BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Ensuring We Develop The Next Generation Of Security Professionals

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Ensuring We Develop The Next Generation Of Security Professionals,” presented by John Petruzzi, CPP, Chief Executive Officer at Unlimited Technology, Inc. and past president of ASIS International, Michael Gips, CPP, Managing Director, ESRM, at Kroll, and Stevan Bernard, former EVP of Global Protection Services at Sony Pictures Entertainment and Senior Security Advisor at International SOS. Read on for what they had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic? 

SB: I’ve been a member of ASIS for over 50 years. In 1983, when I landed my first Security Chief role: I had no network in the private-sector, little experience in corporate security and not a great deal of business savvy. A friend suggested I join ASIS and acquire the Protection of Assets Manual(s). As I developed, I realized I didn’t need to have all the answers. Through my growing network I knew how to find the answers and, in turn, share what I learned.  

As I age, I especially realize the importance of mentoring, speaking publicly, being active in associations like ASIS, DSAC, OSAC, etc. Today, I’m active in helping companies recruit, helping source candidates and interview, helping new employees acclimate, etc. A few months ago, Ray O’Hara and I had a conversation about passing-the-baton. This was followed by a discussion with Michael Gips and John Petruzzi. We all wanted to do something in this regard. It is not just nice to do; it’s an obligation we wish to meet. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

JP: During our session, we’ll discuss the importance of a plan to ensure you’re prepared to address the knowledge and expertise required to successfully navigate the security risk profession. We’ll touch on the soft and hard skills of security management and most importantly dive deep into why you must have a keen understanding of business operations—knowing the business you’re supporting. We’ll also discuss other critical items such as mentorship and building trust-based partnerships. 

Q: What advice would you give security professionals interested in this topic? 

MG: Whether you have been in the profession for 30 seconds or 30 years, you are both a mentor/leader and protégé/follower. As someone in the latter category, I would emphasize that not only are we strengthening and future-proofing our profession by developing the next generation of security leaders, but we are also profoundly benefiting ourselves. I learn as much from my proteges as they learn from me. While I may assist them in how to conduct interviews, perform site surveys, write effectively, step into thought leadership, and analyze information, they teach me how to leverage new technology, communicate across generations, adjust my leadership style, and navigate challenges that didn’t exist just a few years ago. 

If you are a new or aspiring security practitioner, come to the session not only to see what the presenters can do for you to enhance your career, but also what you can do for the profession—including for the most experienced leaders among us. 

Q: Why do you attend GSX? 

MG: I attend GSX every year because it is the optimum mix of valuable educational sessions, new technology on exhibit, and ultimate networking. If you’ve been around the security profession for a while, you will see a who’s who of colleagues across every vertical and security discipline, as well as practitioners from adjacent disciplines such as IT, facilities, law, and business continuity. The event is a kaleidoscope of exciting technology, provocative educational sessions, valuable networking, and fortuitous encounters. It will leave you simultaneously amazed at what you were able to accomplish in just a few days, as well as everything (and everyone) you didn’t have a chance to get to. 

Crime Prevention Through Environmental Design and the K-12 School Environment

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Crime Prevention Through Environmental Design and the K-12 School Environment,” presented by Carol Dodgen, Owner at Dodgen Security Consulting, and Mo Canady, Executive Director at the National Association of School Resource Officers. Read on for what they had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic? 

CD: My interest in Crime Prevention Through Environmental Design (CPTED) began years ago as a security consultant working with banks and other businesses. I became certified in several areas of CPTED and earned my Crime Prevention Designation (CPD) in 2017. CPTED has such broad application that it makes sense to apply these principles to schools to make them safer. Within the unique context of a school, CPTED can be used to promote well-being and inclusion, while discouraging isolation and negative behaviors.  I appreciate the fact that the CPTED approach integrates design features and natural elements alongside traditional target-hardening strategies. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

MC: K-12 schools are one of the most dynamic and unique environments in any community. Most of the population is made up of adolescents who are going through the second and final phase of massive brain development. They respond to things very differently than primary adult populations in other professional environments. Adolescent Brain Development must be at the forefront of any CPTED strategy in the K-12 school environment, and it will be explored in depth in this presentation. 

Q: What advice would you give security professionals interested in this topic? 

