BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Updating Security Operations Procedures with AI Technology

By Steve Reinharz

The artificial intelligence (AI) revolution brings new technologies into daily life. We’ve seen AI usage in diagnostic applications within the healthcare industry and in the emergence of self-driving cars, and with the growth experienced in these areas, it’s become hard to avoid AI’s massive implications around the world.

But how can security move beyond Siri and Alexa and harness the power of AI to enhance security operations? There are several ways:

  • Advanced video analytics: Video analytics is one of the first major domains within the security industry that is being radically transformed by AI – and this is already in practice in many organizations today. AI enables video analytics to do much more than just alert users when a person or object has crossed a barrier.
  • Operational efficiencies: Smart security solutions, such as video management systems or networked access control and visitor management, now can take the data being collected and correlate it with patterns in behavior for employees and visitors to a facility. This data, in turn, can be used to find ways that an organization can increase efficiencies and save valuable resources.
  • Connecting devices through IoT: AI brings multiple data points together to be analyzed and transformed into actionable intelligence that can be used to solve real-world problems. AI makes it possible to take these multiple streams of information and make it meaningful and useful.
  • Robotics: Robotic technology has taken the world by storm, but it isn’t possible without the power of AI at the heart of the technology.
  • Decision-making: AI-enabled technology has the potential to take the guesswork out of answering alarms by determining which events require a call to law enforcement and which are false alarms. While much of this technology is still in prototypes, the potential is real.

As part of the upcoming GSX Conference hosted by ASIS International, I will be joined by other experts in the field to talk about how to incorporate the best of AI technology, including video analytics, robotics, and license plate recognition, into today’s security operations procedures. Attendees can gain insight into the latest AI-powered technologies that can streamline operations, increase efficiency, and enhance security across an enterprise, and will be able to take this knowledge into their own organizations to drive leaders to innovate security operations procedures.

Join us for “Update Security Operations Procedures with the AI Technology” at 2 p.m. Tuesday, Sept. 25, at the Global Security Exchange (GSX), powered by ASIS International.

Global Security Exchange (GSX) Exhibit Hall to Spotlight Innovations and Trends Shaping Security

ASIS International unveiled plans for enhanced learning, career development opportunities, and access to the groundbreaking technologies shaping the future of the security industry, as part of an exhibit hall like no other at the 2018 Global Security Exchange (GSX). In the first year of its rebrand following a 63-year history as the ASIS Annual Seminar and Exhibits, GSX, the security industry’s flagship event, is expected to attract 550 exhibitors and more than 20,000 operational and cyber security professionals to engage in learning, networking and hands-on exploration, Sept 23-27 at the Las Vegas Convention Center.

“ASIS does an incredible job providing programing that focuses on some of the industry’s most innovative emerging physical and cyber security technology. I’ve never been to an event where the keynotes and sessions connect so comprehensively to what’s happening on the show floor,” said Drew Weston, Director of Sales and Marketing at CodeLynx, Inc. “The integration of the programing and exhibits is truly seamless.”

At GSX, the exhibit hall will be transformed into a learning lab environment featuring thousands of security products, technologies and service solutions, as well as immersive learning opportunities designed to connect the current threat landscape, as well as emerging risks, with leading solutions available in the marketplace. New show floor features include:

  • X Learning Theaters:
    • X Stage—features leading-edge technologies and their impacts across the industry, examining innovations like blockchain and cryptocurrencies, AI, drones and robotics, social media and the digital self;
    • Xcelerated Exchange Stage—provides a forum for the critical discussions that need to take place between practitioners and solution providers to proactively address the current and future security landscape; and
    • Xperience Stage—showcases case studies and other tried-and-true best practices that address security challenges facing practitioners across all industry sectors, including active shooter scenarios, bullying in the healthcare industry, and the risks associated with hosting a public event at cultural institutions.
  • Career HQ, with new career fair and enhanced career center:
    • Job seekers will have access to resume reviews, a headshot studio, career coaching, professional development sessions and networking opportunities with employers and peers—all free. The new career fair will have top companies looking to hire talent, such as the Department of Homeland Security (DHS) and Apple.
  • D3 Xperience (Drones, Droids, Defense):
    • Supported by Association for Unmanned Vehicle Systems International (AUVSI), the GSX D3 Xperience will deliver an immersive learning experience focused on the impact of Unmanned Systems on the security industry. Education and demos will showcase the emerging technology around the use of drones, droids and counter-UAV defense systems.
  • Innovative Product Awards (IPAs) Showcase:
    • The 2018 Innovative Product Awards highlights the new products and services on the GSX show floor that are poised to disrupt the security marketplace. The submission deadline is August 3.

