BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Stay for the Encore

The Global Security Exchange (GSX) All-Access Pass unlocks the second complimentary Encore Event, taking place 10 November 2021! Not only will attendees be able to experience the top attended GSX sessions during the rebroadcast through the GSX Platform, they’ll also have a rare opportunity to chat with a few of the speakers and continue the powerful conversations that began at GSX.

Join us for frontline insights on how to deescalate conflict and prepare for worst-case scenarios. Then, continue your learning with ALL sessions available on demand until 31 December 2021.

10 NOVEMBER ENCORE EVENT PREVIEW

Join us for a rebroadcast of these two top attended sessions. Plus, select speakers will be in attendance to continue the critical conversations started at this year’s GSX.

A Survivor’s Story: The Nashville Christmas Day Bombing

11:00 AM ET
Listen to a personal account of the 2020 bombing that left a wake of destruction and forced law enforcement to invent new ways to react quickly and skillfully. This session will include a discussion of the actions of law enforcement at all levels. Attendees will also learn about the intra-department collaboration phase from Doug Korneski, FBI Special Agent in Charge, Memphis Field Office.

Speaker: Douglas Korneski, Special Agent in Charge, Memphis Field Office at Federal Bureau of Investigation

De-escalating Conflict: Creating Critical Space Between Initial Encounter and Physical Response

12:00 PM ET
How can you prepare for the worst while also doing your best to ensure that public interactions are peaceful? Discover how de-escalation and conflict resolution training can create a critical space of stability prior to the use of force that can prevent violence and save lives.

Speaker Allison Sands, President at Project Hummingbird, is not able to participate in the live Q&A during the rebroadcast. She encourages you to reach out to her with any questions via submission on her website, www.projecthummingbird.org.


JOIN US ON 10 NOVEMBER

You will have received an invitation to the GSX digital platform from Pathable. Didn’t get an invitation? Contact [email protected]

Celebrating Women in Security

By Michael Gips, CPP, principal, Global Insights in Professional Security

If the measure of a society is how it treats its women, then the security industry has taken enormous strides in the last 15 years or so. At GSX, more and more women are presenting sessions—by my count, about 20 percent of the speakers this year were female. And women now regularly keynote a General Session. This year we heard journalist Amanda Ripley discuss “good conflict,” and recent shows have featured cybersecurity expert Keren Elazari, tech policy analyst Tarah Wheeler, former deputy national security advisor K.T. McFarland, and fighter pilot Carey Lohrenz.

At GSX we see female security experts, technicians, business development experts, thought leaders, entrepreneurs, and CEOs. Credit goes to the many trailblazers who defied stereotypes, fought through harassment, and contributed new perspectives to a hidebound profession.

Recognition is due in a lot of places, but ASIS launched perhaps the first community to specifically support females in the security industry, called ASIS Women in Security (WIS), in 2009. Other organizations soon followed suit.

When I worked at ASIS International headquarters, the impetus came from Jenny Hartman, my colleague in the Strategic Operations department. Strategic Operations was the home of the CSO Roundtable (now CSO Center for Leadership and Development), and WIS arose as a CSO Roundtable initiative. I recently talked to Jenny about champions of the cause, and she reminded me that, “Without a doubt, the number one supporter was Marene Allison,” then CSO of Medco and now CISO at Johnson & Johnson. Linda Harmon, then of Accenture, came on board next, and Accenture sponsored some of the first events. Other members of the inaugural committee were Judy Matheny (now at the Federal Deposit Insurance Corporation), Natalie Runyon (now at Thomson Reuters), Normadene Murphy (now at BASF Catalysts Division), executive recruiter Kathy Lavinder, and Lorrie Navarro (now at Biogen).

Creating a community for women was controversial. Some female security practitioners thought it implied that women couldn’t succeed on their own. An ASIS staff member wondered whether we would next be creating a group for bald, left-handed men named Mike.

