BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Frontline Workers in Crisis: Leveraging Integrated Security Systems to Address Today’s Greatest Workplace Safety Threats

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Frontline Workers in Crisis: Leveraging Integrated Security Systems to Address Today’s Greatest Workplace Safety Threats,” presented by Brandon Davito, Senior Vice President of Product and Operations at Verkada. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in frontline worker safety? 

A: Since the very beginning, Verkada’s mission has been to protect people and property. And as we have grown and scaled our business – today, there are more than 1 million Verkada devices online protecting 24,000 organizations across 85 countries – I’ve learned about the challenges that keep our customers up at night.  

Amid an uptick in violence against workers in customer-facing roles last year, we conducted research to better understand the frontline worker experience. Among the most concerning findings: more than half of retail workers regularly worry about erratic or aggressive behavior and theft from customers. Similarly, more than half of healthcare workers in frontline roles regularly fear being assaulted at work.  

The enormity of this issue can’t be understated. The retail industry is the largest private sector employer in the United States, accounting for fifty-two million workers. That’s one in four Americans in the workplace. 

Retail has long been a starting point for many careers. With better tools and training, we can make a real difference in protecting the safety of retail workers today – and importantly, their careers over the long term. 

Q: Tell us about your presentation at GSX and why security professionals should have frontline worker safety on their radar. 

A: At GSX, I’ll be sharing the newest findings from our research on frontline worker safety in healthcare and retail. We’ll also have time to discuss what this means for leaders entrusted with keeping their workforces safe – everything from the technology that can support teams to thinking through retention, compliance, and training.  

Q: What advice would you give security professionals interested in frontline worker safety? 

A: My advice for security professionals entrusted with protecting frontline workers is to never underestimate the power of communication. From my conversations with customers and partners, I’ve learned that the more that the security tools, systems, and processes are communicated and shared with frontline staff, the safer they feel. Consider hosting regular training sessions, adding signage in breakrooms, clearly labeling tools or otherwise making them visible, and asking for regular feedback about what is or isn’t working.  

Q: How do you see workplace safety evolving in the next 2-5 years? 

A: I’m optimistic that between improvements in technology to both deter and respond to events that more and more workers will begin to feel safe on the job again. Even in just the past year, I’ve seen how many more customers have shifted from primarily using security systems as reactive tools for investigations to proactive tools that can identify and mitigate risks before an incident occurs—for example, being able to automatically detect abnormal or unsafe traffic patterns in stores and send an alert. I have no doubt that AI will also dramatically improve the proactive technologies and solutions that retailers leverage to protect their frontline workers.  

Q: Why do you attend GSX? 

A: Spending time with customers is invaluable. At GSX, I’m able to spend quality time with customers learning about new pain points or issues that are emerging, which helps me and my team to build products and solutions that better address and anticipate their needs.  

How Schools and Universities Can Digitally Map Their Campus Security Technology for Better Safety

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “How Schools and Universities Can Digitally Map Their Campus Security Technology for Better Safety,” presented by Keon Blackwell, Security Systems Coordinator at Atlanta Public Schools, Maureen Carlson, Co-Founder and Vice President at System Surveyor, and Patrick Bucci, Security System Specialist at University of Wisconsin. Read on for what Maureen and Patrick had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?

MC: We have seen a great deal of K-12 and university security teams use our software to ramp up their capabilities and provide better school and campus safety. Though these campus security teams are responsible for implementing physical security technology effectively, they often don’t have a sizable staff or budget. One thing that campus leaders tell us alleviates these challenges is the ability to share visual plans with non-technical stakeholders and communicate using a centralized, digital platform, in order to make the most informed decisions. In many ways, simplifying the system design and device management processes allows them to reallocate the rest of their time proactively safeguarding students, staff and faculty.

On top of all this, as a parent of both high school and college-age students, this is an especially important topic to me. When we can get campus safety and security leaders sharing best practices, the sum is greater than the parts.

Q: Tell us about your presentation and why security professionals should have this topic on their radar.

PB: I’m excited to be part of this presentation as a real-life practitioner and security specialist at the University of Wisconsin and am happy to share what I’ve learned and the benefits of digitally mapping our campus. We hope it will be an interactive discussion with others who manage complex campus environments. Here is a case study for some background prior to this event.

Q: What advice would you give security professionals interested in this topic?

MC: My advice would be to collaborate and share resources with other professionals in your field and to strive continuously to learn ways to collaborate to solve problems. Every day, it seems, new and advanced technologies enter the market, making it all the more important to constantly educate yourself and communicate with campus stakeholders to determine which technology platforms are relevant and which are not.

