BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Demystifying Artificial Intelligence for Security Professionals: How to Distinguish Real Value from Hype 

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Demystifying Artificial Intelligence for Security Professionals: How to Distinguish Real Value from Hype” presented by Dean Drako, CEO and Founder at Eagle Eye Networks, and Navanee Sundaramoorthy, Director of AI Products at Eagle Eye Networks. We spoke with Dean Drako about his session – read on for what he had to say and don’t forget to register for GSX 2023!

Q: How did you become interested in your topic? 

DD: I have always been interested in solving problems. In fact, that’s been the impetus behind all of the companies I’ve founded, including Barracuda Networks and Eagle Eye Networks. I founded Eagle Eye Networks because I had a problem finding a video surveillance system that I could use to safeguard Barracuda Networks offices around the world. I wanted a cybersecure system that could be centrally managed, and that was non-proprietary (i.e. it could work with new or existing security cameras from any manufacturer). All of the business systems at Barracuda had been converted to cloud, so I assumed I could find a cloud video surveillance system that would offer all the benefits of cloud. This was ten years ago, and such a system did not exist. I figured that I was not the only business owner with this problem. That’s why I founded Eagle Eye Networks.  

I’ve been following AI developments over the past several years. It’s probably important to mention that although Eagle Eye Networks is a video management system, we are a true cloud provider, delivering an open system that integrates with an unlimited number of tech partners. The open API allows integrations that expand the power of the video management system and address the unique problems of enterprise businesses around the world. There are many useful and specialized technologies in the security industry, and I’ve followed them all, but AI is a true game changer. It is already starting to solve long-standing, historical problems in the security industry–namely with smart search and smart alarms, but that’s just the beginning. 

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

DD: Security professionals’ jobs are going to change as a result of AI technology. The product that integrators sell, and that security practitioners use is going to morph from a Video Management System to an AI Security System. In the future, no one is going to be staring at a wall of monitors watching video. That is going away. This is a positive development for all involved, but this is a session for security professionals who want to understand where we are today with AI and to plan for the future. It’s designed to help them easily navigate the AI jargon, and to understand what the technology is and how it works. 

Behavior Threat Detection & Assessment: The Demystified Proactive Approach to Security

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Behavior Threat Detection & Assessment: The Demystified Proactive Approach to Security” presented by Michael Rozin, President at Rozin Security Consulting LLC. Read on for what he had to say and don’t forget to register for GSX 2023!

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

A: My presentation focuses on Behavior Threat Detection, a practical and proven method for preventing mass violence, sabotage, and other harmful acts.  

Too often, security operations are reactive, often tailing the threat actor. In an era where security challenges are proliferating, traditional measures and reactive tactics are often unacceptable. This is where Behavior Threat Detection comes into play. It’s an approach that emphasizes the proactive identification and assessment of individuals with malicious intent in real-world environments.  

During the presentation, I will provide a comprehensive overview of how this approach functions, illustrate examples of its successful implementation, and demonstrate how it can be seamlessly integrated with current security operations to get one step ahead of the aggressor and create a safer environment. 

Q: What advice you would give security professionals interested in this topic?  

A: For those interested in Behavior Threat Detection, it’s vital to comprehend that two principal components typically underpin any malicious activity: firstly, an individual harboring malicious intent, and secondly, the means or weaponry to execute the intended act. Behavior Threat Detection serves as a potent system in preemptively identifying individuals intending to cause harm, deterring them from these activities, and intervening before the malicious activity can be carried out.  These methods have been rigorously field-tested and have evolved significantly over the past four decades. 

From augmenting security patrols and checkpoints to bolstering applicant screening, employees’ security awareness, and workplace violence prevention, an increasing number of organizations are making Behavior Threat Detection a cornerstone of their security strategy. This approach stands out as one of the few genuinely proactive and empirically validated measures available today. 

Nonetheless, it’s important to recognize that Behavior Threat Detection operates most effectively as an element of a broader, holistic security strategy. Professionals should stay current with advancements in the field as new threat patterns and best practices emerge regularly. Furthermore, fostering robust relationships with your workforce, business partners, and surrounding communities can significantly enhance this proactive approach to security. 