CD: I would recommend taking advantage of reputable organizations that provide training and certification in CPTED.  There are many helpful resources on the subject, and quite a few CPTED organizations worldwide.  The National Institute of Crime Prevention, for instance, offers the CPD designation as well as specific courses focused on CPTED for Schools. 

Q: How do you see this issue evolving in the next 2-5 years? 

MC: The K-12 school environment continues to provide many challenges. As an example, incidents of weapons located on campus continues to rise across the nation each year since the return to school from the Pandemic. Adolescent Mental Health cases continue to rise as well as students with special needs which both present multiple challenges in K-12 schools. CPTED strategies in this environment must continue to evolve over the next several years, and we absolutely need more CTPED professionals engaged in this effort.  

Q: Why do you attend GSX? 

MC: This will be my third time attending GSX. My primary reason for attending is to continue to learn more about security technologies as well as to engage with CPTED professionals. 

CD: Having attended and presented at GSX in previous years, I enjoy the opportunity to participate in informative sessions, network with other professionals, and learn about the latest security advances by visiting the exhibition hall. 

Deadly Category 1-to-5 Hurricane in 24 Hours: Rescuing 85 Employees at Conference from Direct Hit

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Deadly Category 1-to-5 Hurricane in 24 Hours: Rescuing 85 Employees at Conference from Direct Hit,” presented by Mario Franco, Security Director, Mexico and Central America at Schneider Electric. Read on for what he had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic? 

A: During my security training, I received extensive education in business continuity and emergency response. However, this particular event discussed in my presentation truly put all that knowledge to the test. It was an unprecedented and unexpected situation due to the rapid escalation of a natural phenomenon. While we have tools to monitor these events, we know they can’t be predicted with 100% accuracy. Climate change has made such phenomena increasingly unpredictable, highlighting the importance of being prepared for the unexpected. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

A: Security professionals often focus on risks within our own facilities—within our “four walls.” However, when our personnel attend external events, we must consider additional factors: coordination with event staff, emergency and crisis plans, local emergency departments, and disaster scenarios. In this case, no specific plan was in place for such an event, which shows the need to broaden our perspective and ensure preparedness beyond our immediate environment. 

Q: What advice would you give security professionals interested in this topic? 

It’s essential to build a culture where every department in the company understands the importance of security and feels empowered to consult with security teams. This allows for informed decision-making and tailored safety and security recommendations. Evaluating emergency response plans, conducting risk assessments, and ensuring clear protocols for off-site events are all critical steps. 

Q: How do you see this issue evolving in the next 2–5 years? 

A: With the increasing frequency and intensity of natural disasters due to climate change, we can expect these events to become more common and severe. Current statistics on hurricanes and other natural phenomena already show a concerning trend. Security strategies will need to evolve accordingly, incorporating new monitoring technologies and more agile, collaborative response plans. 

Q: Why do you attend GSX? 

A: As a security professional, my interest in attending GSX is that it’s renowned for its cutting-edge, cross-functional networking opportunities, which foster collaboration and innovation among security professionals from diverse backgrounds and industries. Additionally, I attend GSX to share my presentation with a broader audience, with the goal of always safeguarding our employees first, assets and sensitive information.  

By spreading knowledge and lessons learned, we can strengthen the preparedness and response capabilities of other professionals facing critical situations.

A Holistic Approach to Vehicle Ramming Assessment and Perimeter Protection Design

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “A Holistic Approach to Vehicle Ramming Assessment and Perimeter Protection Design,” presented by Pedram Hesam, PSP, CTO of Protective Design Engineering at PNH, and Herbert Ubbens, CPP, PSP, President at Paratus Consultants Group, LLC. Read on for what they had to say and don’t forget to register for GSX 2025!

Q: How did you become interested in your topic? 

PH: My interest in vehicle ramming threats and perimeter protection evolved naturally through my background in structural engineering and protective design. As I began consulting on high-security facilities and infrastructure, it became clear that vehicle-borne threats—both intentional and accidental—presented a unique and evolving challenge. The intersection of engineering, security, and risk mitigation is where I found purpose: designing physical security solutions that are not only technically robust but also tailored to the operational context of each site. The increasing frequency and diversity of vehicle incursions in both civilian and high-profile environments reaffirmed the importance of a holistic, systems-based approach to protective design—one that integrates threat assessment, performance-based criteria, and engineering rigor. 

