McCormick Place | Chicago, IL

Session Spotlights

Creating a Proactive Medical Risk Management Plan for Meetings and Events

Creating a Proactive Medical Risk Management Plan for Meetings and Events

By Jonathan Spero, M.D., CEO InHouse Physicians With corporations placing an increased importance on duty of care, it is a priority for security professionals to have a solid medical risk management plan for meetings before an incident occurs. There is nothing associated with more liability...

Read More
Can You Be Liable for Your Vendor’s Data Breach?

Can You Be Liable for Your Vendor’s Data Breach?

By Kathy Winger, Attorney at Law As a business attorney, one of my most important obligations is to help clients manage their legal risks, which these days include exposure in the cybersecurity/data breach arena. One expanding area of concern is liability for a third-party vendor’s...

Read More
Drones and College Football Stadium Surveillance

Drones and College Football Stadium Surveillance

By Richard Ham  Unmanned Aircraft Systems (UAS), commonly referred to as “drones” are changing the face of security surveillance. While some form of autonomous systems has been flying since 1918, the level of expertise and skill required often made them impractical. New sensors and...

Read More
Protecting Enterprises from External Threats

Protecting Enterprises from External Threats

3 Perimeter Protection Technologies Large Enterprises Should Implement By Mark Brown, Director of Security and Surveillance, FLIR Systems, Inc. Enterprises face many physical security challenges, from monitoring multiple sites simultaneously to preventing unauthorized entry. Designing a system to meet the needs of a property can...

Read More
An Australian Perspective on a Security Systems Installation Project

An Australian Perspective on a Security Systems Installation Project

By Paul Ducker  Integrating security projects within a large public transport department in a state the size of Texas with just one law enforcement agency is challenging at the best of times. There are so many hurdles to negotiate whilst managing competing priorities. When...

Read More
Cybersmart Buildings: Investments in Connectivity and Automation

Cybersmart Buildings: Investments in Connectivity and Automation

By Jason Rosselot, CPP, CISSP  Your building is talking. Can you quiet it down before hackers hear? “Door held open.” “Object left behind.” “Access granted.” Building systems—from security and life safety systems to building automation and controls—generate and process data 24/7/365. Today’s buildings and...

Read More
Increasing The Ability To Survive In Critical Trauma Incidents

Increasing The Ability To Survive In Critical Trauma Incidents

By Richard Smith  The horrific events in Parkland, Florida, Sutherland Springs, Texas, and, unfortunately, other locations around the U.S., have propelled a nationwide conversation on preventing and responding to an active shooter situation. This dialogue has led to an increase in training focused on...

Read More
Multigenerational Strategic Leadership

Multigenerational Strategic Leadership

By Brittany Galli  Why do we consistently wonder why we aren’t farther ahead in our profession or respected like we want to be? The 5 essential traits of great leaders reflect personal attributes, not roles inherent to the position. We sometimes forget how these...

Read More
Evaluating Building Layouts to Mitigate Active Assailant Threats

Evaluating Building Layouts to Mitigate Active Assailant Threats

By Timothy Brewer  With 2017 and 2018 both setting unfortunate new records for the number of active shooter situations, the very real and growing threat of armed assailant attacks is clear. Events such as the school shootings in Parkland, FL and Sante Fe, Texas...

Read More
How Augmented and Virtual Reality Affect Security

How Augmented and Virtual Reality Affect Security

By Travis Rothbloom  The computer. The internet. The smartphone. What’s next? Many believe that Virtual Reality (VR) and Augmented Reality (AR) will be mankind’s next giant leap and there are already instances where their influence has affected the security industry. For the planning stages,...

Read More
Updating Security Operations Procedures with AI Technology

Updating Security Operations Procedures with AI Technology

By Steve Reinharz  The artificial intelligence (AI) revolution brings new technologies into daily life. We’ve seen AI usage in diagnostic applications within the healthcare industry and in the emergence of self-driving cars, and with the growth experienced in these areas, it’s become hard to avoid...

Read More
A Zero Trust Approach to Information Security

A Zero Trust Approach to Information Security

By Christopher Frenz With the pandemic ransomware attacks of both WannaCry and NotPetya devastating companies around the globe, ransomware was a prominent headline in 2017. It’s estimated that in 2017, companies recovering from these and other ransomware attacks incurred $5 billion in damages. One of...

Read More