everything” out of the gate, but rather take a pragmatic approach to implementing this technology. The most successful implementations require a human element of decision-making where AI complements, rather than replaces, expert judgment. AI is a powerful tool, but it’s your expertise and values that will ensure it’s used responsibly and effectively. 

Q: Why do you attend GSX? 

JP: I’ve been going to GSX since 2018 and plan to continue that trend for my career. I attend to understand two things; what challenges are we as Security Professionals struggling with and what solutions can we brought to bear. Every year there is a new threat or concept that we collectively need to address and that is why I attend. 

SD: Since my very first GSX several years ago, I’ve been so grateful to meet so many brilliant minds in our industry and learn from them.  The conference has provided both me, as well as our company, an opportunity to grow and engage in the broader industry. 

MR: I attend GSX because it brings together a diverse and experienced community of security professionals, from corporate security leaders to law enforcement, technologists, and risk managers. For me, it’s an opportunity to listen directly to the challenges our industry is facing, learn how organizations are evolving their approaches to managing and mitigating threats, and explore how innovation and emerging technology can support those on the front lines of keeping people and assets safe. 

It’s also a great opportunity for me to meet face-to-face with Ontic’s clients and partners and hear from them about what’s working and what’s not, what they would like to see from us, and what their priorities are. I walk away from every GSX with new insights and inspiration, a renewed sense of purpose, and a deeper understanding of how Ontic can continue building products that meet the operational demands of security teams globally. 

Bringing Shadow Practices to Light: Executive Targeting

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Bringing Shadow Practices to Light: Executive Targeting,” presented by Jennifer Holcomb, CPP, PSP, Vice President at Accenture. Read on for what she had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic? 

A: The industry is well aware of how the physical and cyber worlds are integrated given the networked nature of physical security platforms. It’s only logical that we extend this to our assessments in other ways. To that end, I’ve been working more with our cyber team to integrate our approach to security. It’s a natural evolution given the impacts on our daily lives through social media and threats from the dark web. From security breaches, social media attacks, disinformation, etc., our digital and physical worlds have merged. The medium may be virtual, but the threats are real. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

A: Executive protection often lacks an integrated approach, failing to connect digital threat signals, physical vulnerabilities, and inner circle exposure to an actionable security posture. Integrating the digital, physical, and inner circle threat intelligence with aligned threats to an executive’s role, exposure, and industry risks yields an executive-centric protection approach. This presentation will focus on digital threats, especially those on the dark web, to provide an understanding of how malign actors carry out attacks to better counter the effects. 

Q: What advice would you give security professionals interested in this topic? 

A: The dark web is complex and not a space to venture if you don’t know the pitfalls and traps that could put you in legal trouble. Find experts legally authorized to work in that space, who can engage with bad actors to gather intel, and coordinate with law enforcement accordingly to address concerns. Additionally, there is a potential deluge of information if you choose to explore this space. Working with knowledgeable organizations or teams can help you focus on the data that matters most to securely support high profile targets.  

Q: How do you see this issue evolving in the next 2-5 years? 

A: From a general perspective, we will continue to see the integration of cyber with physical and subsequent threats. However, I do think that threat actors will continue to develop platforms, methods, and encryption coding to evade security providers. Data breaches and unauthorized information sharing will continue to create greater risks—more subversive threats (anti-government), more indirect attacks (swatting, bomb threats), and more direct attacks (the shooting of the UHC CEO). Specifically, a newer concern is sophisticated AI-enabled attacks, like deepfakes. We need to ensure the complex stacks (think security-in-depth for cyber) are designed to protect against targeting across the cyber and physical domains. As these threats continue to evolve, we need to keep up. Learning what you can now means you have less to catch up on later if you are not in the cyber industry and working in the shadows.  

Q: Why do you attend GSX? 

A: There are many reasons why I attend. The educational sessions, the comradery, networking with industry professionals, and seeing new technologies. It also gives me an opportunity to meet with my fellow members on the ASIS Professional Standards Board. I’m looking forward to attending GSX in New Orleans and presenting on this increasingly important topic. 

