BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Lessons and Inspiration from CSO Center Secure Horizons 2024

Gladis De Leon, CPP

It is not every day you get to spend 1.5 days learning from and with senior security executives across the globe, but that was the environment at the ASIS CSO Center’s Secure Horizons event at GSX 2024.  In addition to being in a room of security experts, the program overview piqued my interest, particularly critical thinking—exploring not only the need to make a decision but the need to think thoughtfully about each decision, even under time constraints. In addition, I was highly interested in hearing from my peers about their strategies to influence stakeholder decisions.   

Well, the program did not disappoint! Professor Risa M. Mish from the Cornell SC Johnson College of Business is an incredible educator and has motivated me to consider pursing an executive MBA after her fantastic presentation.   

One of the topics that really resonated with me was that of intuition. I’ve been called highly intuitive many times but never really stopped to think what it entails.  It’s not some superpower but rather the ability to recognize patterns immediately and make decisions based on past experiences.  It was almost eerie as, during the program, I was having a personal issue where my “intuition” was stepping in, and Mish’s overview of decision making and after-action review helped me process and manage my issue.  I got over my “analysis paralysis” and was able to move forward. This is definitely a skill set I will be honing both in my professional and personal life. 

I enjoyed exploring how I “show up” when seeking information to make a decision.  The presentation and discussion prompted me to consider my personal biases, focus on having empathy towards others, and watch my assumptions, all of which can help me avoid negative experiences or miss critical details.   

There were so many key takeaways, but one recommendation that I worked on a few days later was revising my LinkedIn Profile so that it was more effective when making connections.   

Again, I can’t say enough of this amazing program and am thankful to the CSO center for putting together a thoughtful, thought-provoking, and insightful agenda for senior security leaders. 

GSX 2024 Recap: Hear from Attendees

GSX brings together thousands of security professionals from across the globe to share ideas and resources. Hear from some of our attendees and exhibitors about why they enjoyed attending GSX 2024.

The Future of AI in Security: From Reactive to Predictive

Andy Trench

As AI technology rapidly evolves, we’re approaching a pivotal shift in security: moving from reactive responses to predictive prevention. While current AI systems can provide real-time analysis of security situations, the next frontier lies in predicting and preventing incidents before they occur. 

Current Limitations 

Today’s security professionals largely react to events as they unfold, relying on experience and real-time data. Even with advanced AI-powered systems providing immediate alerts for incidents like gunshots or trespassing, we’re still operating in a reactive model. By the time these systems alert us, the event is already in progress. 

The Shift to Predictive Security 

The emergence of generative AI and Large Language Models (LLMs) opens new possibilities for understanding and predicting human behavior. These models, trained on vast amounts of human behavioral data, can potentially interpret emotions and intent, not just identify objects or actions. Instead of simply detecting a person or a weapon, future systems could recognize emotional states like “agitated,” “angry,” or “nervous,” providing crucial context for potential threats. 

How It Could Work 

Predictive AI could analyze existing CCTV feeds and other sensor data, extracting context from pixels and extrapolating likely scenarios. By considering scene context and utilizing powerful reasoning capabilities, these systems could alert security personnel to potentially harmful events before they occur. This proactive approach could revolutionize security measures, potentially saving lives and preventing property loss. 

Key Challenges 

Compute Power: Analyzing continuous feeds from thousands of cameras requires significant computing resources. Potential solutions include edge computing, AI on-chip, and in-camera processing to bring computational power closer to the source. 

Trust and Reliability: False positives can create doubt and complacency. Building trust requires: 

Transparency in AI reasoning 

The issue of “false positives” could be addressed by involving humans in the early stages of the system’s development and providing transparency to any models reasoning and references while forming a result. 

Constantly training the models over time with a human-in-the-loop approach that continuously trains and improves the system will help both inject real human feedback and generate trust as the humans engage in the growth of the system and see the evolution of its accuracy. A larger AI model in an “AI Agent Manager” role will eventually understand context more deeply and make decisions before alert spam becomes an issue. 

Data Availability: Training effective models requires extensive, ethically sourced data on target behaviors. Solutions may include: 

  • Leveraging existing LLM knowledge of human behavior 
  • Generating synthetic data to fill gaps 
  • Focusing on specific, high-priority scenarios 

Timeline and Implementation 

This shift isn’t years away – we could see significant advancements in predictive security AI within months. While we won’t be preventing crimes days in advance, shaving seconds or minutes off response times could make crucial differences in emergency situations. 

Impact on Security Professionals 

The role of security professionals will evolve as these technologies emerge. Rather than replacing human judgment, AI will enhance it, providing additional context and foresight for more effective decision-making. 

Looking Ahead 

As we navigate this transition, the focus must remain on responsible development and deployment. The potential benefits – preventing violence, protecting property, and saving lives – make this technological advancement not just exciting, but essential. 