That cynicism eventually dissipated, and WIS is one of ASIS’s strongest communities. It has liaisons in more than 125 ASIS chapters around the world, 957 community subscribers on ASIS Connects, and 5,700 group members on LinkedIn. A new generation of female leaders has taken the reins, including Loye Manning, Brittany Galli, Mary Gamble, Donna Kobzaruk, Deborah Allen, Lynn de Vries, and Nicole Fikes. Their events occur regularly around the world, ranging from virtual happy hours to career coaching to business and security skills.

Our work is far from done, but ASIS and its members can feel proud for beginning to change the narrative.

There’s More to Discover

With your Global Security Exchange (GSX) 2021 All-Access Pass, you get complimentary access to two exclusive Encore Events on 20 October and 10 November 2021 –– and all sessions on demand through the end of the year.

20 OCTOBER ENCORE EVENT PREVIEW

Join us tomorrow for a rebroadcast of these three top attended sessions. Plus, each speaker will be in attendance to continue the critical conversations started at this year’s GSX.

Mass Shooting Liability: What Every American Business Has to be Concerned With

11:00 AM ET
Tune in to hear examples of these tragic incidents and how the liability landscape has changed throughout the courts of America focusing on hotel chains, but also to educational facilities, shopping malls, apartment complexes and places of business.


Using Metrics to Support the Value Proposition of an Organization’s Security Operation

12:00 PM ET
Join us and walk through the creation of a metric-evaluation program, how to use metrics to measure the performance of your security program and examine case studies of existing programs. This presentation consists of a panel of data experts presenting several case studies and examples of effective metric management.


Effective Presentations to the Senior Executive Team and Board of Directors

1:00 PM ET
Understand why some security leaders dread the offensive task and learn how to turn the opportunity into a constructive conversation about managing risk. Learn practical tips to gain allies on the board or senior team as well as how to communicate in clear concise terms that leave the audience with a sense of trust in the presenter.


JOIN US ON 20 OCTOBER

You will have received an invitation to the GSX digital platform from Pathable. Didn’t get an invitation? Contact [email protected]

Face Forward: Opportunities and Pitfalls with Facial Recognition

Originally published by Security Management magazine

By Sara Mosqueda | 29 September 2021 | GSX Daily, 2021

Getting to Orlando, Florida, for GSX 2021 was in some ways a return to normal, especially once I arrived at a busy and crowded airport—featuring both patient and disgruntled travelers waiting to be screened by TSA, children with overstuffed backpacks that would look more at home atop a donkey, and airline staff scanning boarding passes and ushering in passengers.

Different, however, were the hundreds of eyes sitting above masks with that look of trying to remember how to travel, as well as the signage throughout the airport reminding everyone that masks needed to cover mouths and noses unless someone was actively eating.

So, when Don Zoufal, CPP, safety and security executive at CrowZ Nest Consulting, Inc., explained that some airlines are using facial recognition to replace boarding passes, it’s hard not to smile—under the mask, of course—at the irony.

Zoufal, who presented “Face Forward: Legal Issues with Facial Recognition and Other Artificial Intelligence” in the Defensive Strategies Theater, noted that facial recognition has become increasingly common in combining surveillance with customer experience. Beyond the air travel industry, commercial uses for this technology include timekeeping, certifications, and enhancing customers’ experience for a smoother interaction.

On the security side, facial recognition is commonly used for digital or physical access, surveillance, identifying fraud or identity theft, and investigations.

But for all of its advantages, there remain some facets of facial recognition that can hurt an organization’s relationship with the public.

During the session, Zoufal pointed out that people in his hometown of Chicago, Illinois, were unhappy last year when they learned that the Chicago Police Department (CPD) used images from the Illinois Department of Motor Vehicles and Clearview AI without their knowledge or approval, such as when law enforcement agencies source photographs from the Department of Motor Vehicles or other image databases.

“People are creeped out by the fact that their photo may be utilized by police officers in an investigative context,” Zoufal said. Clearview later canceled the two-year contract with the CPD after being named in a civil liberties suit filed by the American Civil Liberties Union.