When it comes to implementing those technologies, don’t forget to get your system integrator and vendors involved for problem solving and view plans and system designs together. Technology certainly can’t fix everything; but when implemented thoughtfully and with a solid understanding of the objectives of everyone involved, it can contribute to systems that are not only reactive but also proactive. With this in mind, I encourage you to bring questions and constructive thoughts to share during our panel discussion.

Q: Why do you attend GSX?

MC: This is an important event for the people who adopt, recommend and implement technology to come together and learn from each other on how to optimize the use and deliver on the promise of this technology for safety and security. This is my 6th time attending GSX, and it always encompasses people with a spirit to improve and collaborate.

PB: This will be my first time attending GSX. I am excited for the opportunity to share my experiences and to learn from others. We are always looking ahead to new technologies and solutions to keep our campus safe, and GSX is a great opportunity to collaborate with other professionals.

Preparing for Your Worst Day: Cyber Incident Response Planning and Simulation

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Preparing for Your Worst Day: Cyber Incident Response Planning and Simulation,” presented by F. Paul Greene, Partner and Chair of Privacy and Data Security Practice Group at Harter Secrest & Emery LLP. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?  

A: As a data security incident breach coach, I see firsthand the difficulty organizations have responding to an incident, if they haven’t developed and drilled a good, working incident response plan. I also think that security is a team sport, and all of us need to work together to stay a step ahead of the bad guys. As a result, my contribution to the team is to evangelize on the value of incident response planning and tabletop drills in the hope that we will all improve our security posture and be more prepared for the next attack.  

Q: Tell us about your presentation and why security professionals should have this topic on their radar.  

A: Two rules apply in relation to incident response preparation: first, if it isn’t in writing, it doesn’t exist, and second, if you don’t drill it, you won’t be able to do it. My presentation addresses efficient strategies for developing an incident response plan that works for your organization, rather than, for example, using a form found on some other organization’s website. (You may be surprised how many times I see organizations use “borrowed” forms that have nothing to do with the industry they are in or the data they process.) The presentation also examines how best to plan and execute a security incident tabletop exercise, which can and should be fun in the first instance. Tabletop testing is more about team building than technical security issues, and it lets you build upon the interpersonal strengths your team members already have. And lastly, we’ll simulate a few incident scenarios, to see how participants would respond. Participants should leave with a better understanding of incident response planning and tabletop testing, and a desire to run or participate in a tabletop exercise at their organizations soon. 

Q: What advice would you give security professionals interested in this topic?  

A: Don’t let anyone tell you that you don’t have a role in incident response planning. If you are in the information security department, then you are clearly a voice that should be heard in the planning process. If you are involved with physical security, you are one of the important domains most frequently forgotten, when it comes to security incident response planning and drills. We all have an important role to play in relation to incident response, and running a tabletop exercise is one of the best ways to define those roles. 

Q: How do you see this issue evolving in the next 2-5 years?  

A: A few years back, few organizations were engaging in mature incident response planning and running drills. Now, incident response planning and drills are becoming more frequent, but more can be done. It is my hope that incident response planning and tabletop exercises become much more commonplace in the next few years, and that this helps reduce the risk profile of more and more organizations. 

Q: Why do you attend GSX? 

A: This will be my fourth time attending and speaking at GSX. I find the interplay of physical and cyber security fascinating, and the discussions in my sessions, and at the conference, to be of great value to my practice and clients! 

Utilizing the New ASIS/ANSI Cannabis Security Standard to Build a Security Program Beyond Simply Compliance

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Utilizing the New ASIS/ANSI Cannabis Security Standard to Build a Security Program Beyond Simply Compliance,” presented by Tim Sutton, CPP, PSP, PCI, senior consultant at Guidepost Solutions, LLC. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?  

A: I became interested in my topic after working with clients producing content with respect to Security Management, Security Operations and Security Technology Plans for use in applications for licensure.  This work revealed the regulations and their requirements for security not only focus on security technology and do not seem to be based upon tried-and-true security standards, guidelines or even best practices that are in use by most every industry today.  Many of the regulations’ requirements are based upon outdated and misunderstood security practices and technologies and simply do not provide a sound security program for the protection of all assets through Enterprise Security Risk Management (ESRM). I not only have worked with organizations in the cannabis industry, but I have also worked within the cannabis industry as security director for two multi-state operators (MSOs) with locations across the US and have seen first-hand how the majority tend to create their security programs based solely upon regulatory compliance. This new Cannabis Security Standard not only offers the what is needed to effectively and efficiently secure different types of cannabis operations, it offers the why and how behind the principles and practices in its included 30-page annex. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar.  