Q: How do you see this issue evolving in the next 2-5 years? 

A: In the forthcoming years, I foresee Behavior Threat Detection evolving into an increasingly indispensable facet of security operations. Technological advancements are set to create more sophisticated capabilities, enabling quicker and more precise detection of potential threats and identification of evolving plans to execute malicious activities. 

However, there will also be challenges, such as the need for rigorous staff training, legally compliant and refined protocols, and policies governing the utilization of Behavior Threat Detection methods.  

Given these complexities, professionals certified and experienced in Behavior Threat Detection will undoubtedly become highly sought-after commodities in the security job market. This demand reflects the significant role such individuals play in an increasingly specialized field. As threats to physical security become more intricate, our detection and prevention methodologies must adapt accordingly. This domain will continue to improve and innovate.  

Q: Why do you attend GSX? 

A: For me, GSX is an invaluable opportunity to connect with other security professionals from around the world. It provides an excellent platform to learn about the latest developments in the security field, share insights, and contribute to the evolving dialogue on global security challenges.  

It’s a chance for me to share my research and experiences and learn from a diverse group of experts. By attending GSX, I can stay updated on the latest threat trends, security solutions, and strategies, ensuring I am well-equipped to respond to the rapidly changing landscape of security threats. 

Partnerships That Work: Retail & Law Enforcement Become Allies in the War Against ORC

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Partnerships That Work: Retail & Law Enforcement Become Allies in the War Against ORC” presented by Joseph Courtesis, Inspector at Jcour-Consulting LLC (3SI Securities), and Michelle Anderson-Silva, Senior Manager, Investigative Systems & Tools, at Gap, Inc. Read on for what they had to say and don’t forget to register for GSX 2023!

Q: How did you become interested in your topic? 

JC: As a member of the NYC police department ORC was a major issue. However, apprehending the perpetrators and prosecuting them to the full extent of the law is difficult. In fact, it is impossible if retail and law enforcement do not work together. The suspects often times run into the establishment (sometimes masked) and take large quantities of merchandise. They typically load it into a vehicle a flee the scene quickly. By the time law enforcement responds to the location the suspects are long gone. In addition, the lack of a detailed description of the suspects and an accurate description of the property stolen make it even more difficult to apprehend the suspects. 

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

JC: Our presentation will discuss some of the technology law enforcement is using in cooperation with retail establishments. I will discuss shared success stories that include apprehensions and the recovery of stolen merchandise. 

Q: What advice you would give security professionals interested in this topic? 

MA: Remain curious, find ways to be engaged and be the partner you want on the other end. We know that battling ORC will not be successful if done in a silo; therefore, it takes everyone doing their part and rolling up their sleeves to support one another. If the bad actors are on the same team, we have to be too. 

Q: How do you see this issue evolving in the next 2-5 years? 

MA: Time will tell, but I believe how legislation evolves will have an influence. 

Social Engineering—The Risks to Our Companies and Employees 

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Social Engineering—The Risks to Our Companies and Employees” presented by Carlos Veiga, Head of Strategy and Operations – Risk Advisory & Consulting Services (RACS) at G4S / Allied Universal. Read on for what he had to say and don’t forget to register for GSX 2023!

Q: Tell us about your presentation and why should security professionals have this topic on their radar.

A: This presentation has the intent to share some initial information around the Social Engineering topic and its impacts, sparking the interest of the public on the topic. In today’s world, social engineering is recognized as one of the most effective ways to obtain information and break through a defense’s walls. It is so effective because technical defenses (like firewalls and overall software security) have become substantially better at protecting against outside entities. The same can’t be said for humans, who are often referred to as the “weakest link in your security posture.” 

Q: What advice would you give security professionals interested in this topic?  

A: Research. There is a lot of good literature around this topic that will help you understand the basics of Social Engineering and how those risks are materialized in the current world. 

Q: How do you see this issue evolving in the next 2-5 years? 