And there are other uses of facial recognition that are raising legal concerns and the ire of civil liberties groups. From real-time use (essentially, tracking a person through facial recognition) to racial bias to geospatial tracking (such as facilities where employers track the movements of staff) to unauthorized dissemination or use of the data, organizations must remain aware of the shifting regulatory environment.

While Illinois remains ahead of most U.S. states with its Biometric Information Privacy Act (BIPA)—which bars private companies from collecting a person’s biometric data without written notification and consent on how that data is used—Zoufal said he expects similar laws to emerge in other U.S. states.

And although the United States lacks a federal mandate or regulation on the use of facial recognition or other biometric data, the European Union’s General Data Protection Regulation impacts any business with clients or users living in the EU.

Ultimately, Zoufal said transparency and informed consent are the two practices organizations should consistently commit to if they plan to successfully deploy and retain facial recognition for either surveillance or commercial uses.

The ASIS International Security and Applied Sciences Community is studying the future of artificial intelligence applications. To learn more about its work and the community, check out Zoufal’s article from the April Artificial Intelligence issue of Security Technology.

Sara Mosqueda is assistant editor for Security Management, the parent publication of The GSX Daily. Connect with her at [email protected]. Follow her on Twitter: @XimenaWrites.

Hybrid GSX Demonstrates Strength of the Security Community, Attracting 8,600 Global Registrants

The synchronous portion of Global Security Exchange (GSX) 2021 has concluded at the Orange County Convention Center (OCCC) in Orlando, FL. Presented by ASIS International, the world’s largest association for security management professionals, the event offered discussion and idea exchange for the global security community. Attendance exceeded projections, with 8,600 registrants from more than 80 countries and 300 exhibitors demonstrating the latest security solutions. More than 7,200 of the registrants were for the in-person portion of the event – creating an estimated economic impact of $18.5 million for the community.

“We are thrilled to welcome back GSX 2021 to the Center of Hospitality,” said OCCC Executive Director Mark Tester. “Both the digital and in-person experience provided an opportunity for attendees to connect and serve the needs of global security professionals. I look forward to welcoming back ASIS to the OCCC for many years to come.”

The main event began on Monday 27 September. Following an 8:30 a.m. “How to Make Time Your Ally, Not Your Enemy” general session presentation by bestselling author Daniel Pink, the exhibit hall opened at 9:30 a.m. —marking a change to the GSX footprint where the exhibit hall is now open each day of the in-person event. Exhibiting companies Azena, Boon Edam, Cognyte, Cloudastructure, Evolv Technology, Everbridge, OnSolve, RaySecur, Smiths Detection, Trackforce Valiant, and Thermal Radar debuted products on the GSX exhibit hall.

“I’m proud of my friends and colleagues for arranging what is by all metrics a fantastic GSX,” said John A. Petruzzi, Jr., CPP, 2021 president, ASIS International. “We’ve received an overwhelming response from exhibitors and attendees commenting on the high quality of this year’s show. We’re pleased that the new event footprint—placing learning theaters in the exhibit hall—was well received, allowing for ease of access between our event’s best-in-class education and the solutions offered by our exhibiting companies. I’m incredibly thankful to our show’s international contingent for the lengths that they went to in order to gather here in person. The dedication of these individuals just proves the commitment of our profession to make GSX the industry’s premier event.”

Military and Law Enforcement Appreciation Day (MLEAD), the final day of GSX, featured a “Leading Through Uncertainty” general session presented by Lieutenant General (ret) Nadja West. As a thank you to all active duty and veteran military, law enforcement, and first responders, these groups were invited to attend GSX for free this day. More than 90 individuals registered using the MLEAD discount code.

While the in-person portion of GSX has concluded, on-demand broadcasts of all sessions will be available to All-Access attendees through the digital platform until the end of 2021. During encore events taking place 20 October and 10 November, ASIS will rebroadcast top-attended sessions from GSX with presenters in attendance to answer audience questions in real-time.

GSX heads to Atlanta, GA in 2022. The OCCC is slated to welcome back GSX in 2024 and 2028.