We stand at the threshold of a paradigm shift in security technology. While challenges exist, the path to predictive security is becoming clearer. Those who successfully implement these solutions may not only revolutionize the industry but also fundamentally change how we approach security in the modern world. 

About the author

Photo of Andy Trench standing in front of two escalators and a set of stairs

Andy Trench is a visionary, entrepreneur, and technology evangelist. Andy has spent the last 20 years as an entrepreneur on the cutting edge of emerging technology, AI-driven data collection, and critical infrastructure solutions. With his deep technical expertise, combined with a creative background from the Rhode Island School of Design (RISD), positions him uniquely to disrupt, innovate, and impact industries at the intersection of hardware, software, and data analytics, from project inception to product deployment.

Understanding and Assessing Climate Risk for Emergency and Security Managers

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Understanding and Assessing Climate Risk for Emergency and Security Managers,” presented by Rawlings Miller, Vice President of Climate Advisory and Resiliency at TRC Companies, Inc., and Larry Fitzgerald, CPP, PSP, Director of Security and Emergency Management Services at TRC Companies, Inc. Read on for what they had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?

RM: Early in my career, I became increasingly concerned about climate risk through my doctorate work in climate modeling and science. There was a clear signal that society was going to be impacted, and we were not prepared for this as a country. Decades ago, I jumped at the chance to be one of the early pioneers in supporting government, communities, and agencies in understanding and reducing their climate risk. For example, when climate change was declared a national threat, I served as a climate risk subject matter expert for the federal government to support the integration of climate risk into critical infrastructure assessments. This work continues to expand and now is at the forefront of engagement with emergency and security professionals. What keeps this topic interesting is that this field is ever evolving, it’s very innovative, challenging, and quantitative.  

Q: Tell us about your presentation and why security professionals should have this topic on their radar.

LF: This presentation will lay out the climate side of the considerations that are often overlooked by traditional security frameworks which tend to focus on historical and current primarily man-made (or intentional) threats. Climate can amplify or introduce additional threats to physical facilities and systems, as well as lead to social unrest and environmental disruption/migration. For security risk management to be effective, risks from man-made threats as well as climate/physical threats need to be considered in a holistic manner as part of the threatscape. Whether a facility is closed by a storm surge, or a terrorist event matters little once the facility is damaged or compromised. Organizations need to recognize and prepare for facilities being taken offline by any number of means, including climate threats. For organizations to be prepared and protected from future conditions, it is imperative security professionals consider climate within their risk management activities. 

Q: What advice would you give security professionals interested in this topic?

RM: At the onset, realize that integrating climate risk into security management can be a little daunting as its based-on scenario-analyses with associated uncertainties for future conditions. However, security professionals already work with challenging risk models such as terrorism, crime, and cyber-security, so integrating climate risk is just another dimension of risk planning. In addition, for success, climate risk analysis should not use a cookie cutter approach but be tailored to a given organization. The climate community has built a large collection of best practices that continue to grow and can be tapped by professionals, but also be aware there are many examples out there that do not represent best practices. So be discerning in reviews and expect to do a little research in getting smart on this topic. It’s also important to recognize that this topic requires engagement across the organization and is most successful with leadership support. For example, our analyses are informed by stakeholders that understand the assets, systems, and operations providing insight in our development of damage/disruption functions, prioritizing physical and operational risks and locations, and advancing mitigation strategies for implementation. In sum, preparing for climate risk could seem challenging for those used to traditional security management, but in reality, security professionals are already well-versed in tackling other complex risks and need to consider climate risk as they are on the frontlines of these impacts. 

Q: How do you see this issue evolving in the next 2-5 years?

LF: I am a trained geologist that was introduced to ASIS through my father. He was a member several decades ago and was awarded a Lifetime CPP in 1998. The risks he was addressing in the 1970s, 80s and 90s looked somewhat different than the risks we are dealing with today. Terrorism, cyber-crime, identity -theft, and the like were not front of mind in his day. As a geologist I have seen landslides sever waterlines and render facilities uninhabitable. I have seen floods devastate entire communities. I have also seen the aftermath of events such as Active Shooter/Active Aggressor and terrorism firsthand. As a security professional (and a CPP and PSP- thanks dad for pushing me) I am used to evolving risks and staying current on what threats are to be considered. I think there is an awakening that is starting to happen that will accelerate in the next 2-5 years that will bring climate risk more into the forefront of consideration when organizations are relocating or onshoring operations or moving critical facilities around the globe. FEMA declares disasters around the US about 3 times per month, which is more than double of what it was when my father was working. I do not see the upward trends leveling off anytime soon. Labor costs may become a secondary consideration to the total risk costs when considering moving a critical operation from Facility A to Facility B, or vice versa. We have helped some clients look at risk in a broader context and use that as a justification to relocate mission critical facilities across town or harden them in place.  

