BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Building a Strategic Security Plan

Don’t you love it when a plan comes together?

When facing myriad evolving risks, security managers are forced to make tough choices on the fly. However, by having a strategic or master plan in place ahead of a crisis, professionals can manage risk and reduce the potentially overwhelming effects of incident response while improving buy-in and support.

In this short interview, Bernard Scaglione, founder and principal at The Secure Hospital, shared some of the key points of strategic security management planning with Security Management.
Want to learn more about this topic? Check out Scaglione’s GSX+ session, Strategic Planning: Managing the Chaos, Not Reacting to It, available on-demand 21–25 September at GSX+.

Security Management: What is the value of a strategic or master plan in a security management program?

Bernard Scaglione: A strategic plan helps security management define direction and focus organizational resources. Strategic planning is the process of documenting and establishing the direction of the organization by assessing its current state comparing it to the future state. It provides strategic direction and goals so that the security department can function with more efficiency and effectiveness. It allows for C-suite buy-in so that the security department can continue to grow and develop.

What are three common mistakes or pitfalls when developing a strategic plan?

Many people think that creating a strategic plan is an easy process, taking very little time or effort to create. In reality, the opposite is true. Creating a strategic plan takes dedicated resources and personnel to complete. It is a team approach, requiring the input of administration and key stakeholders. The good news is: it will pay off in dividends once implemented.

Many also feel that once the plan is complete, the work is done. The plan then ends up on a shelf—only referenced when purchasing equipment or requesting more staff. In reality, the plan is an active and changing document that needs to be reviewed annually or when a significant event occurs within the organization.

Developing a strategic plan is data-centric, requiring the gathering and analysis of large amounts of data to help in the proper development of strategic goals. This part of the strategic plan process is not always completed because of its complexity. It is important as part of the creative process to gather at least one full year of data and analyze it to determine trends and patterns. Done correctly, a minimum of two years of data should be gathered so that the developed patterns or trends are statistically significant and point the security department in the right direction.

How can a strategic plan help reinforce organizational resiliency?

Strategic planning helps to identify all potential threats and risks within the organization and provides a path to minimize those risks. It also allows the security department to change or shift gears when an adverse event occurs. Enabling the security department to quickly and efficiently adjust to changes within the organization. The plan lays out an operational structure designed to minimize threats and provides a plan to respond to those risks.

What else should GSX+ attendees look forward to learning in your session?

Strategic plans are not commonly used in the security field but are a useful tool in providing direction and growth. ASIS members should strongly consider viewing this session to learn more about strategic planning to see if it is something that would assist them in creating a more effective security operation.

2020: What Has NOT Changed?

By Eddie Sorrells, CPP, PCI, PSP

At this point it seems beyond banal, and painfully obvious, to state that 2020 has been a time of unprecedented change in our society. Remote work, virtual school, and that often fleeting hope that tomorrow, or possibly next week, …ok maybe next month…. things will get back to normal. Like most, I viewed the situation we are currently in much differently in March than I do now. Back then when someone would raise the prospect of still “doing this” in the fall, let alone winter, I scoffed. “Of course, things will be back to normal by then” I declared when faced by the prospect of cancelling an industry event, customer meeting, or family vacation. I was motivated only by a desire to get back to business as usual. But here we are still dealing with change and grappling with ways to still do the things that are important. But when it comes to our industry, instead of bemoaning all the routines of life that have been upended, let’s take a moment and spotlight the things that haven’t changed for the security professional.

The Need for Continuing Education

The beginning of 2020 ushered in a renewed call for security professionals to expand their knowledge base in many different areas. Security technology is advancing at a rapid rate, while threats are evolving just as quickly. And this was pre pandemic! Security professionals in early 2020 were in need of cutting-edge information related to best practices, recognized security standards, and ways to mitigate threats that change almost daily. Has this changed considering what we have gone through the past few months? Only in one very important way—now the need is greater! While the delivery method is different, and the dynamic of learning in itself has shifted in many ways, now is the time to run towards continuing education and best practices. Regardless of where you find yourself in your career, whether you are a CSO or in an entry level position, there is no greater strategic value for anyone working in security than continuing education. If we have learned nothing as security professionals in uncertain times it is to arm ourselves with information about what we are going through now, and what the future holds.

