BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Leveraging AI and Data Analytics in Enterprise Physical Security

By Sam Joseph, Co-Founder and CEO, Hakimo

The physical security threat landscape has undergone considerable changes over the past few years. COVID-19 has led to increased crime rates, insider threats are at an all-time high, and labor costs have risen sharply. Things have reached a point where physical security can no longer be just confined to gates, guards, and guns. Continuing the status quo is not only impractical but also makes the enterprise vulnerable to new threats.

Fortunately, there have been some recent technological advances that the security industry can leverage to overcome this crisis. The most important one is artificial intelligence (AI), especially around computer vision and deep learning. Today,  AI can analyze any piece of video and understand the context therein — in most cases better than a human. A second technological advancement has been around data analytics. We now have tools that can analyze billions of events in real-time, correlate different datasets, and provide actionable insights into them. When these advancements are applied to enterprise security, many long-standing problems can be solved and many new efficiencies can be uncovered.

Solving false alarms and tailgating in GSOCs

Two problems are endemic to any enterprise Global Security Operations Center (GSOC): access control false alarms and tailgating. With the steadily increasing labor costs, GSOCs can no longer afford to “just throw more people” at the first problem. Worse, GSOCs missing real breaches due to alarm fatigue have become commonplace in the industry with increased crime rates during COVID. Regarding tailgating, the security technology industry has been battling this problem for many decades without much success.

Both these problems can be solved by leveraging AI and analytics. For example, Hakimo does AI processing on the video corresponding to every door alarm and automatically resolves false alarms without any human intervention. The same principle is used for tailgating detection. In fact, Hakimo’s tailgating detection algorithms have a false-positive rate of less than 1% which is not only the best in the market but also beats the performance of traditional hardware-based systems (such as laser beams) by a significant margin.

Going from massive amounts of data to actionable insights

Physical security systems have been generating massive amounts of data: an access control system at even a mid-sized enterprise company generates hundreds of millions of events every year. This data has been sitting idle for all these years because there were no practical tools that could be used to make sense out of this data. Things are changing now. Modern data analytics tools such as Hakimo Insights can parse through billions of events and point out specific anomalies and actionable insights. For example, we could now detect an employee badging in at an unusual door or at an unusual time (a potential indicator of insider threat, which has been an important recent security challenge as mentioned in the beginning).

These data analytics tools can not only add value to physical security teams but also enable those security teams to give value back to other teams within the broader organization. For example, a tech company’s GSOC recently used modern data analytics tools to track building utilization over time. That data was then transferred to the facilities team who decided which building to downsize and which buildings to expand.

Enabling the convergence of cyber security and physical security

One hallmark of bringing these new technologies into the physical security world is that it accelerates the convergence between cybersecurity and physical security. Convergence—the idea that cyber and physical security teams should work hand-in-hand instead of being siloed out—is the future of security, and many organizations are rapidly embracing the idea after realizing its clear ROI.

There’s also a clear pattern between the emergence of Hakimo-like tools and the emergence of some specific cybersecurity tools more than a decade ago. In the late 2000s, cybersecurity systems were generating so many alerts that humans were not able to keep up with them, just like today’s GSOCs. This then led to the invention of platforms such as SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) which streamlined and automated the processing of those alerts. Tools like Hakimo are bringing such smart automation tools now to physical security.

To conclude, the physical security landscape is undergoing tectonic changes that lead to serious challenges for security teams. Technology is the answer to those challenges, and security teams that don’t adopt technology will not be able to overcome those challenges and thus will be incapable of surviving the recent changes. On the other hand, teams that leverage technology can use the same challenges as a driving force that transforms them into a more efficient, effective, and converged security organization.

Sam Joseph is the Co-Founder and CEO of Hakimo, a technology company that makes smart software for enterprise physical security monitoring. Visit Hakimo at Booth #1869 at GSX 2021 to learn more about Hakimo’s products.