Ensuring We Develop The Next Generation Of Security Professionals

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Ensuring We Develop The Next Generation Of Security Professionals,” presented by John Petruzzi, CPP, Chief Executive Officer at Unlimited Technology, Inc. and past president of ASIS International, Michael Gips, CPP, Managing Director, ESRM, at Kroll, and Stevan Bernard, former EVP of Global Protection Services at Sony Pictures Entertainment and Senior Security Advisor at International SOS. Read on for what they had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic? 

SB: I’ve been a member of ASIS for over 50 years. In 1983, when I landed my first Security Chief role: I had no network in the private-sector, little experience in corporate security and not a great deal of business savvy. A friend suggested I join ASIS and acquire the Protection of Assets Manual(s). As I developed, I realized I didn’t need to have all the answers. Through my growing network I knew how to find the answers and, in turn, share what I learned.  

As I age, I especially realize the importance of mentoring, speaking publicly, being active in associations like ASIS, DSAC, OSAC, etc. Today, I’m active in helping companies recruit, helping source candidates and interview, helping new employees acclimate, etc. A few months ago, Ray O’Hara and I had a conversation about passing-the-baton. This was followed by a discussion with Michael Gips and John Petruzzi. We all wanted to do something in this regard. It is not just nice to do; it’s an obligation we wish to meet. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

JP: During our session, we’ll discuss the importance of a plan to ensure you’re prepared to address the knowledge and expertise required to successfully navigate the security risk profession. We’ll touch on the soft and hard skills of security management and most importantly dive deep into why you must have a keen understanding of business operations—knowing the business you’re supporting. We’ll also discuss other critical items such as mentorship and building trust-based partnerships. 

Q: What advice would you give security professionals interested in this topic? 

MG: Whether you have been in the profession for 30 seconds or 30 years, you are both a mentor/leader and protégé/follower. As someone in the latter category, I would emphasize that not only are we strengthening and future-proofing our profession by developing the next generation of security leaders, but we are also profoundly benefiting ourselves. I learn as much from my proteges as they learn from me. While I may assist them in how to conduct interviews, perform site surveys, write effectively, step into thought leadership, and analyze information, they teach me how to leverage new technology, communicate across generations, adjust my leadership style, and navigate challenges that didn’t exist just a few years ago. 

If you are a new or aspiring security practitioner, come to the session not only to see what the presenters can do for you to enhance your career, but also what you can do for the profession—including for the most experienced leaders among us. 

Q: Why do you attend GSX? 

MG: I attend GSX every year because it is the optimum mix of valuable educational sessions, new technology on exhibit, and ultimate networking. If you’ve been around the security profession for a while, you will see a who’s who of colleagues across every vertical and security discipline, as well as practitioners from adjacent disciplines such as IT, facilities, law, and business continuity. The event is a kaleidoscope of exciting technology, provocative educational sessions, valuable networking, and fortuitous encounters. It will leave you simultaneously amazed at what you were able to accomplish in just a few days, as well as everything (and everyone) you didn’t have a chance to get to. 

Crime Prevention Through Environmental Design and the K-12 School Environment

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Crime Prevention Through Environmental Design and the K-12 School Environment,” presented by Carol Dodgen, Owner at Dodgen Security Consulting, and Mo Canady, Executive Director at the National Association of School Resource Officers. Read on for what they had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic? 

CD: My interest in Crime Prevention Through Environmental Design (CPTED) began years ago as a security consultant working with banks and other businesses. I became certified in several areas of CPTED and earned my Crime Prevention Designation (CPD) in 2017. CPTED has such broad application that it makes sense to apply these principles to schools to make them safer. Within the unique context of a school, CPTED can be used to promote well-being and inclusion, while discouraging isolation and negative behaviors.  I appreciate the fact that the CPTED approach integrates design features and natural elements alongside traditional target-hardening strategies. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

MC: K-12 schools are one of the most dynamic and unique environments in any community. Most of the population is made up of adolescents who are going through the second and final phase of massive brain development. They respond to things very differently than primary adult populations in other professional environments. Adolescent Brain Development must be at the forefront of any CPTED strategy in the K-12 school environment, and it will be explored in depth in this presentation. 

Q: What advice would you give security professionals interested in this topic? 

CD: I would recommend taking advantage of reputable organizations that provide training and certification in CPTED.  There are many helpful resources on the subject, and quite a few CPTED organizations worldwide.  The National Institute of Crime Prevention, for instance, offers the CPD designation as well as specific courses focused on CPTED for Schools. 