The Need for Networking and Mentorship

OK, let’s state the obvious from the outset: it is hard to match the value and benefit of in-person networking. But because of the times we are living in, this of course presents many challenges. So, do we place this aside until things get back to normal? I do not believe we can afford that kind of delay. Just as with continuing education, the need to freely exchange ideas, challenges, and potential solutions has never been more critical. Associations and networking events have taught me one critical lesson, even as I approach 30 years in the industry: I need mentoring at every stage of my career. The day that I decide I have nothing left to learn from an educational session, a talk with colleague, or friendly advice from someone who has walked where I am heading, is the day I shall realize it is time to do something else . The need for networking and mentorship never goes away, it just grows stronger.

So, have things changed in 2020? Of course, they have. But as we enter the final phase of this unique year in our history let us concentrate on what has not changed! Our industry is poised for bigger, better, and greater things than ever before. But we must continue to invest in ourselves, our peers, and our profession If we truly hope to reap the benefits for years to come. I look forward to taking another such step on my journey at GSX+.

Eddie Sorrells, CPP, PCI, PSP is chief operating officer and general counsel at DSI Security Services. Sorrells has two sessions at GSX+ this year: The Role of Off-Duty Police in Disaster Planning and Recovery and COVID-19-Related Emerging Lawsuits and Liability Issues.

Refocusing on the Remote Insider

By Claire Meyer, managing editor, Security Management

Insider threats have long been an issue of concern for security professionals. Whether they are acting unwittingly or maliciously, employees, contractors, and other insiders can put intellectual property, data, assets, and other people at risk. Now, with workforces worldwide shifting to remote work due to the coronavirus pandemic, security leaders are shifting gears to focus on how to monitor for threats when employees are out of sight.

For an update on this topic, Security Management magazine checked in with Val LeTellier, chair of the Insider Threat Committee at the ASIS Defense and Intelligence Council and author of How to Create an Insider Threat Early Warning System for a Remote Workforce from Security Management’s May 2020 issue. LeTellier will be presenting on this topic on Thursday, 24 September at GSX+, along with operational psychologist Dr. Malique Carr and corporate security senior strategist Scott Stewart.
Read more about the upcoming session here, and learn more about GSX+ here.

Security Management: How do remote workers create unique risk to the organization?

Val LeTellier: Put simply, remote workers create unique insider risk because an organization has far less control over the workplace environment and far less observation of employee behavior.

Control is important because insider risk countermeasures can be reinforced far more easily when workers are on-site. Within their own office, an organization can ensure that specific information technology infrastructures are used, that data and material is handled and stored in a certain way, and that the physical environment enables other security practices and policies. Outside their own office, the organization loses standardization and control and must take on the challenge of instituting, monitoring, and enforcing security measures within each employee’s different environment.

Beyond the physical reinforcement of security measures, the traditional workplace includes more nuanced value—in the form of social and group cohesion. This is important because in all workforces, the building of authentic relationships between workers creates a satisfying bond between employee, manager, and the organization. While beneficial to job satisfaction, morale, and productivity, this bond also strengthens organizational resiliency to insider attacks because cohesive groups have higher levels of trust and emotional unity and tend to look out for each other. Conversely, a lack of organizational cohesion can create or exacerbate negative issues, increase stress, and prevent timely responses to suspicious or disruptive behavior.

The second way in which remote workers create a unique risk is by the degraded level of organizational observation. This is important because independent behavioral assessment has traditionally been a leading way in which malicious behavior identified. Specifically, fellow employees and managers have played a large role in identifying threats.

With remote workers, this early warning resource is limited to email, conference calls, and occasional meetings, which can fail to provide enough exposure to for others to identify early indicators of problems. This is best illustrated in by the path an employee takes along the “insider kill chain.” With on-site employees, this process occurs is largely under a leader’s oversight, and those close to a potential attacker may recognize and report behavioral changes. With off-site employees, all bets are off.

The value of observation is even more relevant when the impetus for the accelerated remote work movement—the COVID-19 pandemic—is considered. Insiders are often driven forward by critical events, and the world is in the middle of a generational critical event. The related financial, emotional, health, and co-habitation anxiety brought on by the pandemic will naturally move some susceptible insider personalities to action either on their own or through outside manipulation. Without the daily in-person engagement of the traditional workplace, early indicators will be more difficult to spot.

Taken together, the expansive recent growth of remote work has created a new paradigm in which traditional insider risk countermeasures are degraded while the factors leading to insider action are simultaneously exacerbated.

Security Management: What else will security professionals learn about this topic in your GSX+ session?

Val LeTellier: By nature, insider risk programs for both on- and off-site workers are unique for each organization. They must be tailored to the organization’s risk profile, goals, strategy, resources, and culture.