Threat Assessment: Protective Intelligence’s Missing Ingredient

By Fred Burton, Executive Director, Ontic Center for Protective Intelligence

Reflecting back on my decades of experience in the protective intelligence field, I have consistently seen programs that were lacking one key and very important ingredient: threat assessments. Even the times a program had both, they were often displaced in silos and not shared across teams or with other key players, like HR or Legal. I’ve seen this happen for a range of reasons, but primarily because there hasn’t been a tool that seamlessly integrates the two components, and not everyone recognizes the value, nor understands how to integrate the models.   

This is precisely the reason why Ontic recently acquired SIGMA Threat Management Associates.  Our collaboration brings Fortune 500, emerging enterprises, education and government organizations the ability to unify the threat assessment practice with technology, creating a single platform for managing threats, workflows and assessments. 

What is a threat assessment?

Threat assessments are foundational tools protective intelligence teams use to establish the threat posed to a specific person, company, event, location, or facility. Threat assessments are conducted to create as complete a picture as possible of the threat landscape, such as factors that could bring hostile attention to the subject, any current threats, the universe of potential threats, and threat actors, as well as the general threat environment.

By identifying, analyzing and describing the existing threat level, assessments help you understand the threat landscape and are useful tools for determining the appropriate security measures needed to protect against the identified or potential threats. Not one style fits all, therefore, security processes and procedures must also be implemented in accordance with corporate or personal risk tolerance, as well as lifestyle, corporate culture, business operations and budgetary considerations. 

It is also important to recognize that while threat assessments provide a foundational understanding of the threat, they are not static. They must be responsive, living documents that reflect changes in the potential target’s situation and environment.  In a perfect world, baseline threat assessment should be updated quarterly, with full, ground-up re-assessments annually.  

Elements of threat assessment

While these examples are specific to a person, they can also be applied to a company, event, location, or facility. Here are four key elements to consider: 

  1. Subject profile – If they are well known and have controversial business dealings or social activity they are far more likely to attract the attention of threat actors and are more easily recognized as they proceed through their normal daily activities.
  1. Documented and potential threats – Known and documented threats also play an important role. Such threats should include persons of interest (POIs) such as abnormally angry customers, disgruntled former employees, unstable individuals who have an abnormal focus of interest in the company or executive, including family members. The communications of such individuals should be monitored and curated for future reference.
  1. Physical environment – Assess the subject’s work and home environment, where the company operates, and areas that must be regularly traversed to get from home to work or are otherwise frequented. It is important to gain an understanding of the criminal, civil and natural disaster threats and vulnerabilities associated with those locations.
  1. Current security measures – This would include security training provided to the subject, a driver or a protective detail. This should also account for residential security, estate staff and physical security measures in place at the office. The security measures in place can then be weighed against the assessed threat level to determine if they are sufficient and appropriate.

Digitizing your threat assessments

The physical security industry has experienced a massive shift in the last couple of years largely fueled by new responsibilities driven by Covid health and safety and a complex threat landscape, as a result of political turmoil and social unrest.

Now more than ever, corporations need technology solutions that not only provide a comprehensive view of the threat landscape and surface critical knowledge but also guide action — specifically, the identification of threats, gathering of information, assessment, creation and implementation of plans for addressing threats.  

SIGMA’s Workplace Threat Assessment Module, integrated into the Ontic Platform, can help visualize and guide decisions around identifying incidents of concern; gather the necessary information through investigative research and interviews; assess the level and urgency of the threat; and guide the appropriate actions to manage and mitigate the threat.

To keep up with the future of protective intelligence and threat assessment, we must strip away the disparate data sources and manual processes and adopt technology that allows us to do all of this in one single pane of glass. 

Interested in learning more about the role threat assessments play in helping security teams see the complete picture of the existing risk level? Visit Ontic at Booth 933 at GSX 2021, or check out this Ontic whitepaper: The Role of Baseline Threat Assessments in Protective Intelligence.

The Art of Human Hacking: Confessions of a CIA Spy

Peter Warmka is a former CIA intelligence officer who spent over two decades breaching the security of target organizations overseas.

