McCormick Place | Chicago, IL | #GSX19

Session Spotlights

Facial Recognition: Balancing Privacy and Security

Facial Recognition: Balancing Privacy and Security

A combination of Internet of Things (IoT) technology, holistic urban development models, and more widespread and reliable connectivity have evolved the concept of smart cities from a futuristic ideal to a series of real-life initiatives that have already been adopted by municipalities across the world….

Read More
We Hacked a Commercial Office Building. Here’s What We Learned.

We Hacked a Commercial Office Building. Here’s What We Learned.

Countless high-profile, high-stakes incidents over the past few years have made it clear: anyone can be hacked, and there is no limit to the scope or reach of cyberattacks. New reports seem to emerge every week of international retailers, government organizations, political groups, and even…

Read More
Q&A: How Companies Are Using Drones for Security

Q&A: How Companies Are Using Drones for Security

We sat down with Jason Cansler, owner of UASidekick, LLC, which provides software for UAV pilots to maintain compliance with FAA requirements, to discuss the challenges and opportunities security organizations face when using drone technology. Q: The use of drones and other unmanned systems in the…

Read More
Announcing Keynote: General John F. Kelly

Announcing Keynote: General John F. Kelly

General John F. Kelly, U.S. Marine Corps (RET) to Speak on Geopolitics and Security Join us at Global Security Exchange (GSX), 8-12 September 2019, and enjoy a truly engaging experience, that includes hearing unique and high-level insights from one of America’s most respected generals. General…

Read More
Creating a Proactive Medical Risk Management Plan for Meetings and Events

Creating a Proactive Medical Risk Management Plan for Meetings and Events

By Jonathan Spero, M.D., CEO InHouse Physicians With corporations placing an increased importance on duty of care, it is a priority for security professionals to have a solid medical risk management plan for meetings before an incident occurs. There is nothing associated with more liability…

Read More
Can You Be Liable for Your Vendor’s Data Breach?

Can You Be Liable for Your Vendor’s Data Breach?

By Kathy Winger, Attorney at Law As a business attorney, one of my most important obligations is to help clients manage their legal risks, which these days include exposure in the cybersecurity/data breach arena. One expanding area of concern is liability for a third-party vendor’s…

Read More
Drones and College Football Stadium Surveillance

Drones and College Football Stadium Surveillance

By Richard Ham  Unmanned Aircraft Systems (UAS), commonly referred to as “drones” are changing the face of security surveillance. While some form of autonomous systems has been flying since 1918, the level of expertise and skill required often made them impractical. New sensors and…

Read More
Protecting Enterprises from External Threats

Protecting Enterprises from External Threats

3 Perimeter Protection Technologies Large Enterprises Should Implement By Mark Brown, Director of Security and Surveillance, FLIR Systems, Inc. Enterprises face many physical security challenges, from monitoring multiple sites simultaneously to preventing unauthorized entry. Designing a system to meet the needs of a property can…

Read More
An Australian Perspective on a Security Systems Installation Project

An Australian Perspective on a Security Systems Installation Project

By Paul Ducker  Integrating security projects within a large public transport department in a state the size of Texas with just one law enforcement agency is challenging at the best of times. There are so many hurdles to negotiate whilst managing competing priorities. When…

Read More
Cybersmart Buildings: Investments in Connectivity and Automation

Cybersmart Buildings: Investments in Connectivity and Automation

By Jason Rosselot, CPP, CISSP  Your building is talking. Can you quiet it down before hackers hear? “Door held open.” “Object left behind.” “Access granted.” Building systems—from security and life safety systems to building automation and controls—generate and process data 24/7/365. Today’s buildings and…

Read More
Increasing The Ability To Survive In Critical Trauma Incidents

Increasing The Ability To Survive In Critical Trauma Incidents

By Richard Smith  The horrific events in Parkland, Florida, Sutherland Springs, Texas, and, unfortunately, other locations around the U.S., have propelled a nationwide conversation on preventing and responding to an active shooter situation. This dialogue has led to an increase in training focused on…

Read More
Multigenerational Strategic Leadership

Multigenerational Strategic Leadership

By Brittany Galli  Why do we consistently wonder why we aren’t farther ahead in our profession or respected like we want to be? The 5 essential traits of great leaders reflect personal attributes, not roles inherent to the position. We sometimes forget how these…

Read More