Key Management: Extending the Reach and Value of Access Control Systems

Businesses go to great lengths adding layers of security to keep their employees, customers, and organization safe. According to Gartner’s data on IT industry metrics, companies spend an average of 6 percent of their IT budget on security each year.

Access control, video surveillance, fire protection, and cybersecurity precautions usually lead the way; however, safeguarding physical keys and employee-used devices is often ignored as a fundamental element of security. As such, most businesses overlook adding them to their security program, but physical key security and device management should be a priority. Not necessarily because of the value of the key or asset, but because of what the key or asset has access to or authorizes. That’s the greater value, and potentially the greater risk, to an organization.

Craig Newell, Traka Americas ASSA ABLOY’S vice president of business development, sat down with GSX.org host Chuck Harold to discuss Traka’s involvement in Global Security Exchange 2021, taking place 27-29 September in Orlando, FL.

The two discussed how Traka works to understand an organization’s needs and implement a key or asset control system that gets to the heart of each risk and challenge a security and facilities team will face in 2021.

Check out the video to hear more about how key and asset management can extend the reach and value of a physical access control system by:

  1. Taking inventory
  2. Driving operational efficiency
  3. Bridging offline with online security
  4. Auditing the process
  5. Providing accountability and control

Managing Risk Intelligence More Effectively with Artificial Intelligence

We’ve been through a storm of critical events this past year. There’s a proliferation of data on everything from changing weather patterns to fires, chemical spills and cyberattacks. However, without understanding how these threats will potentially affect your operations, that data is useless.

Thanks to AI and machine learning, validated data can now be correlated with a company’s operations, enabling security professionals to see how employees, customers, suppliers and physical assets will be impacted, in time to make a difference and mitigate damages. This is how mere data alerts are transformed into true actionable intelligence during a critical event – so you can make better decisions and manage risk.

Let’s take a look at five of the top trending risks businesses face today and how AI-powered risk intelligence makes it possible to manage these risks and improve resiliency.

1. Cybersecurity

Ongoing incidents of hacking into U.S. government systems show that no organization is immune to cybercrime. Risk intelligence provides pertinent information about an attack, such as the type of threat, the scope and how it might impact your operations. You’ll be able to respond swiftly, activating the appropriate crisis management team and informing employees and executives about what they need to do to manage the risk. 

2. Post-Pandemic Recovery

The new model of work combines different percentages of remote, in-office and hybrid schedules. To make way for this shift, direct investments into digital transformation are projected to total $6.8 trillion  by 2023. Right now, it’s vital to ensure business continuity and resiliency so the next crisis doesn’t derail progress. This necessitates timely and accurate risk intelligence to tell us what’s happening, collaborative incident management to get everyone on the same page and robust, global communications to keep everyone updated.

3. Infodemic Misinformation

More than 1.1 million articles contained misinformation about the pandemic from January to May 2020, according to a study by Cornell . And COVID isn’t the only topic where this is happening. If your risk intelligence doesn’t filter for valid sources, your data is open to infection by rumors and speculation. AI and machine learning weed out invalid sources, so you’re armed with reliable information. You can focus on protecting your people, places and property and notify employees about the truth using critical communications – before they fall prey to speculation.

4. Severe Weather

Whether it’s a hurricane, wildfire or flood, severe weather events are becoming more frequent and less predictable, not to mention more costly. During the first half of 2021, there were eight weather/climate disaster events in the U.S., with losses exceeding $1 billion each. Fortunately, security and emergency teams can leverage the power of risk intelligence to identify threats using leading global sources like the World Meteorological Organization (WMO) and FEMA. Armed with relevant, actionable data, your organization is better equipped to keep employees safe and informed, and able to take proactive steps to protect facilities and vital business operations.

The Big Picture

By going from mere data alerts to true actionable intelligence, AI-powered risk intelligence enables organizations to respond quickly and effectively to critical events, mitigating the damage and improving resiliency. The trending risks we’ve discussed here are part of the larger, ever-expanding risk landscape businesses must face – the elephant in the room, if you will. To finish eating it, we must break it down into manageable bites. Risk intelligence filtered by AI and machine learning gives us the means to consume everything on our plate while saving room for more, because more is always coming.