At 11:30 AM ET on Tuesday 28 September, Warmka will share methodologies utilized by today’s threat actors to circumvent the technological controls, policies and procedures put in place to safeguard organizations and their data in the GSX session, Confessions of a CIA Spy: The Art of Human Hacking.

Warmka will discuss the criteria for the selection and analysis of a target entity, the identification and assessment of insider targets, and a variety of social engineering techniques. Beyond this, Warmka will share Recommendations for minimizing the likelihood of becoming a target and tools that should be provided in the workplace to empower employees and contractors to effectively shut down and appropriately report social engineering attempts.

Warmka sat down with ASIS TV host Chuck Harold to discuss the challenges of cannabis security. Register for an All-Access pass to attend this session digitally or in-person.

The GSX 2021 Countdown is ON

The GSX 2021 digital platform is LIVE! After kicking off on 15 September with Erik Qualman’s Security 2030: Crossroads of Innovation and Transformation general session, the digital platform is now accessible for both in-person and digital All Access attendees. Get acquainted with the new features that the digital platform offers—from education to networking to exhibits, and more.

Education

GSX education sessions will be available to All-Access attendees through the digital platform. Each day’s general session, game changer session, X Stage content, and two of the in-person learning theaters (the Offensive Strategies and Defensive Strategies) theaters will broadcast live from the Orange County Convention Center (OCCC) in Orlando, FL. Online Exclusive sessions and all other in-person sessions will be available on demand.

While viewing sessions in the digital platform, attendees can chat with presenters and fellow attendees in real-time and keep their own notes about the topic, which can be downloaded for later reference.

Attendees can view Qualman’s presentation on demand and browse the complete list of 100+ education sessions that will take place as part of GSX. It’s easy to build your customized session schedule right in the platform.

Networking

The GSX digital platform offers a networking area to connect and have a little fun!

The platform’s people directory lists GSX attendees, searchable by tags such as Military Veteran, Government, Cybersecurity, and more. The platform allows messaging and public chats.  Attendees can manage their profile and select whether they would like to be included in the People directory.

Earn points by engaging in GSX 2021 activities for the chance to win a GSX 2022 registration, ASIS 2022 membership, and more. From 27-29 September, the GSX Headshot lounge, supported by the ASIS Foundation, will give attendees the opportunity to capture a professional looking headshot.

Exhibits

The Exhibits section of the GSX digital platform includes a listing of all GSX 2021 exhibitors. This is where you’ll learn more about exhibitors and their offerings and where you can leave a digital ‘card’ to indicate that you would like to speak with the exhibitor to learn more. In-person registrants will also find a useful map of the exhibit hall to plan for their activities on-site at the OCCC.

ASIS Hub

The ASIS Hub is the destination to discover ASIS resources to build their network, sharpen their skills, and advance their career. This section of the platform includes the ASIS Store and links to the ASIS Awards celebration, launching 23 September. Career HQ contains valuable sessions for career growth, including Branding Yourself Effectively, Becoming a Person of Influence, Industry Labor Trends, and more.


All Access registrants, both digital only and in-person, have received an email with instructions detailing how to access the GSX digital platform. If you have registered for GSX and cannot locate your access email, please contact [email protected]. Note: if you have newly registered, please wait an hour to allow for your access email to be delivered.

Cannabis Security Best Practices

ASIS International’s Cannabis Security Ad-Hoc Community has written a best practices guide for the security industry.

Set to be unveiled during a special New Cannabis Security Guide session at 11:30 AM ET on Wednesday 29 September at GSX 2021, this guide is a comprehensive resource covering growing operations, product conversion, retail and medical dispensaries, cash transit, product transit and the overall best practices for vetting and hiring a security team.

Session presenter Carrie Goetz sat down with ASIS TV host Chuck Harold to discuss the challenges of cannabis security. Register for an All-Access pass to attend this session digitally or in-person.