Q: Why do you attend GSX?  

RM: Security space overlaps directly with climate risk analyses. Climate risk assessments across an organization integrates hazard mitigation documents, policies, and procedures as well as includes critical engagement of security professionals. This conference is an opportunity to keep a pulse on security topics relevant to my field.  

LF: Multiple perspectives with new ways of thinking and innovating are important to me. Although I only attend GSX about every 3 or 4 years, I find it engaging and energizing to work with colleagues and clients on understanding newer technologies, newer approaches, best practices and the like.  

Elevating Your GSX Experience: Insights from 10-Year Attendee Angela Osborne

The lead up to GSX can be overwhelming—20,000+ people from 80+ countries, 200+ learning sessions, vast expo floor, and work that does not stop. Even after 10 years of attending GSX (in-person and virtually), I still feel a bit daunted by the thousands of steps, unexpected conversations and meetings, fear of missing out, and the tremendous energy that is GSX. Let me share some tips on not missing out on the best that GSX can offer!  

Planning for an Amazing Experience  

Plan ahead because some amazing events require pre-registration, coming in advance, or packing for fun attire!

  • Women in Security Gala: Consider heading to GSX early to attend the Women in Security Gala on Saturday, September 21st at The Westgate Resort in Orlando 9500 Turkey Lake Road, Orlando, FL 32819 – across from Convention Center from 6:30 PM to 11:00 PM. If you will be in attendance for a pre-conference session, volunteer meeting, or just to enjoy Orlando early, be sure to register for this awesome event and bring your formal/black tie attire!
  • Texas Night: Texas Night is an amazing, free event sponsored by Evolv and the Friend of Chuck, but you have to register in advance. Things I have done at Texas Night got shocked by an electric fence (thanks, Mark Landry), got my picture on a real Texas longhorn, line danced with live band, and raced armadillos! Be sure to pack your cowboy hat and western attire! This year Texas Night is Sunday, September 22, 2024, from 6:30 PM – 10:30 PM at Mango’s Tropical Cafe: 8126 International Dr., Orlando, FL 32819.
  • 30th Canada Night, Eh: Texas Night and Canada Night are the same day, so I recommend moving to Texas Night early and then rounding out your night at the Ice Bar in Orlando at 8967 International Drive, Orlando, Florida. Admission is free to all GSX attendees and guests, and pre-registration is not required. Be sure to wear your fav jersey and grab your toques. Remember on Canada Night, everyone is Canadian!  
  • ASIS Volunteers’ Day: If you are an ASIS Chapter/Region, Community, or Board volunteer, be sure to register in advance to meet volunteers from around the globe. Enjoy lunch, meet the ASIS CEO, experience ASIS Inspires, and take part in Community and Chapter/Region sessions. This will be followed by the ASIS Awards of Excellence and OSPAs.  
  • Are You an Active Duty or Retired Law Enforcement, Military Personnel, or First Responder? Be sure to register for the Military and Law Enforcement Appreciation Day Breakfast at GSX. It is free to attend, but you need to register in advance!  
  • Download the GSX App: The app is one of my favorite features because it provides access to all the education sessions, happenings on the expo floor, map to find your way, education session takeaways, and access to attendee messaging. It also provides critical updates to the schedule and location for education sessions, a calendar and reminder feature to be sure you do not miss key sessions, information on pop-up events, and exhibitor promotions and prizes. It is available now! 

On-the-ground Must Attend Events  

This year GSX has so many cool events planned. Here are some of my highlights for must-attend events!