In addition to these features, the exhibit floor will house an International Trade Center and the ASIS Hub, which includes access to ASIS Council representatives, live streaming interviews, and fireside chats.

“We have completely re-engineered GSX to provide more opportunities for security practitioners, solution providers, students, military and first responders. From Career HQ and the International Trade Center to our three unique theaters of education and live demos, attendees and exhibitors will find tremendous value in our immersive, engaging, and informative expo hall,” said Richard E. Chase, CPP, PCI, PSP, 2018 president, ASIS International. “There is no other event that compares to what GSX is offering this year, and we’re just getting started. We will continue to evolve and grow GSX in the years ahead as a part of our new brand promise to unite the full spectrum of security professionals to create the only global “must attend” security event.”

GSX brings together attendees, exhibitors and press from more than 100 countries. To learn more and to register, visit www.gsx.org/register. Members of the press are eligible to receive a free all-access pass, including keynote presentations, education sessions, and the show floor. Email [email protected] with your media credentials to register.

A Zero Trust Approach to Information Security

By Christopher Frenz

With the pandemic ransomware attacks of both WannaCry and NotPetya devastating companies around the globe, ransomware was a prominent headline in 2017. It’s estimated that in 2017, companies recovering from these and other ransomware attacks incurred $5 billion in damages.

One of the hardest hit industries was healthcare—as readily demonstrated by the UK’s National Health Service, Erie County Medical Center, and other hospitals that fell victim to various types of ransomware. WannaCry in particular exposed just how devastating a ransomware attack can be on the healthcare industry, as it not only impacted systems that store patient data, it also resulted in the encryption of medical devices. WannaCry concretely demonstrated that vulnerabilities in medical devices have the potential to impact patient care and patient safety. This attack established a wholly new and wholly unacceptable meaning for the term denial of service.

Comprehensive guidance for preventing, mitigating, responding to, and recovering from ransomware attacks can be found in the OWASP Anti-Ransomware Guide, and security guidance for protecting medical device deployments can be found in the OWASP Secure Medical Device Deployment Standard. One particularly effective control present in both guidance sets is that of network segmentation—as a segmented network can help to isolate threats and prevent them from spreading throughout an organization.

Join me on Wednesday 26 September at GSX 2018 for Session 6133, A Zero Trust Approach to Information Security, to see how network segmentation can be taken to the next level and a zero trust network created to stop the spread of malware and other threats throughout any organization.

Less Than Three Months Left Until GSX!

This Sept. 23-27, the newly rebranded Global Security Exchange (GSX), formerly the ASIS annual seminar and exhibits, is expected to attract 20,000+ cyber and operational security professionals, vendor partners, media, students, and allied organizations for enhanced learning, career development opportunities, and access to the innovative technologies shaping how business gets done. Taking place at the Las Vegas Convention Center, GSX will deliver a number of exciting updates to the event, which has been widely recognized as the industry’s flagship event for more than 60 years.

GSX offers a record 300+ education sessions, where global subject matter experts from ASIS, ISSA, and InfraGard will speak to best practices and issues facing the profession, as well as emerging risks and threats. Expo floor education will include three new X stages featuring sessions on disruption, innovative technologies, AI, mixed reality, cryptocurrency, and more.

Also on the show floor, enhanced Career HQ programming includes more education, free headshot studio, and a job fair, featuring leading employers like Apple and the Department of Homeland Security—to name a few.

The brand new D3 Experience, supported by AUVSI, offers demonstrations that take a deep dive into issues of unmanned systems security.

These updates, coupled with illuminating keynote addresses from CNN host Fareed Zakaria and futurist Scott Klososky and world-class networking at Brooklyn Bowl and Drai’s Nightclub along the famous Vegas strip, make GSX the year’s can’t-miss security event.

Browse the GSX Blog to learn more and keep updated on program news and announcements.

Advanced pricing is available until August 10, saving you $100 on your All-Access pass. Visit www.gsx.org/register.