Insider Threat: Cross Applying U.S. Government Strategies to the Private Sector

As if securing our organizations wasn’t already complex enough with myriad bad actors and tactics, we now must factor in the growing insider threat to organizations.

In military terminology, the insider threat is a “fifth column”—one or a group of insiders who secretly sympathize with or support an enemy and engage in acts of espionage or data gathering for the larger group’s planning efforts, or subversion, thus destabilizing the organization from within.

 The U.S. government has several insider threat programs to protect can’t-fail national special programs, including those in the nuclear realm. Information and lessons learned from this realm would be of benefit to other organizations struggling to address their insider threat challenges.

At 11:30 AM ET on Wednesday 29 September, Jennifer Hesterman will present on Insider Threat: Cross Applying U.S. Government Strategies to the Private Sector. Hesterman joined ASIS TV host Chuck Harold to discuss this topic. Register for an All-Access pass to attend this session digitally or in-person.

Six Fundamental Questions That Identify At-Risk Individuals on Their Pathway to Violence

There are six questions that are always asked in post-incident reports. If we can answer these questions in post-incident reports, why can’t we answer them while an at-risk individual is progressing up his or her pathway to violence?

At 2 PM ET on Wednesday 29 September, Jason Destein and Rick Shaw will present on the Six Fundamental Questions That Identify At-Risk Individuals on Their Pathway to Violence. They will discuss the pathway to violence and examine the stages where the warning signs exist and what methods are available to discover a pathway to prevention.

Destein and Shaw join ASIS TV host Chuck Harold to discuss this topic. Register for an All-Access pass to attend this session digitally or in-person.

Political Extremism and Insider Threat Early Warning

While monitoring for root causes of insider risk and addressing precipitating events in the insider-threat kill chain are established best practices, political extremism represents a unique challenge. On one hand, employee extremism can threaten the organization’s workforce, brand, and reputation and may result in significant financial loss. On the other hand, organizations must consider legal issues, free speech rights, privacy interests, employee morale, and workplace culture.

While not easy, determination of a “comfort zone” between these competing factors, tripwires, and response plan must be done in advance. Using case studies as illustrations, presenters of the Political Extremism and Insider Threat Early Warning session at GSX 2021 will outline a formula for dealing with political extremism and insider risk decision-making, with pointers on tailoring these strategies for specific organizational types. 

Presenter Elsine Van Os, CEO, Signpost Six, joins ASIS TV host Chuck Harold to discuss this delicate topic. Register for an All-Access pass to attend this session digitally or in-person when it takes place at 2 pm ET on Monday 27 September.

Airspace Security Insights & Intelligence Enable Security Providers to Protect Skies

By Amit Samani

Across the world, drone regulations are being passed, aimed at supporting the productive use of drones in our society and leading to the inevitable increase in the number of drones in our skies. Airspace security is becoming a wide-scale, cooperative effort, with capabilities like Remote ID being launched globally to monitor cooperative drone activity. By applying smart airspace security intelligence and insights, security teams can identify the compliant drones while exposing unauthorized or hostile drones.

Preparing for & Mitigating Against Drone Threats

How should security teams react when an unauthorized drone enters protected airspace? Key to the success of a smart airspace security program is developing proactive response protocols in the event of a drone incursion. 

Before developing airspace security standard operating procedures (SOPs), security teams must first uncover patterns in their drone activity and answer the following questions:

  • How many drones are in my airspace?
  • What time of day, and on which days, are drones appearing?
  • What kinds of drones are being flown?
  • What are the most common areas for drone activity? 

Using these questions as a guide, security teams can use airspace security intelligence and insights to advance their response protocols before, during, and after a drone incursion.