A: As the AI tools will be even more evolved in the near future, perpetrators will liaise on those tools to enhance and sophisticate their social engineering attacks (AI intel, deepfake videos, voice cloning, automated learning, etc). So, the future will be even more challenging in what concerns Social Engineering risks and AI. 

Q: Why do you attend GSX?  

A: It’s a world class renowned event with top security professionals that enables and facilitates the exchange of knowledge within the security community. Also, it’s important to keep up with the industry updates and recent product launches. 

The Growing Threat of Alt-Social: Hacking the System to Stay Ahead of Virality 

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “The Growing Threat of Alt-Social: Hacking the System to Stay Ahead of Virality” presented by Rebecca Jones, COO & Co-Founder at Pyrra Technologies Inc., and Welton Chang, CEO and Co-Founder at Pyrra Technologies Inc. Read on for what they had to say and don’t forget to register for GSX 2023

Q: How did you become interested in your topic? 

RJ: I’ve always been fascinated by the role of disinformation – propaganda – how it’s used to convince, rally and justify.  The serious damage it can do. As humans we have taken this to the next level with social media, and we have really seen it escalate in the US following the election (and electoral loss) of President Trump. That’s when I really started to take interest in how alternative social media is being used as a weapon against individuals, minority groups, companies and even governments.  

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

RJ: When it comes to the risks and dangers of alt-social we find that the security, risk and intelligence professionals who are all over it, are the ones who have already taken serious hits. Their principals, their companies have already been victims of malicious disinformation and reputation damage, victims of doxxing, victims of physical violence, victims of hate speech.   But many in the field are still learning.  Maybe they have heard of a couple of high profile examples, maybe they have heard of Telegram and 4Chan…but they don’t yet know what threats they should really be monitoring for, and how to stay ahead of them when they emerge.   Our presentation will help with that. 

Q: What advice you would give security professionals interested in this topic? 

WC: Unmoderated social media is a rapidly evolving ecosystem fed by disinformation, controversy, anger and hate. There is a site for everything: conspiracies, antisemitism, racism, targeting of lgbtqi+ people, hatred of women… the list goes on.  Security professionals cannot be expected to keep up to date with the evolution of this ecosystem, nor can they realistically collect and respond to these threats the way they have always done – we need to evolve even faster than the ecosystem to stay ahead of the threats. This session will help you to better understand the threat landscape, how you can better respond and arm you with information to educate executives as to why this is a problem now. 

Q: How do you see this issue evolving in the next 2-5 years? 

WC: Over the next 5 years, we expect this ecosystem to grow to an unmanageable size and the users of this ecosystem to become increasingly more tech-savvy, deploying all the tools in their arsenal to cause serious harm.  We expect an exponential number of businesses and their executives to fall victim to malicious disinformation campaigns resulting in significant reputational damage, financial losses and even physical harm. This problem is about to reach a tipping point – and within the next few years, companies will be viewing the threat of disinformation the same way they view cyber threats. 

Why Not Security Robots? The Security Industry’s Reticent Attitude for Adoption of Proven Technology

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Why Not Security Robots? The Security Industry’s Reticent Attitude for Adoption of Proven Technology” presented by Samuel Vinicur, CPP, Director of Client Development at Knightscope, Inc. Read on for what he had to say and don’t forget to register for GSX 2023

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

A: Why Not Security Robots? This presentation covers robotics acceptance trends in other industries and gets to the root of the Security Industries reticence to adopt. Shedding some light on what’s not talked about, revenues, out in the open. Autonomous Security Robots are being deployed and operating globally, why is the US behind the trend? Social human resource trends are driving adoption as well, we need to train for robotics interfacing now.  

Q: What advice you would give security professionals interested in this topic? 

A: Follow the few manufacturers in the game now. Research what other industries are doing and why. What other countries are doing and why. Start looking at upskilling your LE and Security guard force to accept and work with robotics in the security space.  

Q: How do you see this issue evolving in the next 2-5 years? 

A: Security Robots should be mainstream in 2-5 years. Adoption and next generation Ai and robotics will come to light. Security Integrators will grab significant market share of guarding revenue.  