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

HU: Our presentation, “A Holistic Approach to Vehicle Ramming Assessment and Perimeter Protection Design,” focuses on a comprehensive methodology for addressing the evolving threat of vehicle incursions—whether deliberate or accidental. We’ll walk through key concepts in threat assessment, the physics of impact, mitigation technologies, and real-world implementation challenges. 

Security professionals need to be proactive in understanding this topic because vehicle ramming incidents continue to be a favored tactic for both lone actors and organized threats. Even outside of intentional attacks, accidental vehicle intrusions can have devastating consequences. Unfortunately, many sites remain underprotected due to incomplete assessments or inadequate technical solutions. As protective design engineers, we aim to equip attendees with a practical framework for aligning vulnerability analysis, site constraints, and performance requirements—helping them make informed decisions that prioritize both safety and operational functionality. 

Q: What advice would you give security professionals interested in this topic? 

PH: Start by recognizing that vehicle ramming mitigation is not a one-size-fits-all problem. Effective perimeter security design requires a multidisciplinary approach—integrating threat intelligence, site-specific constraints, and engineering performance standards such as ASTM F2656 F3016 and ISO 22343. 

I encourage security professionals to work closely with qualified protective design engineers early in the design process to avoid reactive or piecemeal solutions. Understand the importance of validated products, informed siting, and the need for solutions that balance physical protection with usability, aesthetics, and maintainability. Lastly, stay current—technology, threats, and standards are all evolving rapidly. Ongoing education and collaboration with technical specialists will elevate the quality and effectiveness of your security posture. 

Q: How do you see this issue evolving in the next 2–5 years? 

HU: The threat landscape surrounding vehicle incursions is expanding. In the next few years, we anticipate an increase in not only weaponized vehicle attacks but also unintended incursions due to distracted, impaired, or aging drivers. Compounding this, the proliferation of autonomous and unmanned vehicles introduces new and complex threat vectors—challenging both detection and mitigation strategies. 

From a design standpoint, there will be greater emphasis on adaptable and modular security systems that can respond to dynamic threats while minimizing disruption to operations. We’ll also see more integration of physical barriers with intelligent systems—such as sensor fusion, analytics, and automated response—to form layered, responsive defenses. Security professionals will need to stay agile and adopt solutions that are both forward-looking and grounded in tested engineering practices. 

Unmasking AI-Powered Fraud Tools on the Dark Web: Threats and Countermeasures

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Unmasking AI-Powered Fraud Tools on the Dark Web: Threats and Countermeasures,” presented by Peter Warmka, CPP, Founder & CEO at Counterintelligence Institute, LLC. Read on for what he had to say and don’t forget to register for GSX 2025

Q: How did you become interested in your topic?  

A: I spent a career in the CIA as a human hacker, focusing on manipulating insiders to breach the security of target organizations. Today, I assist organizations in defending against such threats. AI has significantly enhanced both the quantity and quality of attacks by increasing the “credibility” of the social engineering approach used in the attack.

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

A: I help attendees better understand the dark web and how it has become the central marketplace for a variety of AI tools, significantly lowering the barrier to entry for would-be criminals attempting to steal an organization’s IP or financial resources.

Q: What advice would you give security professionals interested in this topic? 

A: Increasing awareness is the very first step in combating this threat. Today, over 95 percent of successful data breaches are initiated by some form of human hacking. The goal of the human hacker is to circumvent the policies, procedures, and technological controls put in place to protect the organization. Security professionals need to better understand how AI technology is leveraged by human hackers to achieve this goal through the identification and manipulation of key insiders in an attack.

Q: How do you see this issue evolving in the next 2-5 years? 

A: Organizations will continue to look for AI-enhanced technical solutions in combating these threats while minimizing strategies to promote greater awareness training among their employees. As a result, the ability to defend against such threats will continue to lag behind its creative and rapidly evolving use by threat actors.

Q: Why do you attend GSX?  

A: I find that GSX combines great opportunities for networking with industry peers in addition to opportunities to learn about new technological advancements during presentations as well as hands-on demonstrations by exhibitors.

Attend a GSX 2025 Game Changer Session

Each year, ASIS highlights one Game Changer session each day. These sessions feature high-level content and are designed to explore trends that will shape the future of the security industry. This year’s sessions focus on executive protection, safety in public spaces, and crisis management.