A: Any security professional practicing within a cannabis organization or supplying services to a cannabis organization should have this topic on their radar as a go-to reference for setting up a strong ERSM-based security program.  The technical committee members for this standard’s development includes security leadership from multiple cannabis organizations; several security service and product providers to the industry; as well as the Compliance, Enforcement and Training Officer within the Illinois Department of Agriculture under the Division of Cannabis Regulation.  This standard is the only approved ANSI standard addressing security as a whole as opposed to security systems only such as video or alarms. 

Q: What advice would you give security professionals interested in this topic? 

A: My advice would be to read the standard and encourage its adoption by not only regulators but cannabis organizations alike.  No matter where the security professional fits within the cannabis industry, there is something in this standard that applies and can be used to validate or strengthen your practices.  

Q: How do you see this issue evolving in the next 2-5 years?  

A: In the next 2-5 years I see regulating bodies and cannabis organizations adopting the standard in its entirety or several of its provisions.  I also see regulations changing with the legal status of cannabis.  Most notably, the US is poised to reschedule cannabis to a schedule III substance. The pressure to de-schedule cannabis entirely and treat it like alcohol will continue and may eventually come to fruition.  This would mean the regulations for security, as inept and random as they are today, will no longer be around for cannabis organizations to meet for compliance and this standard will be the most informative and encompassing guide for them to follow. 

Q: Why do you attend GSX?  

A: I attend GSX for many reasons. In no particular order GSX provides me the ability to network face-to-face with not only other security practitioners but security providers and even end users. GSX also provides an excellent line-up of educational programming useful for all levels of experience from security experts from across the globe. The exhibit hall at GSX provides the opportunity to discover and learn more about so many different aspects of the security world it can be overwhelming at times.  The exhibit hall also is a great opportunity to show solutions to end users with a hands-on aspect that you just don’t get to experience on virtual product demonstrations. Presenting at GSX and staffing Community and Board booths in the ASIS HUB give me the opportunity to give back to ASIS and help spread the many benefits of ASIS International membership that has provided me with more than I deserve over my nearly 20 years of membership.

The AI Advantage: Harnessing AI for Security Risk Management

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “The AI Advantage: Harnessing AI for Security Risk Management,” presented by Andrew Sheves, founder of DCDR Risk. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?  

A: I’ve always been interested in how technology can improve our work as security risk managers. When I started in the commercial sector almost twenty years ago, I started building risk assessment templates in Excel and plan frameworks in PowerPoint and Word, with the intent of removing as much of the repetitive ‘busy work’ from the user as possible and cutting down on errors.  

I moved on to experimenting with simple applications and saw how these could make an enormous difference to our work, but the introduction of widely available services like ChatGPT 3 really opened my eyes to what might be possible. 

Incorporating these tools into the DCDR workflows has accelerated things far more than I could have imagined. I expected a 3-5x improvement, but I now have processes that would take 2-3 days manually, completed in less than 10 minutes with very little difference in quality. 

So I’m more excited than ever about the benefits we as an industry can realize from these new technologies. They have such a substantial force multiplier/accessibility benefit: it’s like having several additional team members or an extra decade or two of experience. I’m keen to see as many people as possible have access to best-in-class risk, security, and crisis tools. I think these technologies are genuine game changers. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar.  

A: AI is the next significant technology shift following web, mobile, and cloud, so there’s no escaping it. Whether you have to use the tools, are part of the buying decision, or adapt to your organization’s adoption of AI, you need to understand enough about the topic to engage effectively. Even if the ultimate decision is not to use these tools, it must still be a thoughtful informed decision. 

Even though I don’t cover this in detail, AI can significantly expand the opportunities for malicious actors and criminals to cause harm, loss, or damage, particularly with respect to the speed and scale of possible attacks. If we’re lucky, we’re on par with our adversaries but are often one step behind, so it’s imperative that we understand how they might be adapting their activities. 

But overall, this is the next major technical advancement we have to adapt to. Some of the challenges will be similar to previous technical revolutions, but with the added challenge of how quickly the field is moving. As the saying goes, ‘the best time to start planning was yesterday; the second best is today’. 

Q: What advice would you give security professionals interested in this topic?  

A: First, don’t be intimidated by the technical nature of the subject. A basic understanding of general technology and basic functionality is more than enough to allow you to participate in an informed manner. I don’t come from a deep technical background, so if I can master this, anyone can. 

Second, accept that you’ll always be a little behind on developments because things are changing so fast. There’s a lot of commentary out there, but I recommend following Professor Ethan Mollick on X / LinekdIn and listening to Nathan Whittemore’s daily AI update (YouTube: @TheAIBreakdown). They are both great at summarizing things, and they keep you up to date on big developments. Ethan Mollicks’ book ‘CoIntelligence’ is also a great read. If you want to get into the weeds, I can’t recommend ‘How AI Works From Sorcery to Science’ by Ronald T. Kneusel highly enough. 