Q: Why do you attend GSX? 

A: I attend GSX for the latest technology and education the security industry has to offer. The face-to-face networking is fantastic. The CEUs to keep my CPP certification current don’t hurt either. 

Active Shooter Preparedness and Mitigation— Have You Done Enough?

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Active Shooter Preparedness and Mitigation— Have You Done Enough?” presented by Kevin Davis, CPP, Assistant Director of Public Safety at Harding University Public Safety. Read on for what he had to say and don’t forget to register for GSX 2023!

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

A: As all security professionals know, active shooter situations have become all too common. While the chances of an active shooter situation occurring at your place of business, no matter the industry, are relatively small, security professionals must be prepared if an incident were to occur at their place of business. My presentation covers all aspects of active shooter mitigation. I will cover threat assessment teams, physical security posture, active shooter preparedness training for both armed and unarmed personnel, communications, conducting drills and exercises, and lessons learned from active shooter incidents.  

Q: What advice would you give security professionals interested in this topic? 

A: Take a holistic approach when conducting an assessment of your security strategy to mitigate an active shooter threat. Do your research when it comes to investing in physical security measures for your facilities. Talk to other security professionals about best practices for active shooter mitigation. 

Q: How do you see this issue evolving in the next 2-5 years? 

A: Unfortunately, I believe that the number of active shooter incidents will continue to grow over the next 2-5 years. People are still experiencing social isolation post-pandemic. Social media and news outlets continue to give notariety to those who perpetrate violence against others. Discourse and division continue to polarize our population.  All of these factors combine to create an atmosphere where active shooter incidents will continue to increase. 

Q: Why do you attend GSX? 

A: I attend GSX to spend time interacting with my peers, to learn from worldwide security experts, and to stay current on the latest trends and best practices. 

Sabotage and Critical Infrastructure

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Sabotage and Critical Infrastructure,” presented by Dyrk Greenhalgh, PSP, Vulnerability Assessment Analyst at UCOR LLC, Karl Perman, CEO at CIP CORPS, Nick Weber, CPP, PSP, PCI, Managing Partner at Archer International, and Scot Walker, PCI, Principal at Walker & Associates. Read on for what they had to say and don’t forget to register for GSX 2023!

Q: How did you become interested in your topic? 

SW: I first became interested in the topic of protecting critical infrastructure from sabotage and attack when I worked for the Department of Energy on their Special Response Team, where we protected special nuclear material, and after 9/11 as a criminal investigator on the Joint Terrorism Task Force in Los Angeles, where we investigated pre-operational surveillance and suspected attacks on critical infrastructure.  

In my experience, the preservation of critical infrastructure is essential for national security, public safety, economic stability, social order, and cybersecurity. Protecting and securing these systems is crucial for the well-being and prosperity of a nation and its citizens.  

In a global sense, this is the first time in modern history that two superpowers like China and Russia have been decoupled from the global economy, making many countries’ critical infrastructure vulnerable to attack. Couple that with shrinking participation by law enforcement in securing critical infrastructure, and we have a recipe for a global disaster. Which is why protecting critical infrastructure from attack and sabotage is a vital challenge for the global security industry to solve in the decade of crisis, the 2020s. 

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

KP: Energy critical infrastructure is vital to the generation, transmission, distribution, and use of energy. These systems and assets are essential for the functioning of modern societies and economies and protecting them from damage is critical to ensure their continued operation. This session will feature subject matter experts from three ASIS International Communities; Investigations, Critical Infrastructure and Physical Security. These SMEs will provide insights into risks and mitigations related to sabotage of critical infrastructure.  

Security professionals should be concerned with this topic in order to understand the various types of threats to critical infrastructure, including physical attacks, cyber-attacks, natural disasters, and equipment failures as well as protective measures to mitigate these threats. 

Q: What advice would you give security professionals interested in this topic? 

NW: My advice to security professionals is to understand what they are charged with protecting and how it functions. Without that base of knowledge, it’s impossible to accurately determine risk and apply appropriate controls. 