Q: How do you see this issue evolving in the next 2-5 years? 

MC: The K-12 school environment continues to provide many challenges. As an example, incidents of weapons located on campus continues to rise across the nation each year since the return to school from the Pandemic. Adolescent Mental Health cases continue to rise as well as students with special needs which both present multiple challenges in K-12 schools. CPTED strategies in this environment must continue to evolve over the next several years, and we absolutely need more CTPED professionals engaged in this effort.  

Q: Why do you attend GSX? 

MC: This will be my third time attending GSX. My primary reason for attending is to continue to learn more about security technologies as well as to engage with CPTED professionals. 

CD: Having attended and presented at GSX in previous years, I enjoy the opportunity to participate in informative sessions, network with other professionals, and learn about the latest security advances by visiting the exhibition hall. 

Deadly Category 1-to-5 Hurricane in 24 Hours: Rescuing 85 Employees at Conference from Direct Hit

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Deadly Category 1-to-5 Hurricane in 24 Hours: Rescuing 85 Employees at Conference from Direct Hit,” presented by Mario Franco, Security Director, Mexico and Central America at Schneider Electric. Read on for what he had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic? 

A: During my security training, I received extensive education in business continuity and emergency response. However, this particular event discussed in my presentation truly put all that knowledge to the test. It was an unprecedented and unexpected situation due to the rapid escalation of a natural phenomenon. While we have tools to monitor these events, we know they can’t be predicted with 100% accuracy. Climate change has made such phenomena increasingly unpredictable, highlighting the importance of being prepared for the unexpected. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

A: Security professionals often focus on risks within our own facilities—within our “four walls.” However, when our personnel attend external events, we must consider additional factors: coordination with event staff, emergency and crisis plans, local emergency departments, and disaster scenarios. In this case, no specific plan was in place for such an event, which shows the need to broaden our perspective and ensure preparedness beyond our immediate environment. 

Q: What advice would you give security professionals interested in this topic? 

It’s essential to build a culture where every department in the company understands the importance of security and feels empowered to consult with security teams. This allows for informed decision-making and tailored safety and security recommendations. Evaluating emergency response plans, conducting risk assessments, and ensuring clear protocols for off-site events are all critical steps. 

Q: How do you see this issue evolving in the next 2–5 years? 

A: With the increasing frequency and intensity of natural disasters due to climate change, we can expect these events to become more common and severe. Current statistics on hurricanes and other natural phenomena already show a concerning trend. Security strategies will need to evolve accordingly, incorporating new monitoring technologies and more agile, collaborative response plans. 

Q: Why do you attend GSX? 

A: As a security professional, my interest in attending GSX is that it’s renowned for its cutting-edge, cross-functional networking opportunities, which foster collaboration and innovation among security professionals from diverse backgrounds and industries. Additionally, I attend GSX to share my presentation with a broader audience, with the goal of always safeguarding our employees first, assets and sensitive information.  

By spreading knowledge and lessons learned, we can strengthen the preparedness and response capabilities of other professionals facing critical situations.

A Holistic Approach to Vehicle Ramming Assessment and Perimeter Protection Design

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “A Holistic Approach to Vehicle Ramming Assessment and Perimeter Protection Design,” presented by Pedram Hesam, PSP, CTO of Protective Design Engineering at PNH, and Herbert Ubbens, CPP, PSP, President at Paratus Consultants Group, LLC. Read on for what they had to say and don’t forget to register for GSX 2025!

Q: How did you become interested in your topic? 

PH: My interest in vehicle ramming threats and perimeter protection evolved naturally through my background in structural engineering and protective design. As I began consulting on high-security facilities and infrastructure, it became clear that vehicle-borne threats—both intentional and accidental—presented a unique and evolving challenge. The intersection of engineering, security, and risk mitigation is where I found purpose: designing physical security solutions that are not only technically robust but also tailored to the operational context of each site. The increasing frequency and diversity of vehicle incursions in both civilian and high-profile environments reaffirmed the importance of a holistic, systems-based approach to protective design—one that integrates threat assessment, performance-based criteria, and engineering rigor. 