Before the incursion:

  • Practice with your security team: Airspace security programs should begin under ideal, “blue sky” conditions
  • Engage local law enforcement: Work with local law enforcement to determine the information they require to approach and apprehend an unauthorized drone pilot

During the incursion:

  • Respond to automated alerts: Alarms are triggered as soon as a drone is detected
  • Deploy security team to follow drone, and approach or apprehend pilot: By using flightpath information and localization of the drone, security teams can efficiently collect the evidence needed to locate a pilot
  • Protect assets with passive countermeasures: This can include lowering blinds, monitoring WiFi networks, leading people away from exposed areas, or halting operations
  • Alert local law enforcement: Local law enforcement can deploy additional resources to apprehend drone pilots

After the incursion:

  • Build a threat profile: Summaries of drone activity, provide information such as most frequent times and days drones appear and drone hotspots
  • Update security procedures: It may be that drones are appearing during shift changes, shipping/receiving, or concurrent with significant events at the site, such as game days or executive meetings
  • Post “No-Fly-Zone” signage: Aerial trespassers will think twice with awareness of the risks they take when flying in your airspace

Prevent Losses with Results-Driven, Smart Airspace Security Programs

The consequences of drone incursions can be costly, from operational downtime to physical property damage and even data breach. Installing and launching a smart security program will deliver complete airspace situational awareness. A philosophy of develop, test, and enhance is essential for security teams and must be considered adjacent to the technology investment. 

Amit Samani is the Vice President of UK and Americas for Dedrone. Join Amit at GSX Learning Session, “Achieving Complete Airspace Security Amid Loosening Drone Usage Regulations and Emerging Threats” on 29 September at 11:30-12:30 PM ET, located the Offensive Strategies: Preparing for an Attack Theater. Meet the Dedrone team at Booth #2114.

Understanding the Vulnerabilities of Building Control Systems

Thank goodness companies have IT security specialists to protect those vital business systems that are the target of so many sophisticated hacker attacks. Sure, physical security professionals have to protect some systems, such as business controls or other less sensitive systems.

The thing is, those business control and security systems are increasingly tied to each other and other business systems. And the business control and security systems can be the easiest for hackers to attack and exploit. Uh oh.

The learning sessions at GSX 2021 will feature theaters carrying themes where like sessions are grouped. Kicking off the Offensive Strategies theater at 10 a.m. EDT on Monday, 27 September, Coleman Wolf, CPP, will lead a session on “Hacking Building Controls for Fun and Profit: Security Risks to Cyber-Physical Systems.” In the session, Wolf will give participants knowledge and strategies to try to prevent the “uh oh” from ever happening.

This session and all other Offensive Strategies Learning Theater sessions will be available in-person at GSX and livestreamed to all digital attendees. Register now for an All-Access Pass so you don’t miss it!

Wolf is a 25-year security management and security engineer veteran, currently serving as senior security consultant at ESD Global, Inc. The GSX Blog caught up with Wolf to gain insight on the issue of the vulnerabilities of business control systems.

What are the vulnerabilities of these systems and why should people care?

Building control systems were not traditionally built with security of the system in mind. They were self-contained systems, nearly impervious to external access—it would take physical breach to compromise them. That’s all changed. More and more, these systems are connected to each other and to other systems, becoming part of the larger IT infrastructure. A lot of people will build a connection between a building control or operational control system and, for example, a remote access IT system, but they would build this connection without first really thinking through the security ramifications of that.

One of the reasons is because the building controls were not seen as highly valuable targets. Maybe someone gets in and gains access to turn the lights off. Annoying sure, but it’s not worth expending a ton of resources to stop a practical joker when the resources could be used to fortify actually mission critical systems. One of the things we’re going to spend some time on in the session is how wrong this perception is. Not only can they be an access point to do additional damage, a hacked building control system can cause serious harm to a company.

If these systems are becoming more vulnerable, why not just revert to more self-contained, unconnected systems? What are the advantages to the interconnected trends you describe?

The main reason why they are interconnected and connected to business systems is for functionality and intelligence. It generally starts with there being a business reason to remotely monitor a system. Maybe you want the ability to see what is happening in a system at home during off hours, so you can decide if it needs immediate response or if it can wait. Or maybe you have a portfolio of different sites and locations and you want to monitor them from a central location.