Q: How do you see this issue evolving in the next 2-5 years? 

DG: Data from the Office of Cybersecurity, Energy Security, and Emergency Response clearly shows a distinct, upward trend in the number and severity of intentional attacks against critical infrastructure. With additional publicity from attempted and successful attacks–much like copycat attacks for active shooters–those looking to sabotage power infrastructure know several facts: 1) Critical infrastructure is everywhere. 2) Critical infrastructure does not have a large physical security footprint. 3) Critical infrastructure is easy to affect (e.g., vehicles, tools, firearms; ingenuity is not required). 4) Saboteurs may choose the time and place of the attack without a large chance of discovery, and; 5) The results of utility disruptions can be large, long-lasting, costly, and highly publicized.   

It is likely that major disruptions to critical infrastructure will become a domestic violent extremists’ method of choice for bringing publicity to their particular ideology. For example, cases of vandalism, physical attacks, and suspicious activity were nearly double in 2022 than what they were in 2020. The number of attacks for 2023 is higher than it was this time last year. For the purposes of foreseeing the potential future of infrastructure attacks, imagine coupling the remote capabilities of nefarious cyber actors with physical characteristics of using kinetic weapons and it doesn’t take a Hollywood script to see that holding a town’s critical infrastructure hostage is not outside the realm of possibility. We’re certainly not there yet, but there are no limitations to the creativity of a committed adversary. Security professionals and policy makers will need to work together to fund, train, and deploy novel approaches to disrupt attempted attacks, and mitigate those that are successful. 

Past, Present, and Future of Robots & Drones for Physical Security

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Past, Present, and Future of Robots & Drones for Physical Security,” presented by Travis Deyle, CEO at Cobalt Robotics. Read on for what he had to say and don’t forget to register for GSX 2023!

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

A: The history of robotics & automation harkens back to military conflict – from automated weapons systems, operational efficiencies, and remote command & control infrastructure. While the physical devices are the tangible “tip of the spear,” the real force multiplier is the software that coordinates & manages these systems to automate key workflows – and those same innovations are now a potent tool for civilian security programs as well. 

In this talk, we’ll look at the past, present, and future of mobile robots for safety & security applications. We’ll talk about the technology and operational considerations driving today’s adoption, use cases & deployment models, and near-term technology inflections such as manipulation (e.g., to address doors & elevators) and robust outdoor campus-area networks (e.g., 5G and satellite internet connectivity) that will further accelerate their adoption. Finally, we will take a look at automation in other areas of shared services (janitorial, hospitality, retail, landscaping, and more) to learn how security-adjacent services are also benefiting from the very same trends.  

Q: What advice would you give security professionals interested in this topic? 

A: Security programs are being stretched beyond their limits: Economic Downturn & Cost-Cutting, Rising Wages, Great Resignation, and Unbilled Overtime. The only practical solution to maintain or enhance security programs is through technology & automation.  

Q: How do you see this issue evolving in the next 2-5 years? 

A: Camera systems are a historical mainstay & are getting better by the day, but they have fundamental limitations. Mobile robots are a relatively new tool — whether indoor, outdoor, or aerial — that are evolving rapidly to provide better coverage & superhuman capabilities. And a host of new software suites are helping organizations manage assets (humans, technology, & software) to automate key workflows, provide better duty of care, and manage a distributed global footprint.  

Q: Why do you attend GSX? 

A: GSX is an ideal location for practitioners and vendors to meet, collaborate, and share hard-won insights as we look to make the world more safe, secure & productive. 

Travel Security in a Post-Pandemic World: The Importance of Joining Health and Security Forces

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Travel Security in a Post-Pandemic World: The Importance of Joining Health and Security Forces,” presented by Annick Chalifoux, Director of Global Health and Safety at Caisse de depot et placement du Quebec (CDPQ), and Remy Mayo-Martin, Expert Advisor of Global Health and Safety at Caisse de depot et placement du Quebec (CDPQ). Read on for what they had to say and don’t forget to register for GSX 2023

Q: How did you become interested in your topic? 