Thus, the intention is not to provide participants a remote workplace insider threat checklist but to equip them with an understanding of the paradigm shift that is created by the remote work movement and highlight the window of opportunity they have to strengthen programs before temporary changes become permanent.

Using the remote workplace perspective, we then have an operational psychologist review the personality types known for different insider attacks, their common characteristics, and common precipitating events.

Based upon this, we together offer considerations for developing remote workplace strategy and tactics. Understanding that funding for insider threat programs is limited, these practical recommendations focus limited resources on the most relevant and impactful insider risk, with results that will not only improve insider resiliency but also overall morale and productivity.

5 Lessons Security Leaders Should Learn from COVID-19

TorchStone’s David Niccolini, executive vice president and co-founder, and Scott Stewart, vice president, describe insights security leaders can take away from their pandemic experiences.

  1. The need for scenario-based planning

    Tabletop exercises or “blue sky” sessions before a crisis hits are extremely useful in helping company leadership develop an understanding of probable and possible crises. This type of scenario-based planning can help prevent what the 9/11 commission called “a failure of imagination.”

  2. The importance of contingency plans to build resilience

    Based on your scenario-based planning, company leadership must develop contingency plans. While contingency planning cannot provide you with the exact solution for every possible crisis that might occur, the planning process will force leadership to think through and plan out issues such as communication, corporate priorities, and potential emergency actions. While no one could have precisely predicted how COVID-19 would unfold, in the wake of SARS and MERS, many companies did develop plans for a potential global pandemic, and when COVID-19 hit, they were much better prepared to face it than companies without plans.

  3. The need for flexibility

    Since it is very unlikely that a crisis will play out exactly as your contingency plan anticipates, a great deal of flexibility is needed during a crisis and plans must be adjusted to account for unknowns. If you attempt to follow a plan too rigidly, you can develop tunnel vision and your response will become fragile and prone to shatter. Thus, plans should be viewed as guidelines that provide general direction and guard rails, not an exact recipe for success. However, the need for flexibility does not mean that planning can be abandoned altogether, attempting to build a plan reactively during a crisis will often lead to failures or perhaps disaster.

  4. There are business opportunities during a crisis

    While many companies will suffer during a crisis event, there are always business opportunities available to those in a position to capitalize upon them. Companies who have items 1-3 above will be able to move more rapidly from “crisis mode” to “maintenance of a crisis,” which are two very different things. Once a company reaches maintenance point, they will be able to recognize and seize upon real opportunities that present themselves. This provides a distinct advantage over competitors who remain in crisis mode.

  5. The need to prepare for the next crisis

    Moving into maintenance mode also allows you to begin to look for – and plan for – the next crisis – and as we’ve learned in the post 9/11 world, the next crisis is coming. For example, at the present time many people are laser focused on the challenges that the COVID-19 crisis is presenting; and with good reason, as these are unprecedented and challenging times. However, we believe that a myopic focus on COVID-19 is preventing some from preparing for the very real possibility of a crisis caused by significant civil unrest in the U.S. (and elsewhere) in the coming months.

At this year’s GSX+, Stewart will present on Insider Threats in a Borderless Work Environment. Stewart is also a contributor to Security Management magazine, including an online exclusive Q&A earlier this year on Security’s Role During a Pandemic Response.

Exponentially Increase Your Knowledge at GSX+

Never before has the security profession been so tested. From COVID-19 to global threats, the challenges are adding up. The GSX+ education lineup, announced 15 July, is designed to give you a voice and the opportunity to stay current on the latest topics affecting the global security profession. Plus, each session will offer a real-time Q&A chat feature to further the conversation with your fellow attendees and session speakers.

What’s more, All-Access attendees can earn up to 25 CPEs toward their recertification and will be able to access on-demand recordings of GSX+ sessions through 31 December.

Take a sneak peek of eight sessions waiting for you at GSX+ this 21-25 September:

  • How Today’s Drones Affect Privacy and Security

    The increased use of drones in the workplace and in law enforcement increases privacy concerns and the complexity of security environments. Understanding the basics of drone regulation is imperative when planning an appropriate response to the current threats posed by drones.

  • Influencing the C-Suite for Security Program Success

    Often the biggest obstacle to launching a security program is getting final approval from the C-suite. Explore how to develop business case objectives for any security project, discuss the key items that should be included, and define how a cost-benefit analysis will help support the business case.