  • Finland, Finland, Finland!: Join me in hearing from the youngest prime minister globally, former Finnish PM Sanna Marin. She led Finland during truly historic events including Finland’s ascension to NATA membership, the Russian invasion of Ukraine, and the global pandemic. Her session is, Strategic Security Diplomacy: Charting Paths in a Rapidly Changing World and starts on Monday, September 23rd at 8:30 AM EST. Get there early to get a good seat!
  • Exhibition Hall: The expo hall is vast and winding. It will take you some time to orient yourself. Even if you are not a security technology SME, you can find some really interesting systems and see them in-person. You can find the full list of exhibitors in the app. Also, if you are a member or considering membership in related organizations, they likely have booths at GSX. Stop in and say hello!  
  • Community Sessions: GSX is a great time to meet professionals in similar fields through the ASIS International Communities. Even if you are not currently a member, you are welcome to meet up at the ASIS Hub on the expo floor and learn about the community. Be on the lookout for the community information sessions on the app. 
  • Career Center: Did you know that you can attend professional development sessions on the expo floor, get professional coaching, and have an expert review your resume for free? I have such a passion for this element during GSX and believe everyone should take advantage of this! Even if you are happy with your current position, going to the Career Center gives you a confidence boost! You are preparing for anything, and that is empowering! The Career Center is hosting 18 SESSSIONS this year. Most are 20 minutes, providing a quick dose of knowledge. Here are some stand-out sessions: 
    • LinkedIn: Profile Hacks to Propel Your Brand & Career, Tuesday, September 24th from 1:00 PM to 1:20 PM
    • Revolutionizing Job Search: Leveraging AI to Enhance and Automate Your Job Search, Monday, September 23rd from 1:30 Pm to 1:50 PM
    • Maximizing Cultural Intelligence for a Global Workforce, Wednesday, September 25th from 12:30 PM to 12:50 PM  
  • ASIS Celebrates! Even if you are not an all-access pass-holder, you can purchase a ticket for this event. This is not to be missed! ASIS members will converge on Universal Orlando for an unforgettable experience on Tuesday, September 24th from 7:30 PM to 10:30 PM. Bus service will be provided between official GSX hotels and Universal Orlando from 7:00 pm to 10:30 pm. Please note: On Tuesday evening only, walk hotels will be serviced by Route 5. All guests at the three walk hotels will board at the Hyatt Regency Orlando.  
  • ASIS Sub-Saharan Africa Reception: This is a networking event designed to connect Sub-Saharan attendees, and anyone interested in the unique business challenges and opportunities across the continent while celebrating its diverse culture. This event provides a platform to share insights, build meaningful connections and also explore potential collaborations. No registration is required. It takes place Wednesday, September 25th from 3:00 PM to 5:00 PM at S331AB.  

Pro Tips

Over the years, I have collected some lessons learned to limit stress and have an amazing week. Here are some GSX tips just for you!

  • Connect with the LinkedIn QR Code: If you have LinkedIn on your mobile device, don’t reach for your business cards when making a new connection. Reach for your cellphone. Go to your LinkedIn App, tap on the search bar, and then tap on the QR icon. Your QR code will pop up allowing your new connection to scan the code and connect with you on LinkedIn immediately. You can also use the scan function to scan someone else’s QR code to connect to their profile. If you want to avoid following up with stacks of business cards, struggling to find people on LinkedIn, or forgetting to follow-up, use this tool!  
  • Download the Presenter Content: Many session presenters provide their speaker notes, slides, or other content after their presentations through the GSX App. I download as many of these documents as possible—even from sessions I could not attend—to get the most out of the educational sessions. Let’s face it, every year (despite best efforts) a lot of the hot sessions are at the same time.  
  • Bring an Extra Battery Pack for Smartphones. Don’t be the GSX attendee who’s hunting for an outlet or missing out on a session because you have to charge your phone in the hall. Also, do not forget your charging cables or earbuds.  
  • Plan for Virtual Meetings: If you are like me, your work does not stop for GSX! If you have to take any virtual meetings, plan in advance where you will go to limit the background noise.  
  • Get Your Coffee/Tea before Heading to Convention Center: The lines for coffee/tea at GSX are long. While I have met some great friends in line for coffee/tea, it does not maximize the limited time onsite. I grab my Starbucks strawberry acai refresher near my hotel.  
  • Reach out to People in Advance: For me GSX is a homecoming and an amazing time to meet new people but also connect with amazing friends I have made over the years. Check in with your friends and colleagues in advance to make sure they are planning to attend and schedule meetups. Do this in advance because the GSX week is hectic. I love to get together with old and new friends on Wednesday night for dinner.  
  • Get Out of Your Comfort Zone: GSX is a great time to explore new topics, check out new technology, and meet new people. Be sure to attend the social and networking events at GSX. Introduce yourself people who are seated nearby in educational sessions, people in line to get coffee, people on the bus or in common areas, etc. Over the years, I have met mentors, future ASIS presidents, and future managers and colleagues, and made lasting friendships through chance encounters. One of my favorite questions to ask people if how they got into the security field. You get some really interesting insights that can generate more conversation. 

Post Conference  

When you return from GSX, be sure to share what you learned with your colleagues. Consider drafting some highlights in bullet form about the GSX educational sessions, learnings from the expo floor, and networking insights. Be sure to thank your leadership for investing the resources in sending you to GSX.  

I hope you find these tips helpful, and I hope to see you at GSX! 

Corporate Risk from Activist and Extremist Groups

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Corporate Risk from Activist and Extremist Groups,” presented by John Sancenito, CPP, President at Information Network Associates, Inc. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?

A: My interest in the topic of extremist groups stemmed from observing the increasing frequency and sophistication of these groups’ activities over the past decade.  As these groups have become more adept at leveraging technology and social media to further their agendas, the potential risks to corporations have grown significantly.  My background in law enforcement, security and risk management has given me a unique perspective on the need for proactive strategies to mitigate these threats. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar.