AC: The pandemic has highlighted the importance of integrating the CDPQ Health and CDPQ Corporate Security teams into one team. During that period, everything had to be analyzed comprehensively: looking at both health and security risks. It therefore became obvious that integrating both teams would help enhance safety and security, improve emergency response and internal communications as well as increase efficiency by having a single point of contact for business travel.  

Q: Tell us about your presentation and why security professionals should have this topic on their radar? 

AC: There are several reasons for security professionals to consider merging Health and Security teams: 

  • The changing travel landscape: The pandemic significantly modified the travel landscape, introducing new health risks and challenges. Security professionals need to be aware of these changes and adapt their strategies to ensure the safety and well-being of travelers. 
  • An integrated approach: By merging health and security teams, security professionals can develop a more comprehensive and effective approach to travel security. Integrating health considerations into security protocols enables early detection, prevention and mitigation of potential health-related threats. 
  • To enhance risk assessment: Merging health and security teams allows for more accurate risk assessment. By considering both health and security factors, professionals can better identify and prioritize potential risks, implement appropriate measures and make informed decisions to protect travelers. 

Q: What advice would you give security professionals interested in this topic? 

RM: My recommendation for any security professionals interested in merging health and security teams would be the following: 

  • Foster collaboration: Establish partnerships and collaborate with health professionals, government agencies and relevant stakeholders to exchange information, share best practices and develop coordinated strategies that address both health and security concerns. 
  • Training and education: Seek specialized training or certification programs that provide knowledge and skills in travel security and health-related matters. Learn about emerging technologies and tools that can enhance travel security measures. 
  • Stay informed: Keep up to date with the latest developments and guidelines from health authorities and security organizations regarding travel safety and pandemic-related risks. 

Q: How do you see this issue evolving in the next 2–5 years? 

RM: Overall, the focus on travel security in a post-pandemic world will continue to evolve. We must adapt our strategies by focusing on merging health and security teams, leveraging technology and adapting to changing regulations and risks. 

  • First, we will see increased integration of health and security teams. It will likely become more prevalent and institutionalized. Organizations will recognize the value of a combined approach to travel security and will invest in developing dedicated teams or departments that address both health and security. 
  • Second, we will see fast-paced technological progress. Developing and adopting advanced technologies such as biometric screening, contactless processes, real-time health monitoring and artificial intelligence tools will likely play a significant role in enhancing travel security in the post-pandemic world. 
  • Lastly, we think there will be some regulatory changes. Governments and international organizations may introduce new regulations and standards to ensure travel security in the post-pandemic era.  

Security professionals will need to stay updated with these changes and adapt their strategies accordingly. 

The Evolution of Commercial Drones and Security

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “The Evolution of Commercial Drones and Security,” presented by William Edwards, CPP, PCI, PSP, President of Federal and Public Safety at Building Intelligence. Read on for what he had to say and don’t forget to register for GSX 2023!

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

A: The Evolution of Commercial Drones is an awareness and educational update on the precipitous growth of the commercial drone platform and its implications (positive and negative) on security professionals and the overall concept of security program development. Security professionals are at a point now where consideration for the “air domain” should be a major factor in their programs. Like the advent of cybersecurity and AI, commercial drones, through the lens of recent conflict zone actions has shown and proven that this technology is a security concern and creates risks that have not been addressed properly in the marketspace. The presentation will describe the short history of the commercial drone, discuss positive and negative implications for society, address what the future may hold, and recommend a simple framework to support a security professionals understanding to include easing the stress of “knowing” where to start. This presentation is a walk-through of recent time, highlighting the drone laboratory and the hundreds of experiments created in the Ukraine/Russian War surrounding the drone platform in all its different forms and capabilities. Attendees will walk away with an appreciation for the security implications and begin their journey on understanding how to mitigate the risk. Lastly, the presentation will address the current shortfalls in regulation and law surrounding drones and describe the difficulties with the counter uncrewed aerial system (CUAS) technologies and authorities implementing them.  

Q: What advice would you give security professionals interested in this topic? 