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

HU: Our presentation, “A Holistic Approach to Vehicle Ramming Assessment and Perimeter Protection Design,” focuses on a comprehensive methodology for addressing the evolving threat of vehicle incursions—whether deliberate or accidental. We’ll walk through key concepts in threat assessment, the physics of impact, mitigation technologies, and real-world implementation challenges. 

Security professionals need to be proactive in understanding this topic because vehicle ramming incidents continue to be a favored tactic for both lone actors and organized threats. Even outside of intentional attacks, accidental vehicle intrusions can have devastating consequences. Unfortunately, many sites remain underprotected due to incomplete assessments or inadequate technical solutions. As protective design engineers, we aim to equip attendees with a practical framework for aligning vulnerability analysis, site constraints, and performance requirements—helping them make informed decisions that prioritize both safety and operational functionality. 

Q: What advice would you give security professionals interested in this topic? 

PH: Start by recognizing that vehicle ramming mitigation is not a one-size-fits-all problem. Effective perimeter security design requires a multidisciplinary approach—integrating threat intelligence, site-specific constraints, and engineering performance standards such as ASTM F2656 F3016 and ISO 22343. 

I encourage security professionals to work closely with qualified protective design engineers early in the design process to avoid reactive or piecemeal solutions. Understand the importance of validated products, informed siting, and the need for solutions that balance physical protection with usability, aesthetics, and maintainability. Lastly, stay current—technology, threats, and standards are all evolving rapidly. Ongoing education and collaboration with technical specialists will elevate the quality and effectiveness of your security posture. 

Q: How do you see this issue evolving in the next 2–5 years? 

HU: The threat landscape surrounding vehicle incursions is expanding. In the next few years, we anticipate an increase in not only weaponized vehicle attacks but also unintended incursions due to distracted, impaired, or aging drivers. Compounding this, the proliferation of autonomous and unmanned vehicles introduces new and complex threat vectors—challenging both detection and mitigation strategies. 

From a design standpoint, there will be greater emphasis on adaptable and modular security systems that can respond to dynamic threats while minimizing disruption to operations. We’ll also see more integration of physical barriers with intelligent systems—such as sensor fusion, analytics, and automated response—to form layered, responsive defenses. Security professionals will need to stay agile and adopt solutions that are both forward-looking and grounded in tested engineering practices. 

Unmasking AI-Powered Fraud Tools on the Dark Web: Threats and Countermeasures

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Unmasking AI-Powered Fraud Tools on the Dark Web: Threats and Countermeasures,” presented by Peter Warmka, CPP, Founder & CEO at Counterintelligence Institute, LLC. Read on for what he had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic?  

A: I spent a career in the CIA as a human hacker, focusing on manipulating insiders to breach the security of target organizations. Today, I assist organizations in defending against such threats. AI has significantly enhanced both the quantity and quality of attacks by increasing the “credibility” of the social engineering approach used in the attack.

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

A: I help attendees better understand the dark web and how it has become the central marketplace for a variety of AI tools, significantly lowering the barrier to entry for would-be criminals attempting to steal an organization’s IP or financial resources.

Q: What advice would you give security professionals interested in this topic? 

A: Increasing awareness is the very first step in combating this threat. Today, over 95 percent of successful data breaches are initiated by some form of human hacking. The goal of the human hacker is to circumvent the policies, procedures, and technological controls put in place to protect the organization. Security professionals need to better understand how AI technology is leveraged by human hackers to achieve this goal through the identification and manipulation of key insiders in an attack.

Q: How do you see this issue evolving in the next 2-5 years? 

A: Organizations will continue to look for AI-enhanced technical solutions in combating these threats while minimizing strategies to promote greater awareness training among their employees. As a result, the ability to defend against such threats will continue to lag behind its creative and rapidly evolving use by threat actors.

Q: Why do you attend GSX?  

A: I find that GSX combines great opportunities for networking with industry peers in addition to opportunities to learn about new technological advancements during presentations as well as hands-on demonstrations by exhibitors.

Attend a GSX 2025 Game Changer Session

Each year, ASIS highlights one Game Changer session each day. These sessions feature high-level content and are designed to explore trends that will shape the future of the security industry. This year’s sessions focus on executive protection, safety in public spaces, and crisis management.