A: In my presentation, I will delve into the various tactics used by activist and extremist groups to target corporations, including physical disruptions, cyber-attacks, and reputational damage campaigns. I will also discuss the evolving landscape of these threats and provide actionable insights on how security professionals can prepare and respond effectively. This topic is crucial for security professionals because understanding these risks and developing comprehensive risk management strategies can significantly reduce potential impacts on their organizations. No organization, whether large or small, is immune to attacks by extremist groups. 

Q: What advice would you give security professionals interested in this topic?

A: For security professionals interested in this topic, I recommend staying informed about the latest trends and tactics used by activist and extremist groups. Continuous education through industry publications, webinars, and conferences is essential. Additionally, building a strong network of peers and experts can provide valuable insights and support. It’s also important to integrate a holistic risk management approach that includes physical security, cybersecurity, risk intelligence and crisis communication strategies. 

Q: How do you see this issue evolving in the next 2-5 years?

A: Over the next 2-5 years, I anticipate that activist and extremist groups will continue to evolve, employing more sophisticated methods and leveraging emerging technologies such as artificial intelligence and deepfake videos. The rise of global interconnectedness means that these groups can coordinate and execute actions more efficiently across borders. As a result, corporations will need to adopt more advanced and adaptive security measures, including enhanced threat intelligence, real-time monitoring, and stronger collaboration with law enforcement and other organizations. 

Q: Why do you attend GSX?

A: I attend GSX because it is the premier event for security professionals to learn about the latest trends, technologies, and best practices in the industry. It provides an excellent platform to network with peers, share experiences, and gain valuable insights from leading experts. The diverse range of sessions and workshops at GSX allows me to stay updated on the current challenges and solutions in security management, ensuring that I can bring the most relevant and effective strategies back to my organization.

The Business Model of Terrorism

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “The Business Model of Terrorism,” presented by Jessica Davis, President at Insight Threat Intelligence, Kristen Spaeth, Global Intelligence Manager at Coinbase, Matt Edwards, Principal of Peace, Security and Governance at GIST Research Ltd., and Tracey Durner, Chief of Programs at Global Center on Cooperative Security. Read on for what Jessica, Kristen, and Tracey had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic? 

TD: Early in my career, I focused on the rehabilitation and reintegration of former child soldiers abducted by the Lord’s Resistance Army, a terrorist group then active in northern Uganda. In that time, I witnessed how central finances are to sustaining and perpetuating violence. It is not just the money used to launch attacks, it’s the funds and assets that enable a group to persist, adapt, expand, and survive that makes it truly difficult to dismantle terrorist organizations only through military responses. Like any organization, terrorist groups have salaries to pay, infrastructure to maintain, and investment and expenditure decisions to make. This means they have a financial strategy. On the other side of the coin, economic factors have proven to be an influential part of an individual’s decision to join a terrorist group – things like income instability or lack of economic opportunity. This means to that prevent terrorism, we also need to be ensuring broad access to financial services and protecting economic and human rights of individuals, especially women and marginalized communities. It was the multi-faceted role of money in terrorism and conflict that intrigued me, and led me to the Global Center on Cooperative Security where for the last ten years I have been supporting public and private sector practitioners to analyze financial networks, investigate and prosecute terrorism financing offenses, and implement risk-based countering the financing of terrorism (CFT) measures that protect financial access and civic space.  

Q: What advice would you give security professionals interested in this topic? 

KS: In the last 20 years, there has been a significant expansion of national and international CFT policies and steady, though inconsistent, progression in their implementation. What this means is that the private sector, and particularly the financial sector, has been asked to collect and report a wealth of information that can support intelligence and law enforcement actors in understanding terrorism and criminal networks. My advice would be: work with us. Public-private partnerships can be an important component of security and risk management. Work with the private sector, not only to gather information in accordance with domestic law, but also feed information back to us on how you are seeing changes in the threat and risk landscape. That helps us understand the bigger picture, and therefore hone red flag indicators and our own analysis practices so that we provide current and higher quality information back to you.

Q: Tell us about your presentation and why security professionals should have this topic on their radar.  

TD: Many risk management and security professionals focus on the operational risks associated with terrorism – namely the threat of an attack or instability resulting from terrorist activity. The risks that stem from terrorism financing are more complicated, including operational as well as financial, reputational, compliance, and strategic risks. In my experience, this is an underexamined element in security and risk management frameworks. I see a silo between terrorism, terrorism financing, and other types of security professionals that is a disservice to comprehensive risk management. Our hope in this presentation is to build some of those bridges. From our side, we can help unpack the complexities of terrorism financing today, highlight what we see as critical risk areas, and engage in a dialogue with the audience to better understand the threat and security landscape from a multi-faceted perspective.

Q: How do you see this issue evolving in the next 2-5 years?  