A: Understand the technology, the current mitigation options, the restraints associated with CUAS based on the lack of authorities, regulations, and law. Seriously consider the “air domain” in the overall security program.  

Q: How do you see this issue evolving in the next 2-5 years? 

A: The technology will only continue to grow, mature, and evolve. It will put a significant amount of pressure on businesses that host the public. Large mass gatherings will need to be secured and have the right authorities, training, and certifications to implement a CUAS risk mitigation plan. 

Q: Why do you attend GSX? 

 A: As an ASIS “Triple Crown” certification member, I value GSX for the exposure to technology, the education offerings, the networking, and the opportunity for new connections.  

Stop The Next Mass Shooter: A Workplace Violence Tabletop Exercise

In anticipation of GSX, we sat down with presenters of upcoming sessions in order to get a better understanding of the topics at hand. This week we are featuring, “Stop The Next Mass Shooter: A Workplace Violence Tabletop Exercise,” presented by Bryan Flannery, President at Foresight Security Consulting, and Charles Ahmad, CPP, Founding Partner at Group Nine Risk Consulting. Read on for what they had to say and don’t forget to register for GSX 2023!

Q: How did you become interested in your topic? 

CA: I spent the majority of my career with the U.S. Marshals Service locating and apprehending violent felons who were on the run. Fugitive work was something I loved and had wanted to continue until I retired. As it turned out, the Service had other ideas. In 2017 I was reassigned to a Judicial Security Unit and went about the work of protecting members of the federal judicial family, up to and including Supreme Court Justices and a Cabinet member. While it wasn’t something I asked for or ever intended to pursue, I ended up thoroughly enjoying, what was for me, an entirely new area of law enforcement.

Initially, my focus was largely protective intelligence which involved proactively investigating threats of violence to federal judicial officials and facilities. I soon learned about the warning signs displayed by individuals who are planning violent attacks to include mass shootings and found the work both interesting and rewarding. After a couple of years in that role, I was promoted and led the entire unit. My responsibilities then grew to include all aspects of security risk management for multiple courthouses and hundreds of federal judicial officials, and I continued to teach classes on workplace violence and active assailant intervention and response.

Brian and I are very excited and appreciative of the opportunity to present on this topic at GSX 2023! 

Q: Tell us about your presentation and why should security professionals have this topic on their radar? 

CA: Unfortunately, the threat posed by active assailants, such as mass shooters, isn’t going away. To effectively address this ever-increasing threat, I highly encourage security professionals to receive specialized training and to form a threat assessment team within their organization. In forming a multi-disciplinary threat assessment team, reports of concerning behavior can be examined and addressed utilizing an industry accepted framework that has proven effective in numerous cases. As I moved from law enforcement to the private sector, I have committed myself to getting this message out with the ultimate goal of saving lives. 

Q: What advice would you give security professionals interested in this topic? 

BF: Part of preventing workplace violence is understanding that the perpetrators plan, prepare, and are predatory. We must be open to recognizing that while we may not agree with it, the attackers always have a grievance, and helping people solve their issues early will better help us prevent workplace violence. It may seem like a departure from what we consider “normal” security work, but practitioners must be open minded about a new way of thinking about prevention.  

Q: How do you see this issue evolving in the next 2-5 years? 

BF: With a little over a year of distance from the pandemic, more companies returning to the office, and still struggling community resources I believe the next few years will inevitably bring an increase in preventable Workplace Violence incidents. From the reactivity of aggressive pushing and shoving to a targeted attack of tragic violence, leaders should begin bolstering their workplace violence prevention efforts now by creating and maintaining Behavioral Threat Assessment Teams that work cross culturally to include security, HR, and legal.

Leveraging a company’s desire to best serve their employees, security professionals and practitioners should be outspoken evangelists for holistic security programs. Preventative measures like reporting mechanisms, policies, and multi-disciplinary threat assessment and management teams should be parts of the comprehensive programs all organizations strive for. Prevention of targeted violence is certainly the goal, but better care for people can be the standard by which we achieve it.