In Monday’s session “When High-Profile Means Danger: Protecting Executives from Public Threats,” Charles Randolph and Chuck Tobin will discuss the potential implications of reputation for companies and their employees in the modern era. The session will look at the recent killing of UnitedHealthcare CEO Brian Thompson and how this was informed by the organization’s reputation. In this session, attendees will learn how to analyze the impact a change in perception can have on an organization and its protection. 

In “Risk is Everywhere: Fostering Safety in the Workplace, Schools, and Public Spaces” on Tuesday, AlGene Caraulia, Don Aviv, CPP, PSP, PCI, and Theresa Campbell will consider the current risk landscape in public spaces including schools and workplaces. The presenters will discuss how security practitioners can have an effect on managing risk in a time when public violence is trending upward. After this session, attendees will be able to analyze the current landscape and its effects on the wellbeing of individuals, de-escalate challenging situations, and better understand current risk management tactics in the industry. 

The final Game Changer, “Resilience Amid Changing Conditions: Partnerships, Risk Transference, and New Patterns to Predict,” will focus on how crises ranging from natural disasters to civil unrest can test security plans. The session will also consider how these disruptions can affect supply chains and business continuity. Attendees will learn how to assess disaster preparedness strategies, identify potential partnerships and available emergency resources, and how to incorporate risk assessment, resource allocation, and recovery strategies into a strong crisis response plan. 

Learn more about these Game Changers and all GSX education here

We Can’t Wait to See You at GSX 2025

Hear from GSX 2024 attendees about why they love attending the event. From unparalleled networking opportunities to an incredible education program, attendees share why GSX is a must-attend event for security professionals from across the globe.

If you’re considering attending GSX but haven’t made the leap, now is the time! Register now.

GSX Heads to New Orleans

GSX 2025 in New Orleans is a story worth writing. Grab your pen, grab a beignet, and get ready for the Big Easy.

Check out the Visit New Orleans site to see all the great food, attractions, and nightlife in the city. You can also learn more about New Orleans’ rich history and how to get around the city on the site.

More ASIS Events to Attend in 2025 

Global Security Exchange (GSX) convenes thousands of security professionals from across the world and helps you keep on top of all the latest issues, trends, and newest tech in the security industry. GSX is your one-stop shop for all things security – but it’s only once a year.

If you are looking for more events and conferences to keep your professional skills sharp throughout the year, you’re in luck. ASIS hosts and supports a variety of security events across the world and throughout the year to help maintain your network and grow your professional knowledge.

March 2025:  
ASIS Europe | Dublin, Ireland

ASIS Europe is just around the corner! In less than a month, security professionals from across Europe will gather in Dublin, Ireland, to discuss physical and cyber security risks, and the role security plays in supporting business objectives. The conference will feature and opening keynote from Ed McLaughlin, President and Chief Technology Officer at Mastercard, a plenary CSO panel, more than 50 education sessions, and 12+ hours of dedicated networking time. 

Register now!

June 2025:
Security LeadHER | Detroit, Michigan, USA

Security LeadHER is a can’t-miss a day-and-half event presented by ASIS International and the Security Industry Association and dedicated to the advancement of women in the global security industry. The conference will be a day-and-a-half of curated programming and events to promote inclusivity and representation in the security sector. ASIS members save $200 on registration!

Register now!

July 2025:
Sub-Saharan Africa Security Conference | Lagos, Nigeria

Save the date for the 2025 Sub-Saharan Africa Security Conference (SASCON). SASCON will gather hundreds of security professionals from across the region for multiple days of networking and education addressing the foremost issues in Africa. Continue to check ASIS channels for more information about the upcoming event.

Save the date: 23-25 July 2025

August 2025:
ASIS LATAM | Mexico City, Mexico

The ASIS LATAM 2025 conference will feature education in both Spanish and English focusing on the latest trends in security and provide attendees the opportunity to network and learn from each other about industry best practices. Keep an eye on the website for all the latest updates.

Save the date: 25-26 August 2024

November 2025:
ASIS Asia Pacific Conference | Singapore

The ASIS Asia Pacific Conference will provide opportunities for attendees to network with other leaders in the region and attend education about the most pressing security topics across the region and world. Continue to check ASIS channels for more information about the upcoming event.

Save the date: 11-13 November 2025

Tips for Submitting a Presentation Proposal for GSX 2025

The GSX 2025 Call for Presentations is open now, closing on 22 January. Don’t miss this opportunity to align with the world’s largest and most prominent association for security management, ASIS International, by bringing your knowledge to the Global Security Exchange (GSX) stage.  