JD: There are serious questions about whether our current polices and approaches to terrorism financing have been effective, and little available data to answer the question. In some places, weak implementation of existing counter terrorism financing frameworks allow terrorist actors to access the global financial system at little risk. Even in places with higher capacity, terrorist organizations are adept at changing and diversifying tactics to avoid detection or conceal activities. The use of sanctions as a prevention and disruption tool is on the rise recently, but similar questions persist about their efficacy – especially in light of the challenges they present for humanitarian aid and peacebuilding efforts. In coming years, I see opportunities to improve our detection and disruption efforts through new financial and regulatory technologies, including use of blockchain to improve transparency and artificial intelligence to analyze data points and patterns. However, it is important that security actors do not lose focus on disrupting the “tried and true” methods, as the current typologies are likely to remain a core element of the financial strategy for many terrorist groups. 

Q: Why do you attend GSX?  

All: For most of us, this will be our first time attending the GSX. We are excited about the opportunity to build bridges between the terrorism financing and security management communities of practice. We deploy many of the same approaches, in terms of data collection, analysis, and risk assessment, mitigation, and management. We are excited to share our views on the terrorism financing threat landscape, and to draw linkages with colleagues that approach intersectional security issues from other vantage points.   

Shift Happens: Cyber-Physical Security Convergence as The New Paradigm

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Shift Happens: Cyber-Physical Security Convergence as The New Paradigm,” presented by Jamshed Patel, VP of Product Engineering at Alert Enterprise. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic? 

A: I became interested in the topic of cyber-physical security convergence due to the growing interconnectedness of digital and physical systems. As technology advances, the boundaries between cyber and physical security are increasingly blurred. The rise of smart cities, IoT devices, and industrial control systems exposed the vulnerabilities that exist at this intersection. Observing the impact of cyber-attacks on physical infrastructure and vice versa made me realize the critical need for a holistic approach to security. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

A: My presentation delves into the evolving landscape of cyber-physical security, highlighting how the integration of digital and physical security measures is becoming essential. I will discuss real-world examples of cyber-physical threats, such as attacks on critical infrastructure, and the potential consequences of failing to secure these systems. Security professionals should prioritize this topic because: 

  • Increasing Complexity and Interdependence: As systems become more interconnected, the potential for cascading failures across sectors increases. 
  • Broader Attack Surface: The convergence of cyber and physical realms expands the attack surface, making it more challenging to defend against sophisticated threats. 
  • Regulatory Compliance: Emerging regulations are beginning to address the need for integrated security measures, requiring organizations to adopt comprehensive security strategies. 

Q: What advice would you give security professionals interested in this topic?

A:

  • Continuous Education: Stay updated with the latest trends and technologies in both cyber and physical security domains. Attend workshops, webinars, and conferences. 
  • Holistic Approach: Develop a security strategy that considers both cyber and physical aspects. Understand how vulnerabilities in one domain can affect the other. 
  • Collaboration and Communication: Foster collaboration between IT and physical security teams. Ensure there is clear communication and shared objectives. 
  • Risk Assessment and Management: Conduct thorough risk assessments that include both cyber and physical threats. Implement robust risk management practices. 
  • Invest in Technology: Leverage advanced technologies such as AI, machine learning, and IoT for enhanced threat detection and response. 

Q: How do you see this issue evolving in the next 2-5 years?

A: In the next 2-5 years, I foresee several key developments: 

  • Increased Integration: There will be greater integration of cyber and physical security measures, driven by the need for comprehensive protection against evolving threats. 
  • Regulatory Frameworks: Governments and regulatory bodies will introduce more stringent guidelines and standards for cyber-physical security, pushing organizations to adopt integrated security practices. 
  • Advanced Threats: As attackers become more sophisticated, we will see more complex and targeted attacks that exploit the cyber-physical interface. 
  • Technological Advancements: Continued advancements in AI, machine learning, and IoT will provide new tools for detecting and mitigating threats, making security systems more resilient. 
  • Collaboration: There will be an increased emphasis on collaboration across industries, academia, and government to develop best practices and share threat intelligence. 

Q: Why do you attend GSX? 

A: I attend GSX for several reasons: 

  • Networking: GSX provides a unique opportunity to connect with security professionals from around the world, fostering valuable relationships and collaborations. 
  • Learning and Development: The conference offers a wealth of knowledge through its sessions, workshops, and keynote speeches, helping me stay updated with the latest trends and advancements in the security field. 
  • Innovation and Technology: GSX showcases cutting-edge technologies and solutions that can enhance security practices. It’s an excellent platform to discover new tools and approaches. 
  • Sharing Expertise: Presenting at GSX allows me to share my insights and experiences with a broad audience, contributing to the collective knowledge and advancement of the security community. 
  • Professional Growth: Attending GSX supports my professional growth by exposing me to new ideas, challenges, and solutions, helping me become a more effective security professional. 