Exhibitor Profile: Awareity (Booth #3282)

Awareity is a multi-industry leader and creator of the first-of-its-kind Community-wide Fusion Platform. Established in 2010, Awareity is on a mission to make the world safer using research-based data, evidence-based data, and a passion to help organizations and communities disrupt and prevent incidents and tragedies before they occur.

Community-wide Fusion Platform

Awareity’s Community-wide Fusion Platform offers not only a new category of solution, but a critically needed solution for disrupting, preventing, and stopping active shooters, workplace violence, nurse violence, and numerous other acts of violence. The Community-wide Fusion Platform is successfully preventing incidents and tragedies across multiple industries by eliminating common and dangerous gaps in threat assessment and intervention efforts.

A Different Kind of Camera

15+ years of research into post-incident reports from mass shootings and other acts of violence have provided extremely valuable lessons learned and exposed how “Walking, Talking, Social Media Cameras” can be the difference maker in preventing Active Shooters and other acts of violence.

What are “Walking, Talking, Social Media Cameras”?

People. A student, employee, teacher, family, friend, counselor, principal, nurse, parent, other family member, neighbor, law enforcement, mental health expert, social worker, child services agent, social media user, and other community members who observe warning signs and pre-incident indicators. With a Community-wide Fusion Platform, a central, community-wide team (Threat Assessment Team (TAT), Behavioral Intervention Team (BIT), etc.) could securely see all of the warning signs and pre-incident indicators BEFORE the escalation and attack occurs. When the right people have the right information, they can take the right steps to intervene and prevent attacks before they occur.

Expanding Reseller Program

Awareity is expanding our Reseller Program so leading and forward-thinking Security/Safety Integrators can create differentiation, new prospects, and new revenues to complement current product and service offerings.

Imagine the difference when warning signs and pre-incident indicators are collected and acted upon before incidents and tragedies take place. Join us and help us make schools, colleges, organizations, and communities safer.

For more information, please visit www.awareity.com or visit us at booth 3282 at GSX, September 24-27, 2018.


Managing a Global Workforce in a Crisis

By Tim Crockett

In today’s world, the health and well-being of your employees across the globe is an increasingly important focus. In the face of terrorist threats, natural disasters and health epidemics, the increasing duty of care obligation for employers is undeniable. The question then becomes: what is the best way to pro-actively ensure the safety of your employees, travelers and expats?

When an incident occurs, time to react is critical and four factors are essential: 1) know where global employees are located 2) determine if any employees are impacted by the incident 3) communicate with them and 4) assess their safety needs.

Technology undoubtedly plays a key role in this. Location-based data and knowledge of where your employees are or where they’re going to be is critical. However, technology alone cannot meet an organization’s duty of care needs. Once you know who might be affected by an incident, what happens next? How do you reach those people, and what do you do if they need help? The fact is that it doesn’t matter how technologically advanced the world becomes, nothing can take the place of human interaction and insight. Your employees should have access to relevant information before they travel, empowering them to avoid many of the hazards faced today. This same system should provide the employee the ability to pick up the phone and talk to an expert. Whether they require advice, assistance or find themselves in danger, the knowledge that they have immediate access to medical and security professionals can make a world of difference.

This human element is also critical for risk program managers and other stakeholders. Access to real-time information and guidance on how best to communicate with executives and family members can be the deciding factor in whether an incident is managed successfully or not.

Join me on Monday, September 24th at GSX 2018 for Session #4102, Managing a Global Workforce in a Crisis. We will be discussing the critical combination of technology and human interaction in next generation crisis management and sharing a case study of the 2017 London Bridge Terror Attack.

Career Opportunities in Security Management

By Ron Martin, CPP

It is important to note that security is a business function, not a subset or spin-off of the criminal justice system. Therefore, security management is a distinct field of academic study, separate and apart from criminal justice. Entrants to the industry seek internships, cooperative or work study programs, and entry level positions with employers.

The industry needs a more diverse community of entry level analysts and technicians. This session will provide a summary of security career opportunities along with the supporting career competencies. The essence of this session is the career competency model developed from the United States Department of Labor Model. Many entrants are not aware of the industry’s career opportunities. Nor do they know the competencies required.