  • Managing Stress During a Crisis

    Emotional intelligence is at the heart of crisis management, including managing an individual’s emotions and stresses. Combining technical expertise with these soft components is the key to sustainable resilience for both a corporation and its employees.

  • Why the Security Industry Needs Women Leaders

    The security industry can build on the research and strategies used by others when making hiring decisions that make good business sense. A dedicated diversity and inclusion program in the workplace leads to a healthy and rich balance of voices and better outcomes.

  • People Risk Management: A New Paradigm

    Companies around the globe have sophisticated risk management programs for financial, information, travel, and supply chain risks. However, a similar risk management program rarely exists for an organization’s most important asset: its people.

  • The Business of Security Is the Strategy of the Business

    A quality risk assessment is a fundamental component of enterprise security risk management. Learn to analyze whether uncertainty is within acceptable boundaries of your organization’s capacity to manage it.

  • Visitor Management in a Healthcare Environment

    Healthcare institutions are realizing that the opportunity to prevent violence starts with managing who enters the facility. Consider the case study of how one large academic healthcare institution accomplished this.

  • Why a Cybersecurity Crisis Management Plan is Vital to an Organization’s Survival

    Understanding the difference between cyber crisis management and security-incident response is a critical component of an organization’s survival. Your senior executive team must be prepared and trained to respond quickly to crisis-level attacks. Are they ready?

What is GSX+?

In June, ASIS International announced that, due to concerns caused by the COVID-19 pandemic, Global Security Exchange (GSX) 2020 would move to a fully virtual platform—now titled Global Security Exchange Plus (GSX+). In making this transition, ASIS has created a completely new experience for the security industry. The new GSX+ delivers both attendees and exhibitors a host of advantages and opportunities that go beyond what the in-person conference had to offer.

Many trade shows have gone virtual this year, and the benefits have become clear to individuals on both sides of the aisle. In a time of pandemic, it is safer and less stressful for those concerned about social distancing and touching public surfaces. More team members are able to attend due to the reduction in travel and hotel costs. Exhibitors can reach new audiences with this broadened scope.

For attendees who appreciated the opportunity to network at GSX, the virtual GSX+ platform magnifies this—since there is no required travel time between education sessions, happy hours and other networking events. In fact, it is possible to be at more than one event simultaneously while sitting at your computer. Finally, by reducing car, train and air travel, organizations and individuals are helping to minimize their carbon footprint.

At GSX+, the experience of attendance has become entirely virtual. The elements that have always been important—including CPE-eligible education sessions, the opportunity to learn about new technologies and product in the Marketplace, and peer-to-peer networking—are fully present. Offering both live and on-demand features, the event delivers the best in content, connections, community, and commerce to both exhibitors and attendees.

A Wealth of Accessible Content

When it comes to sessions, GSX+ offers attendees even more than in past years. Not only will there be more than 100 sessions, tech talks and game changers offered live and on-demand, but every live session will be recorded and accessible to All-Access attendees through the end of 2020. Vital Game Changer sessions address some of today’s most timely issues—including deepfake media, election security, and post-pandemic security leadership. And All-Access attendees can earn as many as 25 continuing professional education credits toward recertification requirements.

More Ways to Connect

Daily networking events help to keep the security community connected and discussing the newest trends, ideas, and opinions. The GSX+ platform will enable participants to network with peers in one-on-one meetings, small group discussions, and larger networking events. As GSX+ nears, there will be tutorials on using the platform added to the GSX+ website. ASIS members can also begin or join their own conversations on ASIS Connects, the meeting point for security professionals around the world.

Technology and Solutions on Display

The core of any industry event is the ability to browse new technologies, watch demonstrations, meet potential partners and learn about new solutions on the exhibit floor. All this is available in the Marketplace on the GSX+ virtual platform. Attendees can engage companies directly and request private one-on-one meetings or product demos to see technology in action and ask questions. GSX+ provides “matchmaking” between exhibitors and attendees to help attendees find exactly the products and services they’re looking for. Another option available is to watch on-demand or attend live scheduled product demos and tech talks.

For exhibitors, the platform provides branding, thought leadership, and lead generation opportunities to help reach targeted audiences and optimize return on investment.

The Always-on Experience

As a virtual event, GSX+ will be accessible 24 hours a day, with live content recorded and available on-demand shortly after its airtime. When you are ready to learn, the content is ready for you to experience. It is also a cyber-safe event, with SSL/TLS encryption technology that is audited annually by third parties to ensure the safe transmission of data.