Third, experiment and learn to love the command line. The chat interfaces are amazing, but the real ‘blow your mind’ results come from working with the models directly. That can be as simple as beefing up your prompts to get very specific behavior or writing a few simple scripts that use the API to tie a model into a platform you’re already comfortable with (integrating into Google Suite is very simple). You’ll not only improve your work, but you’ll develop a deeper understanding of the pros and cons of these models. 

Finally, remember that you’re in charge and we must have humans in the loop. You have control, whether it’s what you ask the model to do, how you design it, the data you use, or checking the output before you release it. Just as you would guide, train, and oversee a junior associate, you must put guardrails in place for these models and monitor their behavior. AI is a tool — a very powerful one — but it’s still a tool, and one that it is up to us to use responsibly. 

Q: How do you see this issue evolving in the next 2-5 years?  

A: If I’m honest, the velocity of this technology makes me wary of trying to predict just 2-5 months out…  

However, in general terms, I expect the following. 

  • AI will be a wholly integrated part of our lives, just as mobile phones are today (with a similar mix of good and bad effects). 
  • Most companies that haven’t embraced AI by 2026 will be struggling by 2029 (if they are still around). 
  • We will have had one very significant incident in which AI was a core component, either as an enabler or where one failed. 
  • The number of positive developments due to AI will significantly outpace the negative ones. 
  • We won’t have one all-powerful AGI (artificial general intelligence), but we will have several domain-specific AGIs that outperform most experts in that field. Human experts will defer to these narrow AGIs more often than not. 
  • AI will allow us to solve many of our most challenging problems, but we will still need humans with the will to implement these solutions. 
  • We’ll regularly interact with AI in a way we can’t quite comprehend yet, such as a neural link or always-on AI companion. 

Q: Why do you attend GSX?  

A: GSX is the only place to get a real sense of where the industry is heading and hear from the leading practitioners and thought leaders on the most important topics in our industry. Despite the advances we’ve made in remote work and virtual meetings, connecting in person, hearing the hallway chatter, and seeing which talks and demonstrations are drawing the crowds is essential if you really want to get a good sense of what’s going on. I haven’t been able to attend in person for a few years while I’ve been abroad, so I’m really looking forward to getting back to GSX this Fall. 

Shaping Security Preparedness: Key Takeaways for Security Professionals from the Ongoing Conflict in Ukraine

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Shaping Security Preparedness: Key Takeaways for Security Professionals from the Ongoing Conflict in Ukraine,” presented by Viktor Panchak, Security Director and Partner at International SOS, Mykola Mikheiev, CPP, PSP, PCI, Security Operation Center Officer at European Union Advisory Mission, John Rendeiro, Vice President of Global Security and Intelligence at International SOS, and Tom Callahan, Senior Security Advisor at CRDF Global. Read on for what they had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?  

VP: I am Ukrainian, and as millions of my fellow countrymen the first thing I heard at 4:30 AM on 02/24/2022 was a massive rocket attack with bomb blasts in Kyiv outskirts. The Russia/Ukraine war is undoubtedly the most serious geopolitical crisis in Eastern Europe since the end of the Cold War. It is an existential threat for Ukraine, but its impacts go well beyond the immediate devastation that it’s causing, particularly with regard to the security landscape.  

As security professionals, we must be forward-looking and share lessons learned with our colleagues globally. That was the key indicator that I started thinking about pulling together this topic. With subject matter expertise “from the ground”, our education session at GSX will explore the key takeaways from the war that security professionals should consider while shaping their security operations procedures. The aim is to identify the main drivers that impact business and explore the most efficient instruments and methods for mitigating risks while getting prepared for the worst. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar.  

MM: The current conflict in Ukraine is the most significant war on the European continent since WWII. Moreover, there is clearly a conflict of values between the smaller young democratic state that admires Western values and the authoritarian regime, excessing Cold War proxy power coercion. 

Many Western companies have been working in Ukraine before. Yet during the two and half years of the conflict, Western companies in Ukraine learned a lot about the new relay of how to maintain the business, how to apply the duty of care about their ex-pats and local personnel, how to be resilient, and how to plan the business continuity. If your company operates globally or you are in the Asian markets, you can learn much from Ukraine’s resilience because China is watching the Russian steps and could soon mimic it in Taiwan or the South China Sea. As the saying goes, failure to prepare is equal to preparing to fail. By attending this session, security professionals can take away the suggestions from the firsthand professionals involved in business resilience planning affected by the Ukraine conflict and adapt them to their prospective businesses. 

Q: What advice would you give security professionals interested in this topic? 