OnSolve® looks forward to talking to you more about this topic at the upcoming 2021 Global Security Exchange Conference. Stop by booth #733 to learn more about how the OnSolve Platform for Critical Event Management can help you manage risk and build resilience for the remainder of this year and throughout the next.  

Leveraging AI and Data Analytics in Enterprise Physical Security

By Sam Joseph, Co-Founder and CEO, Hakimo

The physical security threat landscape has undergone considerable changes over the past few years. COVID-19 has led to increased crime rates, insider threats are at an all-time high, and labor costs have risen sharply. Things have reached a point where physical security can no longer be just confined to gates, guards, and guns. Continuing the status quo is not only impractical but also makes the enterprise vulnerable to new threats.

Fortunately, there have been some recent technological advances that the security industry can leverage to overcome this crisis. The most important one is artificial intelligence (AI), especially around computer vision and deep learning. Today,  AI can analyze any piece of video and understand the context therein — in most cases better than a human. A second technological advancement has been around data analytics. We now have tools that can analyze billions of events in real-time, correlate different datasets, and provide actionable insights into them. When these advancements are applied to enterprise security, many long-standing problems can be solved and many new efficiencies can be uncovered.

Solving false alarms and tailgating in GSOCs

Two problems are endemic to any enterprise Global Security Operations Center (GSOC): access control false alarms and tailgating. With the steadily increasing labor costs, GSOCs can no longer afford to “just throw more people” at the first problem. Worse, GSOCs missing real breaches due to alarm fatigue have become commonplace in the industry with increased crime rates during COVID. Regarding tailgating, the security technology industry has been battling this problem for many decades without much success.

Both these problems can be solved by leveraging AI and analytics. For example, Hakimo does AI processing on the video corresponding to every door alarm and automatically resolves false alarms without any human intervention. The same principle is used for tailgating detection. In fact, Hakimo’s tailgating detection algorithms have a false-positive rate of less than 1% which is not only the best in the market but also beats the performance of traditional hardware-based systems (such as laser beams) by a significant margin.

Going from massive amounts of data to actionable insights

Physical security systems have been generating massive amounts of data: an access control system at even a mid-sized enterprise company generates hundreds of millions of events every year. This data has been sitting idle for all these years because there were no practical tools that could be used to make sense out of this data. Things are changing now. Modern data analytics tools such as Hakimo Insights can parse through billions of events and point out specific anomalies and actionable insights. For example, we could now detect an employee badging in at an unusual door or at an unusual time (a potential indicator of insider threat, which has been an important recent security challenge as mentioned in the beginning).

These data analytics tools can not only add value to physical security teams but also enable those security teams to give value back to other teams within the broader organization. For example, a tech company’s GSOC recently used modern data analytics tools to track building utilization over time. That data was then transferred to the facilities team who decided which building to downsize and which buildings to expand.

Enabling the convergence of cyber security and physical security

One hallmark of bringing these new technologies into the physical security world is that it accelerates the convergence between cybersecurity and physical security. Convergence—the idea that cyber and physical security teams should work hand-in-hand instead of being siloed out—is the future of security, and many organizations are rapidly embracing the idea after realizing its clear ROI.

There’s also a clear pattern between the emergence of Hakimo-like tools and the emergence of some specific cybersecurity tools more than a decade ago. In the late 2000s, cybersecurity systems were generating so many alerts that humans were not able to keep up with them, just like today’s GSOCs. This then led to the invention of platforms such as SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) which streamlined and automated the processing of those alerts. Tools like Hakimo are bringing such smart automation tools now to physical security.

To conclude, the physical security landscape is undergoing tectonic changes that lead to serious challenges for security teams. Technology is the answer to those challenges, and security teams that don’t adopt technology will not be able to overcome those challenges and thus will be incapable of surviving the recent changes. On the other hand, teams that leverage technology can use the same challenges as a driving force that transforms them into a more efficient, effective, and converged security organization.