The proud tradition of Military and Law Enforcement day is still being honored too, with complimentary one-day registration for those individuals on Wednesday, 23 September.

At a time when it is more important than ever to ensure you bring maximum value to the table with your skills and knowledge, GSX+ delivers the very latest on the most relevant topics—including COVID-19, global leadership, workplace violence, cybersecurity, school security, the cannabis industry, unmanned systems, and much more. Attending this year’s virtual conference will open doors to opportunity, professional development, and collaboration.

With opportunities to participate ranging from the All-Access Pass to the Marketplace Only Pass, GSX+ is an experience not to be missed.

GSX 2020 Call for Presentations

GSX 2020 Call for Presentations has CLOSED

The GSX 2021 Call for Presentations will open in November/December 2020!

Today’s security leaders need to be prepared for anything—from terrorism to a cyberattack to an insider threat. They must understand the language of leadership, be able to gather and act on diverse and robust intelligence and navigate the increasingly tumultuous global risk landscape. The threats are many, but with education, information sharing, partnerships, and peer networks, security professionals can rise to the challenge.

ASIS International is here to help. ASIS seeks to provide the highest quality, cutting edge, relevant learning experiences over three days at GSX—Global Security Exchange, the most comprehensive security event in the world.

Taking place 21-23 September 2020 in Atlanta, GA, Global Security Exchange will offer best-in-class solutions to equip security professionals to anticipate, mitigate, manage, and prevent today’s complex threats from an integrated enterprise perspective. We can’t accomplish this without your expertise and insights.

Calling all subject matter experts: This is your opportunity to share your experience and expertise with our global audience of security management practitioners looking for the latest information, cutting-edge strategies, and best practices that will help them succeed in their jobs and demonstrate ROI to their organizations. This audience is comprised of international security professionals from vertical industries across both the public and private sectors, as well as military and law enforcement professionals and others responsible for security.

GSX 2020 is known for its high-quality and comprehensive education program. Session abstracts must offer strong and relevant content and actionable takeaways to ensure that the targeted audience(s) benefit. All professional security-related topics are welcome—intermediate to advanced-level sessions are highly desirable, and case studies are strongly encouraged.

Format matters—think beyond the traditional lecture format to deliver a learning experience that will have a lasting impact.

Back and better than ever:

  • X Learning is a series of experiential sessions designed to actively shape the future of the security professional, offering cutting edge solutions, innovative technology, and an evolving perspective required to navigate tomorrow’s security landscape.
  • X Learning Stages are designed to offer the security practitioner something unique. Located right on the show floor, these stages feature relevant and timely topics and encourage dialogue among attendees.

If you possess knowledge that will challenge and inspire the ASIS audience, we encourage you to submit your proposal(s) today!

Commercially focused/vendor promotional proposals will not be considered

If you have any questions, contact Becky Mangan, Learning Program Manager.

A new format for a new year! The presentation proposal submission format has changed a bit from past years. In addition to using a new system, you will notice a change in the information you will be asked to submit including background information, topic/track(s), and a number of speakers. These additional requirements have been made in an effort to ensure the highest quality content. Please pay special attention as you complete your proposal, as the process may take a little longer this year.

Use the Call for Presentations Template to build your proposal before you enter it into the system.

See the Call for Presentations Scoring Rubric


GSX 2020 Call For Presentations- Best Practices Webinar

Have an idea for an education session for GSX 2020, but not sure where to start with submitting a proposal?

Before submitting your proposal, hear from Mark Schreiber, CPP, of Safeguards Consulting, Inc. and Becky Mangan, ASIS Learning Program Manager, as they take a deep dive into our Call for Presentations processes and best practices to make your submission stand out!

Missed the webinar? Watch the recording here. 

GSX Learnings: Department of Homeland Security Discusses How to Prepare for and Combat the Growing Drone Threat

By Susan Friedberg, ASIS Guest Drone Blogger
Communications Manager, Dedrone
[email protected]

The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency’s (CISA) Infrastructure Security Division has established a strategic partnership approach to securing the nation’s critical infrastructure. Brian Harrell, the Assistant Director for Infrastructure Security, discussed at GSX 2019 CISA’s specific collaborative efforts with industry and community partners, and how their organization helps secure critical infrastructure and civilians.

Among the top national security threats posed today in the U.S., according to Harrell, is the rise of unwanted or hostile drones in the airspace. Drones, when in the wrong hands, are interrupting operations at military bases, airports and correctional facilities, and threatening the safety and security of public events, such as those at stadiums and festivals.