JR: First of all, I’d advise reading up on an overview of Ukrainian history, inevitably concentrating on Ukraine’s historic relations with Russia. After examining the more or less ancient history, including the establishment of the Kiev Rus and subsequent events, I’d concentrate on twentieth and twenty-first century developments, including the Bolshevik revolution and its aftermath, World War Two, the post-war trajectory of the Soviet Union and its collapse. Then a detailed study of the past twenty years and Russian incursions into Georgia, Crimea and Ukraine would be in order. It’s simply impossible to even begin to understand what’s going on now in Ukraine and Russia without this historical foundation. In addition, exploring the particular security challenges facing those doing business or just traveling in Ukraine and Russia would be a requirement for a security professional interested in that region. Finally, I’d advise participating in webinars and other events dealing with Ukraine, for a current view of events. 

Q: How do you see this issue evolving in the next 2-5 years?  

TC: From a narrow perspective, companies and organizations in the region are considering more seriously what they would do if faced with a similar situation. A Russian invasion of Ukraine was considered unthinkable by many, even up to the point where tanks were massed along the border. The unthinkable became real, and other countries – Poland, the Baltics, Moldova – are reassessing the scope of their preparations. The key is how resilient do you need to be to achieve the purposes of your company or organization, including your sense of responsibility for employees, and what tools, equipment, procedures, and assets do you need to enhance that resilience. Companies and organizations in Ukraine that got back on track quickly after the full-scale invasion had built in layers of resilience. They adjusted to personnel relocating and working remotely, ensured that their critical data was held in the cloud and not solely in local servers, compensated employees with flexible, emergency grants or loans, and used simple channels to keep track of where people were and what they were facing – Telegram, WhatsApp, Signal as well as Facebook and regular email. Some organizations like ours had a designated location in a city outside the country (or far to the west) that became a rallying point, way station, or permanent relocation. We also had local experts on call for extraction assistance if needed. 

From a broader perspective, the effects are enormous. An entire generation of Ukrainians will grow up with this event a defining in their lives. Fathers and brothers entering the service, mothers and children relocating to other parts of the country or outside the country, school districts chosen based on how good a bomb shelter they have. Ukraine will be even more Europe-oriented, more multilingual, and more mobile in a post conflict, reconstruction era. For decades to come, people running for office in Ukraine will need to answer the question about what they did during the war.  

Q: Why do you attend GSX?  

VP: Global Security Exchange is the world’s most comprehensive event for security professionals globally. Attending GSX ensures you never fall behind, stay informed, connected, and prepared for what’s next in the world of professional security. My Top-5 reasons to attend GSX: 

  1. Keep up to speed in expanding your professional knowledge.
  2. Experience dynamic learning opportunities via substantial education sessions. 
  3. Upgrade your professional network through interacting with your peers.  
  4. Learn about innovative security technology products and solutions.  
  5. Celebrate our profession and achievements and have some well-deserved fun. 

Data Protection, Privacy, and Transparency

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Data Protection, Privacy, and Transparency,” presented by Joseph Kabosa Maina, Security Risk Controller at Lady Askari. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?

A: I became interested in the topic since we have experienced instances in which most people, when accessing different online apps and services, don’t read or try to understand the privacy policy of usage. With this knowledge, most people have lost court cases since negligence was found on their side. Most online users give authority of data exposure as a sign-up requirement, hence leading to hackers accessing crucial information that should be confidential through malicious website links. That led to exposing crucial information to their immediate people or associates. So, sensitizing the need to uphold data privacy, transparency, and protection became my interest.

Q: Tell us about your presentation and why security professionals should have this topic on their radar.

A: My presentation will be brief and well-detailed to help every professional to be conversant with data protection in their different fields of expertise. Security professionals need the topic on their radar so that they can have documents of individuals’ clear consent to the processing of customers’ data to avoid legal encounters on any breaches experienced during transactions. It also makes easier access for the data subject to his or her data. In case of project closure, the right to rectification, to erasure, and ‘to be forgotten’ for data safety purposes, and lastly to consent the right to object, including to the use of personal data for ‘profiling’ or the right to data portability from one service provider to another

Q: What advice would you give security professionals interested in this topic?

A: The best advice I would give is to stay informed since regulations evolve, regularly update your knowledge through courses, seminars, and workshops, familiarizing oneself with major data protection regulations like GDPR, CCPA, HIPAA, and others relevant to the security industry and region. Developing technical expertise to allow information access of data to authorized parties only. These applications would promote a culture of privacy while enhancing transparency and help implement strong security measures. With all these security professionals can build robust data privacy and protection frameworks, fostering transparency to face digital age challenges revamped. engaging in ethical practices becomes easy.

Q: How do you see this issue evolving in the next 2-5 years?