In addition to the functional reasons, companies realized that they can use information from these systems to improve. As the systems grew more intelligent within the building, and different systems could start talking to each other, we now have this intelligent building platform. You can pull actionable data, build dashboards using intelligence from a variety of systems, and make strategic decisions. An example that relies heavily on building control data might be operating at peak energy efficiency—the savings to a company with a large footprint could be significant.

What do you say to a physical security professional who sees it as IT’s job to secure building control and security systems from cyber attacks?

Everyone in the session will leave with a good understanding of the differences between operational technology and systems and information technology and systems. Where the responsibility for securing OT vs. IT systems lies is in a state of flux. Traditionally OT rested in facilities, not IT. The operations folks didn’t want to be burdened by IT controls. Similarly, IT folks recognized that these systems were different animals, and they didn’t want the responsibility of securing systems that sat outside the traditional IT framework and thus did not have various IT protections and protocols built into it. This is probably another reason this is such a high risk for an organization. Companies are beginning to understand that both OT and IT systems need to be managed holistically under the umbrella of risk management.

I’m the physical security professional and one of the operational technology systems under my purview is hit successfully with an attack. What do I need to be thinking about?

There are two fronts. You’re going to be pressured first and foremost to resume operations ASAP. That’s somewhat at odds with the other front, which is forensics to identify what the cause is and, in the case of something like ransomware, you’ve got complex political calculations to make: Do you pay the ransom and hope that your operations will return to normal? Do you pay the ransom and hope that other malware other bad actors won’t try to hold you for ransom again? A lot of companies are finding it might be more prudent to go ahead and pay that ransom because the compromised system is crippling operations.

So those are the two primary things you will have to deal with. In the best situation you’ve got a business resumption, emergency response plan for cyber incidents. Some companies will incorporate this into a comprehensive business continuity plan.

In a lot of ways, you’re talking about a different approach or mindset. How do you get people responsible for building controls and people responsible for IT security to speak the same language?

In traditional IT and cybersecurity approaches, you look at what they call the CIA triad, which stands for confidentiality, integrity, and availability. Those are the elements that need to be addressed. When you look at these building controls and operational controls systems, you have to add something to that mix. You have to add safety. If these systems are compromised, it’s not just the business aspects you have to worry about, you have to add the health, safety, and well-being of anyone—staff, customers, the public—who might be in an environment that is affected by one of the compromised systems. Going back to the attitude that hacking a building control is akin to perpetrating a practical joke—turning the lights off. The breaches can be very serious in any number of ways.

And finally, I’m hoping to do a bit of a demonstration. A demonstration that will show just how easy it is to identify, locate, and access some of these systems—and discuss what people need to about the vulnerabilities.

Going for Gold with GSX Education

For more than 60 years, Global Security Exchange (GSX)’s best-in-class education has been the world’s most comprehensive learning environment for security management professionals. The 2021 education program supports both in-person and digital experiences, including 80+ sessions that tackle vital issues for the security profession.

The GSX Blog sat down with Lisa Terry, CPP, GSX 2021 Selection Committee Chair, for insight into what makes this year’s education lineup stand out.

What trends did the Selection Committee take note of in reviewing this year’s session proposals?

As we reviewed this year’s proposals, we were very pleased to note the abstracts were well written, challenging, and exciting. We found that a significant number of proposals fell into the Information Security and Risk Management categories. The sessions that we selected in those categories cover subject matter like:

  • Cybersecurity;
  • ESRM;
  • Risk, Threat, and Vulnerability Assessments;
  • Insider Threat;
  • Workplace Violence;
  • Crisis Management;
  • and more.

We also found that there was a number of proposals that fell into four other categories: Managing Organizations; Physical and Operational Security; Professional Development; and Digital Transformation. The sessions that we selected in those categories cover subject matter like:

  • Leadership;
  • Career Planning and Advancement;
  • Career transitioning;
  • Organizational culture;
  • Architecture, Engineering, and Design;
  • Crime prevention;
  • Security Force Management;
  • Augmented & Virtual reality;
  • Artificial Intelligence;
  • Critical and Analytical Thinking;
  • and more.