In the security industry, as well as in all industries, there are three distinct actors in the career development process-the employer, institutions, and the individual. The employer’s role is to provide employment opportunities and establish competencies for their employees. The second actor is “the institution”. An obvious example is the school system, but industry associations play an important role as well. They can provide a baseline competency for the industry they serve. Finally, there is the individual. He/she must obtain the requisite knowledge, skills, and abilities to apply and compete for many career opportunities the industry will offer.


New in 2018! ASIS is offering student members a complimentary all-access registration to GSX. For a $20-per-year ASIS membership, students can participate in the on-site career center and job fair, attend important foundational sessions like Security Careers: The What and the How, build their professional network, and more! Learn more about the student membership opportunity.


This session will cover the “What and the How” of security management. The “what” are career opportunities. The “how” are the core career competencies an individual will need to satisfy the employer’s workforce requirements.

Join me on September 26th for Session #6122, Security Careers: The What and the How.

Cryptocurrency Security Challenges

By Brent Barker

Criminals are early adopters of new technology. They use it to create new crimes and improve old crimes. Law enforcement and the laws are always playing catch-up. This is especially true for cryptocurrencies.

In 2017 the value of cryptocurrencies exploded. At its high, they had a total value of $823 billion USD. The rising value attracted investors and criminals. Bitcoin was the first cryptocurrency but now there are over 1,600. Most are legitimate, but some are scams. One cryptocurrency was even called ponzicoin.

The single largest theft of cryptocurrencies took place in January 2018. Hackers stole $530 million from the cryptocurrency exchange Coincheck. Several people who became rich from cryptocurrencies have been kidnapped and forced to hand over the private key that accesses their cryptocurrencies. Once someone has your private key and steals your cryptocurrency, it is gone. There is no way to get it back.

Countries are using cryptocurrencies. Venezuela introduced the petro earlier this year to avoid U.S. sanctions. And North Korea is suspected of secretly mining cryptocurrencies to earn hard cash.

Companies are using cryptocurrencies as a new way to raise investment money. Most are legitimate, but one study found that over 18% of them were suspicious and likely involved fraud.

But there is good news. Cryptocurrency transactions are not as anonymous as previously believed. They can be tracked, and owners identified. Law enforcement is learning how to “follow the virtual money.”

Today, the attention is on the cryptocurrencies, but many see the greatest potential from blockchains, the software that powers cryptocurrencies. Many believe blockchains could change the world as much as the internet. In the future, every business will use blockchains in some manner including the security industry.
Join me on September 24th at GSX 2018 as I explore the criminal use of cryptocurrencies, law enforcement investigations and examine the enormous potential of blockchains to fight crime in the future. Join me for Session #4309, Bitcoins, Blockchains and Crime.

Fareed Zakaria, Scott Klososky to Kick-off GSX Keynote Lineup


The Global Security Exchange (GSX) keynote lineup will kick off on Monday and Tuesday with presentations from Fareed Zakaria, global thinker, columnist and CNN host, and futurist and technology visionary Scott Klososky.

Zakaria, host of CNN’s Peabody Award-winning “Fareed Zakaria GPS,” is former editor-at-large of TIME magazine, a three-time bestselling author, and one of Foreign Policy magazine’s Top 100 Global Thinkers.

At GSX, Zakaria will open the conference with an examination of important forces, developments, and risks affecting the global community. His remarks will encompass cyberthreats—espionage, ransomware, spear phishing—which know no boundaries. The once-local crime syndicates that have now metastasized over whole regions and continents. Global expansion and outsourcing, which means managing international teams and varying cultures. And more. With an emphasis on international intelligence and security, Zakaria will explore what it means to live in a truly global era.

Klososky returns as the GSX Tuesday keynote following his popular 2017 presentation, “The Technology Integration of Man.” Building on his continued involvement with chief security officers and ASIS stakeholders in the past year, Klososky will address the impact of today’s rapid digital transformation on security management and leadership. He will build a compelling case for managing and using technology—and knowing when not to use it—to gain a competitive advantage and lead successfully into the future.

The keynote speakers for Wednesday and Thursday morning will be revealed in the coming weeks. Attendees can register by 10 August to save $100 on their all-access pass. To learn more and to register, visit www.GSX.org/register.