A: The next three years are poised to see significant advancements in privacy and data protection, driven by technological innovation, evolving regulations, and increased public awareness. Individuals will gain more control over their personal information, businesses will adopt more responsible data-handling practices, and workplace data compliance will become more robust and standardized. These developments will collectively contribute to a more secure and privacy-conscious digital environment

Q: Why do you attend GSX?

A: The great opportunity to attend Global Security Exchange provides me with the knowledge, skills, and connections necessary to excel in security and stay at the forefront of the rapidly evolving security field.

Crafting Your Path to Success: The Power of Branding & Reputational Management

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Crafting Your Path to Success: The Power of Branding & Reputational Management,” presented by Allison Sands, CPP, VP Corporate Security and Resilience at Gilead Sciences, Brittany Galli, CEO at BFG Ventures, Elizabeth Moslander, CPP, Security Consultant at ELM-LTD, and Natasha Ryan, VP Communications at The North Group. Read on for what they had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?

AS: Each of us has a personal brand, whether we intentionally create one or not. My interest in personal branding stems from a desire to be proactive in strategically positioning myself for career success while still being my authentic self. The security industry can seem homogeneous, and early in my career, I felt pressure to conform to a “typical” security persona. However, with time and many missteps, I recognized the importance honoring and amplifying my values, expertise, and unique attributes. While it made it harder to “fit in” at first, I realized that building a strong personal brand that aligned with my values would help me build a network of meaningful connections. Moreover, I became fascinated by how a well-crafted brand could differentiate individuals in a competitive landscape by helping them stand out and attract new opportunities. 

Q: Tell us about your presentation and why security professionals should have this topic on their radar.  

BG: It’s more valuable now than ever to build a strong and valuable reputation. Branding yourself locally and globally is a must in this workforce revolution and our panel aims to give leaders the tools to thrive reputationally in the security industry. 

Q: What advice would you give security professionals interested in this topic? 

EM: In today’s digital age, where information travels rapidly and perceptions can be formed in an instant, mastering the art of branding and reputational management is more critical than ever. It requires self-awareness, consistency, and a commitment to presenting yourself or your brand in the best possible light, both online and offline. Authenticity helps build credibility and trust with your audience. People are more likely to engage with and trust individuals and brands that have a positive and reputable online presence. By proactively managing your online reputation, it helps mitigate the risk of negative publicity or reputational damage.  

Q: How do you see this issue evolving in the next 2-5 years? 

NR: We live in a culture where accountability is now paramount. A company’s reputation is everything, and if there is one hint of a lack of transparency during a crisis, that company risks being abruptly canceled. It comes down to authenticity and owning one’s part in a crisis or scandal. I don’t see the standards lessening over the next 2-5 years. In fact, I see branding for companies getting more relatable, more than just business, letting clients see behind the curtain. Who a company is, its values, and its mission will matter more in 5 years than they do now. That reputation and branding will be pivotal in how a company can come back from a crisis.  

Q: Why do you attend GSX? 

BG: I attend GSX for industry networking and the executive learning content education sessions. It’s an international conference that helps build a valuable and irreplaceable professional network. 

Workplace Violence Prevention: Best Practices for Threat Assessment and Management in Corporate Environment

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Workplace Violence Prevention: Best Practices for Threat Assessment and Management in Corporate Environment,” presented by Michael Rozin, President at Rozin Security Consulting LLC, and Zachary Hill, Threat Assessment and Management Manager at Kroger. Read on for what they had to say and don’t forget to register for GSX 2024!

MR: How did you become interested in your topic?

MR: As a team, we at Rozin Security and Rozin Technologies have always been deeply committed to preventing acts of targeted violence. This commitment is why I chose this field and why our companies were founded. Over the last eight years, we have increasingly been called upon to support our clients in cases involving threats of targeted violence. This growing need has driven me to learn more about this discipline. I have been fortunate to have the consistent opportunity to apply these learned methods in real-world environments while working with our clients. This hands-on experience has been invaluable in refining my knowledge and approach to preventing workplace targeted violence. By sharing my insights and experiences, I hope to contribute to the ongoing conversation within the professional security community and help corporations better protect their employees and assets from the threat of targeted violence.

Q: Tell us about your presentation and why security professionals should have this topic on their radar.

ZH: We will dive into understanding the issues corporate security professionals face, balancing their understanding of security and the domain of Behavioral Threat Assessment and Management (BTAM). While there is overlap between the two domains; BTAM has a distinct mission steeped in psychology focusing on prevention. This presentation is a must for those managing a BTAM team or investigating workplace violence cases as one of their many responsibilities. We will give you the tools to better communicate with your stakeholders, how to investigate these cases better, and ultimately prevent instances of targeted violence.