Drones Pose Risks: An Analysis of a Million Drone Flights Over Infrastructure and Corporations 

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Drones Pose Risks: An Analysis of a Million Drone Flights Over Infrastructure and Corporations,” presented by Dean Correia, Emeritus Faculty at Security Executive Council and Robert Tabbara, CEO at AirSight. Read on for what they had to say and don’t forget to register for GSX 2024!

Q: Tell us about your presentation and why security professionals should have this topic on their radar.

RT:

  1. Increasing Drone Proliferation: Drones are becoming more accessible and widely used, not just for recreational purposes but also for industrial and commercial activities. This surge in drone usage increases the risk of unauthorized or malicious drone activities, making it essential for security professionals to be aware of the potential threats.
  2. Potential Threats and Vulnerabilities: Drones can be used for espionage, smuggling, or even as weapons. Understanding these risks helps security professionals to better protect their organizations from such threats. Drone detection systems provide a critical layer of defense by identifying and tracking rogue drones before they can cause harm.
  3. Protecting Sensitive Areas: Critical infrastructure, government facilities, and large events are particularly vulnerable to drone incursions. Implementing drone detection systems helps safeguard these high-value targets by providing real-time alerts and enabling quick responses to potential threats.
  4. Regulatory Compliance: Many regions have specific regulations regarding drone operations, especially near sensitive locations. Security professionals need to ensure that their organizations comply with these laws, and drone detection systems can help monitor and enforce compliance.
  5. Technological Advancements: Drone detection technology is rapidly evolving, with new systems offering enhanced capabilities such as longer detection ranges, improved accuracy, and integration with other security systems. Staying updated on these advancements enables security teams to deploy the most effective solutions.
  6. Case Studies and Best Practices: The presentation will include examples of successful drone detection implementations, highlighting how organizations have effectively used these systems to prevent incidents. These real-world insights provide practical guidance on how to integrate drone detection into existing security protocols.

Q: How do you see this issue evolving in the next 2-5 years?

DC: We continue to see increased adoption of drones by our clients for true 3-dimensional persistent situational risk understanding. Bad actors are using drones more prevalently for nefarious purposes. Therefore, a drone detection solution like AirSight will most likely be top of mind for future technology roadmaps in order provide this persistent 3-dimensional situational risk assessment and understanding.

Q: Why do you attend GSX?

RT: GSX is is where the entire global security industry unites. Access insights, community and critical security solutions. I attend for the education, exposure to Innovation and networking with peers.

DC: For the networking and exposure to new technology.

Demystifying Biometrics: The Safe or Unsafe Use of Biometrics 

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Demystifying Biometrics: The Safe or Unsafe Use of Biometrics,” presented by Doug OGorden, Director of Digital Media & Events at AID2entry & BIPAbuzz – Get To The Point Media. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic? 

A: When COVID-19 shut down our world, it exposed just how unprepared we were for dealing with the digital transformation of our day-to-day lives…  and created an opportunity for cyber-criminals, particularly from Russia and China, to defraud over $400 billion in Paycheck Protection Program (PPP) funds. The inability to confirm identities remotely made online crime exceptionally easy to commit and even easier to get away with. In response, in 2021, investors poured $3 billion into Identity Verification (IDV) companies to develop ways to better identify, authenticate, and authorize individuals behind online transactions. 

While working in the digital identity market during this gold rush, I began to wonder how the physical access and security industry was addressing the identification, authentication and authorization of individuals accessing desktops and doorways in the real world.  Even today the physical security industry still struggles to ensure with 100% certainty that the person logging into a corporate network or entering a facility is indeed who they claim to be… I call it the “holy grail” or “missing link” that the PACS industry still can only dream about.  

I believe my purpose is to educate the security industry on the safe and ethical use of “using YOU” as the personal credential for both physical and digital access, enabling a truly mobile, touchless, and frictionless experience at work and play. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar. 

A: Biometrics are not new, but the ways we access and store them digitally are only just beginning to be understood and implemented. My presentation will demystify biometrics and explain how using unique personal identity markers can actually enhance our privacy. I will discuss the current barriers to adoption and implementation, and why it is crucial for security professionals to stay informed about technology & privacy advancements. 

Q: What advice would you give security professionals interested in this topic? 

A: The most important thing is to establish a privacy, trust, and consent policy with every employee before implementing a biometric solution. Educate yourself thoroughly or consult an expert. Ensure compliance with state laws, such as Illinois’ Biometric Information Privacy Act (BIPA), which is considered the gold standard for biometric-related lawsuits. Understand that biometrics are not a one-size-fits-all solution for every industry. Keep an open mind during discussions and explore the current methods available for securing and storing reusable, decentralized, self-sovereign identities. Remember, what worked in 2008 might not be suitable for 2024. 