There are 10 topics for consideration that will be prominent at GSX 2025. Although these topics are broad and cover a great deal of security industry trends and insights, this is not an exclusive list. You are welcome to submit proposals for topics that fall outside this list but still within the scope of security management.

Here are a few more tips and guidelines to keep in mind as you develop and submit your proposal(s):  

  • Proposals should reflect a specific area of expertise while still offering a broad and global appeal. 
  • The presentation title and abstract should be descriptive and creative and offer an overview of the overall purpose.
  • Individuals may submit proposals for and participate in a maximum of two presentations total.
  • Content submitted must be original and not previously presented.
  • Complete information should be included as incomplete proposals may be removed from the system.
  • Proposals must not be sales or marketing oriented, but rather neutral and educational in nature.
  • Proposals should not reference speaker name(s) or company(ies) in the title, abstract, or learning objectives, and commercially biased content should not be submitted.  

Please also note the following: 

  • ASIS membership and/or participating as conference exhibitor is not required to submit a proposal.  
  • Accepted speakers will need to be committed, responsive and adhere to written deadlines.
  • All accepted speakers are entitled to register at the reduced speaker rate. Speakers are responsible for their own travel-related expenses.  

There are less than two weeks left to submit your presentation, so make sure to get started now! The final deadline for applications is 22 January 2025

With your contributions, GSX 2025 will be the best one yet. The conference will take place from 29 September to 1 October in New Orleans, Louisiana. See you there!

Exploring Problem Solving with Strategy and Nuance at CSO Secure Horizons 2024

Darcy Leutzinger, VP, Director of Security, UWM

On 21-22 September 2024, 41 chief security officers (CSOs) and senior security executives from across the globe convened at the GSX conference in Orlando, Florida, for the Secure Horizons event from the CSO Center. This program was designed to provide attendees with fresh perspectives on critical thinking, problem-solving, and leadership development in the business and security arenas.

Day 1 of the event kicked off with a series of sessions instructed by Risa M. Mish, professor of practice Cornell University’s SC Johnson College of Business. Her focus during Secure Horizons was on developing critical thinking advantages—a vital skill for security leaders facing complex, fast-paced decision-making environments. Mish emphasized the importance of differentiating between when to take the time to think critically and when immediate action is required. She also highlighted common obstacles to critical thinking and provided tools to help CSOs identify information gaps and make informed decisions.

One of the central learning models introduced during this session was the building out context and leveraging the IDEAL Model. This problem-solving approach encouraged attendees to collaboratively work through real-world business problems, leveraging each other’s insights and experiences. This exercise not only fostered a strong sense of camaraderie among the attendees but also highlighted the importance of diverse perspectives in problem-solving.

The second day featured a panel of experienced CSOs who shared case studies and personal experiences, explaining how they developed and implemented solutions to security challenges. This session offered a practical, real-world complement to the theoretical framework introduced on the first day. The diversity of the panelists’ experiences highlighted the various ways security professionals apply their skills in different industries and settings, driving home the point that there is no one-size-fits-all approach to security management. They provided practical tips on media relations, emphasizing how important it is for CSOs to convey their messages clearly and effectively in an industry that is rapidly evolving.  Mish moderated the panel, weaving in her theories on how success can be driven by thoughtful, strategic approaches to business challenges within defined parameters.

In a particularly memorable session titled “The Art of the Sale,” Mish challenged attendees to reflect on their own strengths and weaknesses and consider how these traits could be used to develop leadership skills and navigate personal progress in the business world. One exercise from this session involved engaging in a discussion with a table partner to identify common interests. This seemingly simple task promoted deeper conversations, helping attendees build the kind of leadership capital necessary for success in business relationships. The exercise reinforced the importance of connection and communication—essential skills for security leaders looking to build strong, collaborative teams.

Overall, the Secure Horizons event offered much more than the standard security-focused content. By concentrating on leadership, critical thinking, and communication skills, the sessions provided CSOs with updated strategies to engage with decision-makers and promote security initiatives within their organizations. Attendees left with a wealth of new knowledge, ready to apply what they had learned in both business and security contexts.

GSX 2024 Recap: Hear from Attendees, Pt. 2

GSX brings together thousands of security professionals from across the globe to share ideas and resources. Hear from some of our attendees and exhibitors about why they enjoyed attending GSX 2024.