Q: What advice would you give security professionals interested in this topic?

MR: Workplace violence prevention programs have become an absolute necessity for organizations in today’s world. I believe as security professionals, it is our responsibility to develop an understanding of this critical field and adhere to established best practices. To achieve this, I recommend engaging with professional organizations such as the Association of Threat Assessment Professionals (ATAP) and ASIS International. These organizations provide invaluable access to knowledge, training, and resources that can greatly enhance your expertise in workplace violence prevention.

In addition to leveraging these professional resources, I strongly advise security professionals to seek out quality information and stay up to date with the latest laws and regulations related to workplace violence prevention. Understanding the legal landscape is crucial for developing and implementing effective prevention programs that comply with local, state, and federal requirements.  

Another key piece of advice is to approach workplace violence prevention from a holistic and interdisciplinary perspective. Collaborate with professionals from various fields, such as human resources, legal, and mental health, to develop comprehensive strategies that address the multifaceted nature of targeted violence.

Q: How do you see this issue evolving in the next 2-5 years?

ZH: BTAM has been used for years to protect elected officials and public figures, but really got a broader application after Columbine and with each successive incident from Sandy Hook to Santa Fe to Parkland, all sparking legislative mandates.

Q: Why do you attend GSX?

MR: Attending GSX has proven invaluable for my professional development as a security professional. GSX provides an unparalleled opportunity to learn about the latest solutions on the market, trends, challenges, and best practices in the security industry. Moreover, GSX provides an excellent platform for networking with peers and industry leaders. Through these interactions, I have forged valuable connections and collaborations that have contributed significantly to my professional growth and the success of Rozin Security and Rozin Technologies.

ZH: I attend GSX for the personal and professional growth opportunities that come from the wide array of talent security professionals that are a part of ASIS. I am grateful for this community as we will work towards preventing violence and securing our communities.

Career Mapping: Plan Your Post-Military Journey 

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Career Mapping: Plan Your Post-Military Journey,” presented by Michael Reiner, CPP, Assistant Vice President of Public Safety at Creighton University, who will interview two former military leaders in his session. Read on for what he had to say and don’t forget to register for GSX 2024!

Q: How did you become interested in your topic?  

A: I retired from the US Air Force over 7 years ago and transitioned directly into a senior security role, leading the Department of Public Safety at Creighton University in Omaha, Nebraska. I have also served on the Military and Veterans Community (MVC) Steering Group, both before and after my military retirement. What I observed is that too many service members have vague objectives for their post-military life and lack realistic expectations about the civilian job market. I spoke on this topic at GSX in Chicago in 2019 and again last year in Dallas—my hope is that by continuing to provide relevant content, the MVC can better prepare veterans for success at all stages of their professional careers! 

Q: Tell us about your presentation and why security professionals should have this topic on their radar.  

A: Our session is presented by the Military and Veterans Community (MVC), a group of ASIS members who are either currently serving or have served in the armed forces of their nation. We will present on Military and Law Enforcement Appreciation Day, Sept. 25, on the Career Center stage. Two former military leaders will discuss the key takeaways from their transitions to the civilian security sector. While we can’t possibly cover everything veterans need to know in a 20-minute session, we hope to spur veterans to start thinking about their career objectives and to connect them to people who can assist them in building the professional future they desire. 

Q: What advice would you give security professionals interested in this topic?  

A: Start early and ask lots of questions! If you are within your final year of military service and haven’t started your transition plan, you’ve put yourself at a disadvantage. Whether you serve for 4 years or 30 years, you have some tough decisions to make that shouldn’t be rushed. What are your priorities for the next chapter of your life—location, salary, type of work, industry sector, work/life balance, or something else? Come to our session to hear our thoughts on how to collect the information you need to make informed decisions that will meet your objectives.  

Q: How do you see this issue evolving in the next 2-5 years?  

A: Traditionally, presentations about transitioning from the military to the civilian sector focused on senior military officers and noncommissioned officers retiring from security or law enforcement roles with lifelong benefits and transitioning into senior security roles as civilians. I foresee a greater need to educate service members who are separating from the military earlier in their professional careers, often without retirement benefits. Our session will feature an officer from the US Navy who was not in a security role while serving in uniform and who did not serve over 20 years. Her story is compelling and will resonate with many young veterans. As the Military and Veterans Community, we want to inform and support all our fellow service members, not only during their transitions to the civilian sector, but also before and after they take off their military uniforms. 

Q: Why do you attend GSX?  

A: Networking in person! While the breakout sessions certainly provide outstanding educational opportunities, I can learn just as easily on a webinar. What I can’t get online are those face-to-face discussions with security professionals and leading vendors from around the globe who are wrestling with the same challenges we all address in our profession. I can trace specific steps in my own career progression to my attendance at GSX last year. See you in Orlando! 