Sam Joseph is the Co-Founder and CEO of Hakimo, a technology company that makes smart software for enterprise physical security monitoring. Visit Hakimo at Booth #1869 at GSX 2021 to learn more about Hakimo’s products.

Threat Assessment: Protective Intelligence’s Missing Ingredient

By Fred Burton, Executive Director, Ontic Center for Protective Intelligence

Reflecting back on my decades of experience in the protective intelligence field, I have consistently seen programs that were lacking one key and very important ingredient: threat assessments. Even the times a program had both, they were often displaced in silos and not shared across teams or with other key players, like HR or Legal. I’ve seen this happen for a range of reasons, but primarily because there hasn’t been a tool that seamlessly integrates the two components, and not everyone recognizes the value, nor understands how to integrate the models.   

This is precisely the reason why Ontic recently acquired SIGMA Threat Management Associates.  Our collaboration brings Fortune 500, emerging enterprises, education and government organizations the ability to unify the threat assessment practice with technology, creating a single platform for managing threats, workflows and assessments. 

What is a threat assessment?

Threat assessments are foundational tools protective intelligence teams use to establish the threat posed to a specific person, company, event, location, or facility. Threat assessments are conducted to create as complete a picture as possible of the threat landscape, such as factors that could bring hostile attention to the subject, any current threats, the universe of potential threats, and threat actors, as well as the general threat environment.

By identifying, analyzing and describing the existing threat level, assessments help you understand the threat landscape and are useful tools for determining the appropriate security measures needed to protect against the identified or potential threats. Not one style fits all, therefore, security processes and procedures must also be implemented in accordance with corporate or personal risk tolerance, as well as lifestyle, corporate culture, business operations and budgetary considerations. 

It is also important to recognize that while threat assessments provide a foundational understanding of the threat, they are not static. They must be responsive, living documents that reflect changes in the potential target’s situation and environment.  In a perfect world, baseline threat assessment should be updated quarterly, with full, ground-up re-assessments annually.  

Elements of threat assessment

While these examples are specific to a person, they can also be applied to a company, event, location, or facility. Here are four key elements to consider: 

  1. Subject profile – If they are well known and have controversial business dealings or social activity they are far more likely to attract the attention of threat actors and are more easily recognized as they proceed through their normal daily activities.
  1. Documented and potential threats – Known and documented threats also play an important role. Such threats should include persons of interest (POIs) such as abnormally angry customers, disgruntled former employees, unstable individuals who have an abnormal focus of interest in the company or executive, including family members. The communications of such individuals should be monitored and curated for future reference.
  1. Physical environment – Assess the subject’s work and home environment, where the company operates, and areas that must be regularly traversed to get from home to work or are otherwise frequented. It is important to gain an understanding of the criminal, civil and natural disaster threats and vulnerabilities associated with those locations.
  1. Current security measures – This would include security training provided to the subject, a driver or a protective detail. This should also account for residential security, estate staff and physical security measures in place at the office. The security measures in place can then be weighed against the assessed threat level to determine if they are sufficient and appropriate.

Digitizing your threat assessments

The physical security industry has experienced a massive shift in the last couple of years largely fueled by new responsibilities driven by Covid health and safety and a complex threat landscape, as a result of political turmoil and social unrest.

Now more than ever, corporations need technology solutions that not only provide a comprehensive view of the threat landscape and surface critical knowledge but also guide action — specifically, the identification of threats, gathering of information, assessment, creation and implementation of plans for addressing threats.  

SIGMA’s Workplace Threat Assessment Module, integrated into the Ontic Platform, can help visualize and guide decisions around identifying incidents of concern; gather the necessary information through investigative research and interviews; assess the level and urgency of the threat; and guide the appropriate actions to manage and mitigate the threat.

To keep up with the future of protective intelligence and threat assessment, we must strip away the disparate data sources and manual processes and adopt technology that allows us to do all of this in one single pane of glass. 

Interested in learning more about the role threat assessments play in helping security teams see the complete picture of the existing risk level? Visit Ontic at Booth 933 at GSX 2021, or check out this Ontic whitepaper: The Role of Baseline Threat Assessments in Protective Intelligence.