The issue of unwanted drones will only continue to escalate, and according to Harrell, “Unmanned aircraft systems do not represent an emerging threat, but rather, an imminent threat, given their retail availability here in the United States.” In the U.S. and abroad, drones have interrupted operations at airports, such as Newark and Gatwick, at correctional facilities and stadiums, and critical infrastructure such as pipelines managed by Saudi Aramco. The U.S. Federal Aviation Administration (FAA) announced at GSX that the agency has registered five times more drones (more than 1.5 million) in just four years, than all the commercial aircraft that have been registered up to now (300,000) in the history of the agency. As more drones enter the international airspace, regulations and policies must also follow suit to address the increasing safety and security risks they pose.

According to Harrell, as it relates to the rise of drone technology and airspace threats, the threat landscape is ever-changing. There have been significant technological advancements in drones, and they are solving problems and helping industries with important tasks like inspections, search and rescue, and videography. With these advancements, however, comes the opportunity for misuse. Although the airspace threat will always be evolving, Harrell provided GSX attendees with practical information and questions to ask their teams on how to build a security program that addresses and advances with the drone threat.

Building Resilience Against Drone Threats Through Counter-Drone Technology Data

Organizations can act today to start understanding their security gaps in their airspace. Harrell posed to the audience the question, “is your organization prepared to be overwhelmed?” As it relates to the airspace threat, without counter-drone technology, security leaders are working with incomplete information about their airspace activity. However, this gap of knowledge can change with the integration of counter-drone technology. With drone activity data, teams can then defend what assets matter most to them and protecting what Harrell qualifies as “pencils like pencils, and diamonds like diamonds.”

With consideration of the evolving threat landscape, the rise and advancement of drone technology is a clear demonstration that security threats no longer fall clearly into the “physical” or “cyber” security categories. Drones can cause damage both to physical and cyber infrastructure. Without counter-drone intelligence to help identify airspace activity, organizations are powerless against protecting against all drone threats. Counter-drone technology is an essential tool that addresses this hybrid threat landscape.

Four Steps to Advancing Security Programs

Harrell prompted GSX attendees to ask themselves, what can security providers do today to increase our understanding of security threats at our organization. He continued by outlining a four-step framework for building out a new security program or advancing an existing one.

  • Connect: Connect with local law enforcement to determine what steps you should take should there be an unwanted drone in your area. This proactive approach will ensure that those who need to respond to emergencies are aware of the threats at your operations, and can begin the next step, which is to plan.
  • Plan: If it can happen there, it can happen here. There are drone incidents reported in the news from all over the world. No organization is immune to drone threats. If a drone incursion can paralyze operations at Heathrow and Gatwick, it can also do the same to JFK and Newark.
  • Train: Counter-drone technology provides data about the airspace activity at a particular area and exposes where there may be vulnerabilities in an organization’s operations. Data from counter-drone programs can include flight times and durations, the types of drones flown, and the flightpath or point of origin. With situational awareness, security teams can develop new safety and response protocols to respond to drone incursions, direct resources to “hot spots,” and execute training exercises. Organizations shouldn’t wait for a crisis to occur, but rather, use a crisis as an opportunity to showcase the strength of their security operations.
  • Report: The picture is always clearer from the rear-view mirror. Post-event analysis determines where organizations can better streamline resources, achieve security goals, and grow in their understanding of how to prevent damage or disruption from a drone incursion.

“A drone is a computer in the sky,” Harrell reminds the audience. Drones are small and discrete enough to operate unnoticed, but powerful enough to drop payloads, hack into systems, or covertly spy on operations. By considering these four steps, organizations will be able to stay ahead of the drone threat and ensure the strongest defense should there be an incursion or unwanted drone activity.

Going Beyond the Current Standards to Manage Today’s Threats

Many organizations will focus their efforts on compliance with standard practices and regulations. Resilience is not built on compliance, but rather, by continuing to advance and go beyond standard practices and operations. As regulators and legislators continue to research and respond to drone incursions, individual organizations will need to decide whether or not they want to go beyond the current standards or wait for additional federal guidance. Harrell states that organizations can be proactive in defending their operations against the growing threat of uncooperative drones.

Harrell points to GSX attendees to challenge their teams with the question, “are we ready?” Can security teams confidently answer whether they have taken steps to build resilience into their existing security programs? And if not, what assets and technologies are available to make an impact today?