In Monday’s session “When High-Profile Means Danger: Protecting Executives from Public Threats,” Charles Randolph and Chuck Tobin will discuss the potential implications of reputation for companies and their employees in the modern era. The session will look at the recent killing of UnitedHealthcare CEO Brian Thompson and how this was informed by the organization’s reputation. In this session, attendees will learn how to analyze the impact a change in perception can have on an organization and its protection. 

In “Risk is Everywhere: Fostering Safety in the Workplace, Schools, and Public Spaces” on Tuesday, AlGene Caraulia, Don Aviv, CPP, PSP, PCI, and Theresa Campbell will consider the current risk landscape in public spaces including schools and workplaces. The presenters will discuss how security practitioners can have an effect on managing risk in a time when public violence is trending upward. After this session, attendees will be able to analyze the current landscape and its effects on the wellbeing of individuals, de-escalate challenging situations, and better understand current risk management tactics in the industry. 

The final Game Changer, “Resilience Amid Changing Conditions: Partnerships, Risk Transference, and New Patterns to Predict,” will focus on how crises ranging from natural disasters to civil unrest can test security plans. The session will also consider how these disruptions can affect supply chains and business continuity. Attendees will learn how to assess disaster preparedness strategies, identify potential partnerships and available emergency resources, and how to incorporate risk assessment, resource allocation, and recovery strategies into a strong crisis response plan. 

Learn more about these Game Changers and all GSX education here

We Can’t Wait to See You at GSX 2025

Hear from GSX 2024 attendees about why they love attending the event. From unparalleled networking opportunities to an incredible education program, attendees share why GSX is a must-attend event for security professionals from across the globe.

If you’re considering attending GSX but haven’t made the leap, now is the time! Register now.

GSX Heads to New Orleans

https://vimeo.com/1049762881

GSX 2025 in New Orleans is a story worth writing. Grab your pen, grab a beignet, and get ready for the Big Easy.

Check out the Visit New Orleans site to see all the great food, attractions, and nightlife in the city. You can also learn more about New Orleans’ rich history and how to get around the city on the site.

More ASIS Events to Attend in 2025 

Global Security Exchange (GSX) convenes thousands of security professionals from across the world and helps you keep on top of all the latest issues, trends, and newest tech in the security industry. GSX is your one-stop shop for all things security – but it’s only once a year.

If you are looking for more events and conferences to keep your professional skills sharp throughout the year, you’re in luck. ASIS hosts and supports a variety of security events across the world and throughout the year to help maintain your network and grow your professional knowledge.

March 2025:  
ASIS Europe | Dublin, Ireland

ASIS Europe is just around the corner! In less than a month, security professionals from across Europe will gather in Dublin, Ireland, to discuss physical and cyber security risks, and the role security plays in supporting business objectives. The conference will feature and opening keynote from Ed McLaughlin, President and Chief Technology Officer at Mastercard, a plenary CSO panel, more than 50 education sessions, and 12+ hours of dedicated networking time. 

Register now!

June 2025:
Security LeadHER | Detroit, Michigan, USA

Security LeadHER is a can’t-miss a day-and-half event presented by ASIS International and the Security Industry Association and dedicated to the advancement of women in the global security industry. The conference will be a day-and-a-half of curated programming and events to promote inclusivity and representation in the security sector. ASIS members save $200 on registration!

Register now!

July 2025:
Sub-Saharan Africa Security Conference | Lagos, Nigeria

Save the date for the 2025 Sub-Saharan Africa Security Conference (SASCON). SASCON will gather hundreds of security professionals from across the region for multiple days of networking and education addressing the foremost issues in Africa. Continue to check ASIS channels for more information about the upcoming event.

Save the date: 23-25 July 2025

August 2025:
ASIS LATAM | Mexico City, Mexico

The ASIS LATAM 2025 conference will feature education in both Spanish and English focusing on the latest trends in security and provide attendees the opportunity to network and learn from each other about industry best practices. Keep an eye on the website for all the latest updates.

Save the date: 25-26 August 2024

November 2025:
ASIS Asia Pacific Conference | Singapore

The ASIS Asia Pacific Conference will provide opportunities for attendees to network with other leaders in the region and attend education about the most pressing security topics across the region and world. Continue to check ASIS channels for more information about the upcoming event.

Save the date: 11-13 November 2025