Exhibitor Profile: AMAG Technology, Inc. (Booth #1239)

AMAG Technology provides an end-to-end solution that includes access control, video surveillance, intrusion detection, identity management, visitor management, and incident management. Products are powered by a robust policy-based platform to help security operations mitigate risk, reduce cost, and maintain compliance. At the heart of the AMAG solution is the Symmetry™ Security Management System, which provides intelligent networked solutions scaled to manage the security challenges faced by both small, remote facilities as well as multinational organizations around the world.

In this video, Director of Business Development Kami Dukes talks about RISK360, AMAG’s new incident and case management solution that investigates and analyzes incidents to help organizations operate more efficiently, save money, enforce compliance and mitigate risk.

RISK360 is a highly configurable, workflow based solution that empowers security teams to capture information, perform assessments and identify risks, giving companies a clear picture of what is happening on their premises. Organizations can track the time and expenses spent on incidents, monitor resource allocation and use that data to streamline processes and save money. Robust reporting with customized dashboards help companies work smarter and meet compliance requirements.

Available as a Software as a Service or as an on-premise solution, RISK360 operates on all modern browsers and mobile operating systems including IOS, Windows and Android.

RISK360 integrates seamlessly with Symmetry Access Control software. Events in RISK360 are communicated to Symmetry Access Control, and alarms in Symmetry generate events in RISK360. The integration creates Be On the Lookout (BOLO) flyers and automatically terminates a user’s access in Symmetry, providing a safer environment.

RISK360 also helps manage security personnel with guard tours, daily activity reports and passdown logs. Users can leverage computer aided dispatch to identify the closest available responders, saving time and improving efficiencies. Organizations can also capture site specific information using geospatial analysis, perform assessments and notify teams of risk.

For more information, please visit www.amag.com, call 310-518-2380 or email an AMAG Business Development Manager. Or visit us at booth 1239 at GSX, September 24-27, 2018.

 


Medical Cannabis Security: From Seed to Sale

By Tim Sutton, CPP

In more states than not and in an increasing number of countries around the world, medical cannabis security has become a unique new challenge. In the U.S., twenty-nine states and the District of Columbia have enacted laws legalizing medical cannabis. Cultivation, processing, and dispensing organizations present both shared and unique risks and each state has its own set of rules, regulations, and governing bodies. Join us as we move through all phases of medical cannabis security, beginning with the permit application and continuing through to patient sales. Explore how to demonstrate compliance with varying rules and regulations while providing a safe and secure environment for employees and patients. Study factors in operating multiple sites in multiple states across multiple levels.

At GSX, we’ll explore the complexity of securing the medical cannabis industry and the many challenges faced by Security. The permit application process and security plan are unique to each state’s rules and regulations. Explore how to meet some of the more difficult requirements for compliance and learn about some examples of noncompliance. Learn also about the commonalities and differences across different locations.

We will discuss case studies from several states. There is no cookie-cutter template that will ensure success. The security plan is weighted as 25-30% of the total scoring of permit applications and is much more than cameras, locks, and security personnel. Discover how to integrate ASIS ANSI Security Standards throughout the process as we discuss the core elements of a security plan in the medical cannabis industry used today in operations across multiple states.

Join me on Tuesday 25 September for Securing the Medical Cannabis Industry from Seed to Sale.


Tim Sutton has nearly 30 years experience in loss prevention, safety, and security with more than 20 of those years in management. He has worked in both operations and administrative capacities for some of the largest and most prestigious regional and international companies. His experience in retail, manufacturing, chemical, public and government housing, schools, and hospitals and their specific safety and security needs has helped build his unique perspective and skill set. As Director of Security for GHG Management, Tim is responsible for any and all security concerns including the designing of electronic security systems and all physical security programs within the company’s 12 Medical Cannabis Dispensaries, and Medical Cannabis Cultivation and Processing Centers in IL, MD, and PA.

Exhibitor Profile: Orion Entrance Control, Inc. (Booth #521)

Orion Entrance Control, Inc. manufactures optical turnstiles for corporate, government, and university lobbies. Orion’s turnstiles allow easy entry for employees and visitors. The turnstiles range from a high-security bi-parting full glass speed lane to a four-inch-wide pure optical pedestal. With an award-winning design coupled with infinity lane control software, Orion can meet or exceed any specifications to ensure that lobbies are secure. Its state-of-the-art turnstiles are hand-built, high-quality products made in the U.S.