What were some of your key takeaways about the state of the security profession after reviewing the proposals?

In particular for 2021, we knew that in addition to maintaining the highest level of educational quality, we needed to provide a physical environment that prioritized the health, safety, and well-being of all GSX participants. We also knew that we needed to provide a digital learning environment for those individuals who were unable to join the in-person GSX. The GSX format needs to be nimble in order to respond to and work with emergent situations as they arise.

As you know, GSX is an event “for security professionals, by security professionals.” That’s why we conducted a blind review of the proposals, getting the feedback of more than 100 ASIS International members from across the globe with a wide range of security backgrounds. These responses gave the Selection Committee an excellent idea of the education needs of security professionals across the globe.

What excites you most about the 2021 session lineup compared to other years?

In addition to being the first in-person GSX event in two years, the GSX digital experience will support those who are not able to join us in-person in Orlando. Security professionals should expect a brand new experience. Unlike any previous year, this year’s GSX is an integrated experience with in-person and digital features…..and we will be the first GSX attendees to experience this wonderful lineup!


If you’d like to learn more about the GSX education lineup, you can check out Terry’s In the Boardroom interview with SecuritySolutionsWatch.com. Browse the full GSX session lineup and register today!

What’s in Store for GSX 2021: ASIS President John A. Petruzzi, Jr., CPP

Please join me and thousands of security professionals from across the globe at this year’s Global Security Exchange (GSX) on 27-29 September 2021 in Orlando or through our online digital platform. Beginning with our digital kick-off event on 15 September, GSX 2021 will no doubt serve to support, nurture, connect, and inform a diverse group of global security professionals with robust digital and in-person programming—that’s the GSX advantage!

This year’s GSX means a little bit more for many of us. As the first in-person GSX in a little over two years, this year’s event will serve as the first opportunity in that time for us to reconnect in-person with many valued colleagues and friends.

I’ve been an ASIS member for over two decades. I understand the value that these connections provide to security professionals. GSX is far more than just an event. It’s community-building at its finest for the individuals who make our world a safer place to live and work.

GSX Education

When it comes to learning that sharpens your security game, GSX is your playbook for success. The GSX education program addresses the biggest trends and challenges in security, including:

  • access control,
  • asset protection,
  • surveillance,
  • remote workforces,
  • workplace violence,
  • cybersecurity,
  • business continuity,
  • crisis management, and more.

The GSX All-Access Pass unlocks six learning theaters and more than 80 live sessions—including inspiring education sessions, expert-led tracks, exhibitor presentations, timely insights from Game Changers, and pre- and post-GSX sessions—and the ability to earn 21 CPEs.

In-Person

Additionally, the in-person format of GSX 2021 will feature nearly 300 exhibitors with cutting-edge innovations, technologies, and services. GSX’s in-person host is the Orange County Convention Center in Orlando, Florida—which received the Global Biorisk Advisory Council® (GBAC) Star™ accreditation on outbreak prevention, response, and recovery. Rest assured that we are taking every precaution to safeguard your health and safety. 


Digital

If you can’t join us in-person in Orlando, every player is valued at the GSX digital experience. From the digital kickoff event on 15 September, you’ll have to access on-demand content through the end of the year.

Tune in to live-streamed events from two learning theaters during 27-29 September. Engage in live Q&As and speaker interviews during pre- and post- encore events through the GSX platform. With access to on-demand content available through 31 December, you can maximize your schedule by attending some sessions live and others later.

Build Your Game Plan

Another benefit of being team GSX? Your involvement in GSX directly supports the funding of scholarships for security professionals and the administration of essential industry certifications, standards, and guidelines.

Please visit the following links at your convenience and begin mapping out your personalized game plan for GSX 2021:

I look forward to seeing you in September!

John Petruzzi, Jr., CPP
President, ASIS International