What’s Next: From Black Swans to Unknown Knowns

Each year, ASIS highlights one Game Changer session each day. These sessions feature high-level content and are designed to explore trends that will shape the future of the security industry. 

This year, the three Game Changer sessions are themed around Black Swan risks and unknown knowns. Security professionals evaluate risk through many lenses. What keeps them up at night are the Black Swan risks that come seemingly out of the blue and are only understood with the luxury of time and hindsight.  

However, some issues are well known but seem only tangentially related to security. These “unknown knowns” are well-documented, but their effect on security seems remote. Understanding the impact of these events playing out on the world stage—including resilience in the face of disaster, global conflict, and climate change—can make all the difference between an adequate security program and an extraordinary one. 

In Monday’s session, “Knocked Down, Not Knocked Out: Building Organizational Resilience,” Maribeth Anderson and Ralph Miles, CPP, will highlight the cruciality of building an organization that is resilient not only by bouncing back from challenges and crisis situations, but also in developing the capacity to change and adapt in the face of adversity. In this session, attendees will learn to enable organizational agility and set the tone for resilience within the security function, outline the critical preparedness steps that lead to greater resilience, and analyze how organizations have applied resilience principles in real-life situations. 

In “Do You Trust Me? How to Thrive in a Mistrustful Era” on Tuesday, Diana Concannon, PCI, will discuss how global conflict continues to affect the workplace directly as political and ideological divides lead to mistrust among colleagues and teams and how security professionals can mitigate damage from these schisms. Attendees will examine how mistrust can threaten security efforts, explore current challenges and how they are amplified by technology, and recognize the role human nature can play in combatting future mistrust. 

In the final Game Changer, “When Chaos Reigns: The Critical Role of Security in Global Crises,” Larry Fitzgerald, CPP, PSP, Nicole Persaud, Rawlings Miller, and Tracey Durner will focus on using an Environmental, Social, and Corporate Governance (ESG) lens for risk assessment while in a disastrous environment, like war, famine, natural disaster, or civil and social unrest. In this session, attendees will appraise how responding to crises can affect a company’s reputation, discuss ESG concepts to resonate with all stakeholders, and prepare security stakeholders/teams to think strategically around ESG and reputational issues. 

Learn more about these Game Changers and all GSX education here.

New in Orlando

ASIS International is excited to bring Global Security Exchange back to Orlando in 2024! Sunny Orlando is always a great destination, but in 2024 the city has welcomed even more interesting and fun dining and entertainment. 

New entertainment and dining near the convention center includes Arcade Monsters, a video game bar and restaurant, and Chuck Lager America’s Tavern, with food prepared by Top Chef alumnus Fabio Viviani and known for its craft bourbons. Pointe Orlando, dubbed a playground for adults with or without kids, will debut three new entertainment spaces: Sports & Social, a place to watch and play games such as Skee-Ball and Foosball; a PBR Cowboy Bar, featuring a mechanical bull and multiple bars; and Live! Plaza, a space for special events, live music, viewing sporting events, festivals and more. 

In downtown Orlando, Natsu Omakase recently opened, featuring an exclusive 10-seat sushi omakase concept with an innovative and seasonal menu. Also new to downtown is Judson’s Live in the Dr. Phillips Center for the Performing Arts. This 150-seat, cabaret-style music space hosts 50-minute music performances for guests to enjoy alongside specialty cocktails and a seasonal scratch-kitchen menu of shareable bites. 

Orlando’s famed theme parks will also be welcoming new attractions in 2024. Walt Disney World Resort opened Journey of Water, Inspired by Moana at the end of 2023 in Epcot, and will be welcoming guests to Tiana’s Bayou Adventure, which is replacing Splash Mountain, this summer. Two new restaurants have also opened in Disney Springs: Summer House on the Lake, a lakeside eatery with California-inspired cuisine, and eet by Maneet Chauhan, the first Indian-inspired restaurant in Disney Springs. 

Universal Studios Florida will debut DreamWorks Land in June 2024, which will feature the opportunity to meet characters from DreamWorks classics like “Shrek,” “Kung Fu Panda,” and “Trolls.” The new space will also feature the family-friendly Trolls Trollercoaster. 

In 2024, SeaWorld Orlando plans to introduce Penguin Trek, a family launch coaster that will take guests through an Antarctic landscape on snowmobile-inspired cars before ending up in the park’s penguin habitat. 

These exciting new attractions and dining options come in addition to the many entertainment and restaurant options that already make Orlando a vibrant and inviting destination. The only question now is how to fit all these great opportunities in with your GSX experience!