Counter-drone programs should begin under “blue sky” conditions, where security teams can connect, plan, train, and report under ideal conditions. Data collection with passive counter-drone technologies, such as radio frequency sensors, can begin immediately and without any interference with existing operations. The first step to understanding airspace activity and the threat to an organization is to build awareness and gain access to data sets and analysis. From there, organizations can which can help identify the most vulnerable or essential areas for protection.

Catch the GSX Action with Global Access LIVE!

Global Access LIVEGlobal Security Exchange (GSX) has started, but you don’t have to miss out! If you couldn’t make it to Chicago for GSX this year, you can still sign up for live streaming of select education sessions. With Global Access LIVE! you can receive valuable education—focusing on risk, threat and vulnerability, terrorism, Enterprise Security Risk Management, and more—delivered directly to your desktop in real time.

The Global Access LIVE! platform allows you to view top sessions, ask questions of the presenters, network through chat, and share best practices with fellow participants at your leisure. Plus, you’ll receive access to the recorded virtual sessions 24 hours after the live webcast. This is an invaluable opportunity to earn CPE credits from the comfort of your office—or, gather your entire team to listen and learn together. Sign up today.

Global Access LIVE! Education Schedule

Monday, 9 September

8:30 – 10:00 amNavigating the Geopolitical Landscape: Security Risks and Hotspots
Ian Bremmer, Ph.D, President, Eurasia Group
10:30 - 11:45 amFirst Look at the Official ASIS Guideline on ESRM
12:00 – 12:45 pm Best Practices for Managing Business Disruptions and Keeping Remote Employees Safe
1:15 - 2:30 pm** Cancelled ** Global Terrorism, Political Instability, and International Crime Council Presents Trends ** Cancelled **
2:45 - 4:00 pmThe Importance of Cross-Functional Business Departmental Collaboration

Tuesday, 10 September

8:30 – 10:00 amBold Solutions for Changing Times
Speaker: Steve Demetriou, Chairman and Chief Executive Officer, Jacobs
11:00 am - 12:15 pmThe Emerging Cannabis Industry: Pitfalls, Opportunities, and Pain Points
2:00 - 3:00 pmLeveraging the Attacker Mentality Through Red-Teaming
3:30 - 4:30 pmASIS/SHRM Workplace Violence Prevention and Intervention Standard: Active assailant protocols

Wednesday, 11 September

8:30 – 10:00 amGeopolitics and Security
Speaker: General John F. Kelly, U.S. Marine Corps (RET)
11:00 am - 12:15 pmThe 2020 Olympics: Red Teaming Enterprise Security Risks
1:00 – 1:30 pm Accessing Assets through Hacking, Deception, and Control of the Most Sophisticated Computers: A Human Mind
2:15 - 3:15 pmSecure Cities & Safe Cities: Emerging Technologies and the Law
3:45 - 4:45 pmPre-attack Indicators (PAINs) Identify Assailants before the First Gunshot

Thursday, 12 September

8:30 – 10:00 amProtecting Assets in the Age of Cybersecurity Leaks and Scandals: How to Plan When Risk is a Moving Target
Speaker: Tarah Wheeler, Cybersecurity Policy Fellow, New America
10:30 – 11:15 am Finding Chinks in the Armor: Getting More Value from Your Penetration Testing
11:30 am – 12:30 pmGSX 2019: It’s a Wrap – Highlights, Hot Topics, and Headlines

One Can’t-Miss Event

That’s right folks – were only one day away from the event we’ve all been waiting for…GLOBAL SECURITY EXCHANGE (GSX) 2019!

Packed Exhibit HallASIS International, the world’s largest association for security management professionals, is hosting the security event of the year at Chicago’s McCormick Place from September 8-12. Formerly the ASIS International Annual Seminar and Exhibits, GSX is the most relevant and pioneering security event that unites the full spectrum of the security industry.

So, whether you work in cyber, operational or physical security in the private or public sector, you’ll find that GSX–with the most comprehensive security education and innovative technology in the world–applies to your career. Only ASIS has the expertise, influence and resources to deliver the industry’s flagship event.

But wait…there’s more! GSX has elevated your event experience by adding more modern education learning experiences, revitalizing its networking opportunities, and reimagining the trade show floor. You will be able to explore the current and future security landscape, exchange key ideas and best practices, expand global connections and experience new innovations. It’s the expert-level education, networking and marketplace you know – but multiplied.

In the exhibit hall, there will be interactive and exciting displays, demonstrations and new X-Learning stages to explore as you move throughout the exhibit booths. If you want to learn more about who will be available on the show floor, you can search the exhibitor list to prepare!