The Art of Human Hacking: Confessions of a CIA Spy

Peter Warmka is a former CIA intelligence officer who spent over two decades breaching the security of target organizations overseas.

At 11:30 AM ET on Tuesday 28 September, Warmka will share methodologies utilized by today’s threat actors to circumvent the technological controls, policies and procedures put in place to safeguard organizations and their data in the GSX session, Confessions of a CIA Spy: The Art of Human Hacking.

Warmka will discuss the criteria for the selection and analysis of a target entity, the identification and assessment of insider targets, and a variety of social engineering techniques. Beyond this, Warmka will share Recommendations for minimizing the likelihood of becoming a target and tools that should be provided in the workplace to empower employees and contractors to effectively shut down and appropriately report social engineering attempts.

Warmka sat down with ASIS TV host Chuck Harold to discuss the challenges of cannabis security. Register for an All-Access pass to attend this session digitally or in-person.

The GSX 2021 Countdown is ON

The GSX 2021 digital platform is LIVE! After kicking off on 15 September with Erik Qualman’s Security 2030: Crossroads of Innovation and Transformation general session, the digital platform is now accessible for both in-person and digital All Access attendees. Get acquainted with the new features that the digital platform offers—from education to networking to exhibits, and more.

Education

GSX education sessions will be available to All-Access attendees through the digital platform. Each day’s general session, game changer session, X Stage content, and two of the in-person learning theaters (the Offensive Strategies and Defensive Strategies) theaters will broadcast live from the Orange County Convention Center (OCCC) in Orlando, FL. Online Exclusive sessions and all other in-person sessions will be available on demand.

While viewing sessions in the digital platform, attendees can chat with presenters and fellow attendees in real-time and keep their own notes about the topic, which can be downloaded for later reference.

Attendees can view Qualman’s presentation on demand and browse the complete list of 100+ education sessions that will take place as part of GSX. It’s easy to build your customized session schedule right in the platform.

Networking

The GSX digital platform offers a networking area to connect and have a little fun!

The platform’s people directory lists GSX attendees, searchable by tags such as Military Veteran, Government, Cybersecurity, and more. The platform allows messaging and public chats.  Attendees can manage their profile and select whether they would like to be included in the People directory.

Earn points by engaging in GSX 2021 activities for the chance to win a GSX 2022 registration, ASIS 2022 membership, and more. From 27-29 September, the GSX Headshot lounge, supported by the ASIS Foundation, will give attendees the opportunity to capture a professional looking headshot.

Exhibits

The Exhibits section of the GSX digital platform includes a listing of all GSX 2021 exhibitors. This is where you’ll learn more about exhibitors and their offerings and where you can leave a digital ‘card’ to indicate that you would like to speak with the exhibitor to learn more. In-person registrants will also find a useful map of the exhibit hall to plan for their activities on-site at the OCCC.

ASIS Hub

The ASIS Hub is the destination to discover ASIS resources to build their network, sharpen their skills, and advance their career. This section of the platform includes the ASIS Store and links to the ASIS Awards celebration, launching 23 September. Career HQ contains valuable sessions for career growth, including Branding Yourself Effectively, Becoming a Person of Influence, Industry Labor Trends, and more.


All Access registrants, both digital only and in-person, have received an email with instructions detailing how to access the GSX digital platform. If you have registered for GSX and cannot locate your access email, please contact [email protected]. Note: if you have newly registered, please wait an hour to allow for your access email to be delivered.

Cannabis Security Best Practices

ASIS International’s Cannabis Security Ad-Hoc Community has written a best practices guide for the security industry.

Set to be unveiled during a special New Cannabis Security Guide session at 11:30 AM ET on Wednesday 29 September at GSX 2021, this guide is a comprehensive resource covering growing operations, product conversion, retail and medical dispensaries, cash transit, product transit and the overall best practices for vetting and hiring a security team.

Session presenter Carrie Goetz sat down with ASIS TV host Chuck Harold to discuss the challenges of cannabis security. Register for an All-Access pass to attend this session digitally or in-person.