Q: How do you see this issue evolving in the next 2-5 years? 

A: We are transitioning from a “Flintstones to Jetsons” world, and biometrics will only continue to grow in popularity. The younger generation, accustomed to accessing everything with their fingers or faces, will drive this change, questioning why previous generations were so hesitant. By May 7, 2025, the REAL ID deadline, we will begin to see new methods of using our identities at work and in our personal lives. 

Q: Why do you attend GSX?

A:

  1. Networking
  2. Learning
  3. Business opportunities
  4. To reconnect with friends and colleagues in the industry

The Future of AI and Robotics in the Security Services Industry 

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “The Future of AI and Robotics in the Security Services Industry,” presented by Steve Reinharz, Founder and CEO at Robotic Assistance Devices, and Troy McCanna, Chief Security Officer at Robotic Assistance Devices. Read on for what they had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?  

SR: From the moment I received my first Commodore Vic20 I fell in love with a future vision of intelligent automation and the possibilities it provides. Extremely exciting to be at this point in history and now driving autonomous intelligent solutions. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar.  

TM: Security pros need to keep Autonomous Intelligent Response (AIR) on their radar because it’s not just the future of security—it’s already making a big impact. If you’re a security director who’s stuck in old ways, you risk falling behind. When your leadership realizes there’s been a big shift in the industry and you haven’t acted, you’re going to face some tough questions. Sticking to outdated and costly security methods just isn’t going to cut it anymore. I firmly believe that understanding, embracing, and implementing autonomous, intelligent security solutions is crucial to staying relevant in the rapidly evolving field of security. 

Q: What advice would you give security professionals interested in this topic?  

SR: Dig in now!!! This is moving quick and new solutions will be popping up everywhere – don’t be left behind! 

Q: How do you see this issue evolving in the next 2-5 years?  

TM: After three years of working with security professionals across various industries, I’ve noticed a rapid increase in the adoption of Autonomous Intelligent security solutions for mainstream needs. As it’s becoming harder to find qualified personnel for security roles, technology is stepping in to fill the gap with more cost-effective and reliable tools that protect property, safeguard people, and enhance overall safety and security for both staff and guests. Over the next 2-5 years, I expect most security roles to be performed by AI driven technology tools, like RAD, keeping people as a premium. 

Q: Why do you attend GSX?  

SR: Attending GSX for me is worthwhile because it’s my mission to continuously improve our industry for the benefit of the end user base. Having the time to meet progressive industry professionals and share how new technology can benefit them and their stakeholders is personally and professionally fulfilling. 

TM: I attend GSX to immerse myself in an environment where forward-thinking ideas are embraced by both professionals and visionaries. I seek out conversations with those who want to be part of shaping the future, rather than just reacting to it. 

Creating Safer Schools – Proven Mitigation Strategies for Active Violence Events

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Creating Safer Schools – Proven Mitigation Strategies for Active Violence Events,” presented by Brink Fidler, President at Defend Systems. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?  

A: I started my company with a focus on Active Violence Mitigation Training after my children’s school requested a training in the wake of the attack at Sandy Hook Elementary School. As a prior law enforcement officer, I had exposure to various trainings where I was able to learn the elements of meaningful, lasting trainings. In my opinion, the programs that were available at the time in the Active Violence world had too many holes or too many unanswered questions, so I decided to develop a curriculum of my own.  

Q: Tell us about your presentation and why security professionals should have this topic on their radar.

A: Our training is designed for everyday people to leave feeling empowered and capable of taking immediate action in active violence situations. While it has parts that are tailored to the specific organizations that we are training, it is also applicable to everyday life events like going to the grocery store, church, the movies, concerts, or other events. It’s a holistic way to train your organizations personnel on a topic that is in the forefront of everyone’s mind. 

Q: What advice would you give security professionals interested in this topic?

A: It is essential for everyday people to be trained on what to do in active violence situations because they are the ones who need to know how to survive them. Responding security professionals, whether private or government agencies, are equipped to neutralize threats, but it takes time to respond properly. The fact is, these events unfold so rapidly that the biggest area for mitigation is giving individuals the knowledge and tools to keep themselves alive and help others around them. 

Q: How do you see this issue evolving in the next 2-5 years?

A: Unfortunately, this issue is likely never going to go away. If statistics continue to evolve in the same pattern that they have historically, then this problem will only be getting worse. While attempted attacks may continue to increase annually, our hope is that more and more people will feel empowered to know how to respond through proper and effective training. 

Q: Why do you attend GSX?

A: We attend GSX for a couple of reasons. One is to expose our company to like-minded individuals and potential clients. The other is to build professional relationships with security professionals to stay relevant in products that we are suggesting to clients and stay ahead of the game on new technologies that are designed to keep people and properties safe.