This year, the full conference program will feature more than 300 security courses, including pre-conference certification review courses. If you’re looking to enhance your career development, look no further!

ASIS International has always been deeply committed to providing excellent ways to invest in and advance the security profession all year round. Your attendance at GSX will directly support scholarship programs and the development of education, certification and standards and guidelines.

This dedication to enriching the knowledge shared, best practices and connections made directly benefits security professionals across all disciplines – at all stages of their careers. Our goal is to provide the best information and resources needed to succeed personally and professionally.

We’ll see you there!

Two Show-Stopping ASIS Parties

GSX Networking EventsGlobal Security Exchange is all about connections. Make the most out of the only event bringing security professionals from all vertical markets throughout the world together.

Sunday night’s Opening Night Celebration and Wednesday’s President’s Reception are your chance to party with friends and colleagues! Grab a drink, hang out with peers, and enjoy these fun nights at the can’t-miss events of GSX 2019.

Start GSX 2019 off right as we enjoy the best of Chicago with the Opening Night Celebration—Chicago on the Silver Screen on Sunday, 8 September from 6:00 – 8:00 pm. Catch up with old friends and make some new ones at Revel Motor Row— originally home to the Illinois Automobile Club. The popular landmark is the perfect spot to enjoy Chicago-themed movies, along with plenty of food and beverages. There’s no better place to spend the first night of GSX!

Break out the bright colors, shoulder pads, and big hair as we keep the party going throughout the week! Throw on your best 80’s attire, hop into your DeLorean, and join us as we go back in time for the President’s Reception—Fight for Your Right to Party! Dance to live entertainment, play iconic video games, enjoy food, drinks, and top-notch networking at North Hall, McCormick Place on Wednesday, 11 September from 7:00 – 10:00 pm. Please note, the event location has moved and will be held in the North Hall, right here McCormick Place.

These events are open to all attendees and exhibitors. Tickets required; included with All-Access Pass or purchase online.

We’ll see you on the dance floor!

Three Days to Explore the GSX Exhibit Hall

With only three days to take advantage of all that the Global Security Exchange exhibit hall floor has to offer (and only three days left to plan!), it’s important that you plan your time wisely! We want you and your colleagues to have a great time in Chicago, and not to miss out on anything! Here are some of the must-see features in the exhibit hall this year at McCormick Place.

ASIS Hub

At our booth, we will be able to provide tools, resources and connections! Be sure to stop by to meet with ASIS HQ staff to learn about what’s new, how to get involved, new research and programs, advancing your career and so much more. If you’re not a member, feel free to stop by to learn more about us and how to join! You could also participate in a live Q&A session that will stream across our social media networks, so be sure to come camera ready!

Disruption District

The district is the place to be to experience all the innovation, expertise, technologies and companies that are shaping the suture of the security industry! In the district you will find new and enhanced programs like D3: Drones, Droids and Defense, the X learning Stages, the Pitch Competition and Innovative product Awards. This part of the exhibit hall will be accessible for all attendees, so come one, come all!

ASIS Foundation Sharpshooter Contest

At this new interactive feature at GSX, you can test your shooting skills and compete for prizes (and bragging rights) at the Sharpshooter Competition sponsored by Smart Simulators and SB Tactical. Tickets are required, so make sure to donate and stop by on either Tuesday (10am-5pm), Wednesday (10am-5pm) or Thursday (10am-12:30pm)! If you know you want to put your skills to the test and compete for prizes, you can secure your tickets in advance.

International Lounge

In the International Lounge, which is open to all attendees and exhibitors, you will find private conference rooms for meetings and a relaxing lounge to recharge and connect with your colleagues. This might be the perfect time to even meet someone new and make a valuable connection, so have those business cards at the ready!

Bistro GSX

Did someone say food? Bistro GSX, the “crème de la crème” for trade show dining, will offer an extensive menu and plenty of seating for you to dine in comfort and style. To make things even more convenient, you can purchase you lunch in advance, and have your ticket available on your GSX badge! Visit the Bistro webpage to learn more about hours, reserving tables, securing your tickets, and pricing.

Red Cross Blood Drive

As a part of our efforts to give back to the Chicago community, we will be sponsoring a blood drive with the American Red Cross. The drive will be up and running at Booth #4407 on Tuesday September 10 from 10:00 a.m. – 5:30 p.m. So, schedule a time (using sponsor code GSX) to roll up your sleeves and play your part in leaving the community healthier and safer than when you came.