BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Q&A: How Companies Are Using Drones for Security

We sat down with Jason Cansler, owner of UASidekick, LLC, which provides software for UAV pilots to maintain compliance with FAA requirements, to discuss the challenges and opportunities security organizations face when using drone technology.

Q: The use of drones and other unmanned systems in the security industry has been a hot topic over the past few years. Cansler speaker at GSX 2019 on dronesHow are drones affecting an organization’s approach to security?

A: There’s so much drones can do to augment security. They are being used to look at perimeters and conduct constant surveillance over large areas. Drones can also be sent out as a response mechanism before personnel can respond and conduct an initial site assessment, so people know what they’re getting into before they get there. It’ll take a little bit for people to get used to what they can do with drones, and when regulations loosen up, it will open up a whole other world in the security industry.

Drones are getting smaller, and their battery and fuel sources are getting more efficient. You’re finding more drones with better camera systems and a smaller footprint. The key aspects that make people buy certain drones are flight time and payload capacity, but the best drone you have is the one you have with you.

Organizations also need to consider how to protect their assets from drones. This is another aspect to security that’s taking longer for people to understand the impact. And, policies need to be made so employees know what to do when they see a drone. Do they notify someone? Is there a ground sweep? Do they see if anything was dropped from the drone? Do you check rooftops for listening devices? Every company should have a drone policy, just like any other health or safety policy, whether you’re a school that would need to protect children, or a company with assets on their property, and especially jails and prison systems. Whether or not an organization has a drone program, they need drone policies.

Q: There are a lot of people in the security industry who are curious about the possibilities drones can provide as a physical security tool. Are you seeing an increase in the use of drones for security purposes?GSX 2019 drones and security

A: Recently, there are more options that can support and provide drones as a security function. Companies need turnkey devices—they don’t want to go through the process of learning this on their own. If you can have a consultant or integrator that already has this experience under their belt, you’ll start seeing this implemented more, especially once integrators understand the systems and what it takes to actually incorporate them.

But overall, the growth is still slow—the industry is trying to determine where the technology is going and what they can do with it. There’s not a lot of litigation that supports how drones are used, even in law enforcement circles, which often looks at case law to know how it might be used for or against you in a case. And the lack of legal permission to fly drones beyond line of sight is causing some disruption for companies that want to patrol a thousand acres—they would have to someone in view of that drone at all times, which defeats the purpose.

Q: When do you think we will see more clarity on how drones can be used in security or law enforcement capacities? Is that the biggest barrier to the adoption of this technology?

A: We thought this year we’d be able to operate drones beyond the line of sight and over people, but the law is still not there. Regulations are being held up by the lack of remote identification—the requirement for a drone to signal that its flight has been authorized. Right now, law enforcement can’t tell whether the drone operators are good or bad guys.

GSX 2019 drones for the security industryThe whole key is to find bad actors, not keep track of good ones. In a perfect world, if you see a drone but don’t have any ID pings, you’d know that is a bad actor. It will be very important in the future to have remote ID capabilities for traffic management and security. They want that capability in place before they allow people to fly drones beyond visual line of sight.

Q: During this time of uncertainty surrounding regulations, how are organizations using drones? What challenges do they face?

A: There are some organizations who have taken up the mantle and are using drones because they’re more concerned about the safety of their product, property, or people, and will take whatever hand-slapping they get as long as they’re able to protect their assets. You’ll find that taking place more overseas in Mexico, Venezuela, and Africa—people are using it because they need it, they have assets they have to protect. Most of the time it’s in coordination with local governments, but here in United States, we’re kind of stuck until we get this approval through the FAA or Congress.

Some organizations are taking a more careful approach and won’t really use drones until they find out how other companies fare, but the question of enforcement is unknown. Some fines have been given, but they aren’t broadcast, which kind of defeats the purpose. The FAA licenses pilots to be able to fly, but they aren’t an enforcement agency. They can revoke licenses, but actual enforcement is left up to the Department of Justice or FBI. For them to go after drone pilots, there has to be some other precipitating issue, like they crashed and hit something or used them nefariously. We’ll start to see more and more of this—the FAA is providing resources to get local law enforcement to help.

Q: What can security professionals do to stay up-to-date on advances in drone technology, regulations, and use GSX 2019 how drones are used for securitycases?

A: In our presentation, Drone Evolution: Security Tools or Security Threats?, that we’ll be leading while at Global Security Exchange (GSX) this September in Chicago, we will discuss information from regulatory requirements and case studies on how drones can interfere with security measures for a small or large company, or even a government agency. The three of us giving the presentation—myself, Nathan Ruff, and Mark Schreiber, offer a good combination of perspectives with my pilot’s point of view, Mark’s engineering background, and Nathan, who’s an expert in the unmanned systems industry. We participate in different rulemaking committees, NASA groups, and a safety team for FAA. Some of the information that comes through these channels we’re privy to, and we can and will talk about what we’ve learned.

—————————

To hear Cansler and other experts speak on these topics, see live drone demonstrations in the GSX D3 (Drones, Droids, and Defense) learning theater, and to meet with reputable companies who supply drone technology, register for GSX at www.gsx.org

Managing Today’s Multi-Gen Workforce

The makeup, attitude, and preconceived notions of today’s multi-generational workforces couldn’t be more different than previous generations, as there has been a significant shift in focus from career to lifestyle with recent generations. This is also most evident in how management communicates with workers, and workers communicate amongst themselves. All of which poses new challenges for managers across all industries.

With employees tending to stay in the workforce longer, and more new employees entering the workforce right out of college, the age range of today’s multi-generational workforce includes:

  • Traditionalist – born before 1943-45
  • Baby Boomers – born from 1943-1965
  • Gen X – born from 1965 -1978
  • Gen Y – born from 1978-1986
  • Millennials – born from 1986-1994
  • Gen Z – born from 1994-2000

One of the most distinguishable differentiators when comparing traditionalist to more recent generations is that the former seem to have more loyalty to their employers, with more recent generations focused more on their personal lifestyles and careers. As a result, today’s employees often require more incentive than just a fair paycheck. This is the root of a common disconnect between management and employees since many workers are satisfied with doing their job 9-5 and going home, which frustrates traditional management teams across the country.

So what can managers do to help keep multi-generational workforces happy and engaged?

Identify Goals
It’s important to clearly understand every employee’s goals, which will help better gauge their drive to complete assigned tasks and more. This will help both managers and employees set realistic performance expectations.

Determine the Best Forms of Communication
Each generation has its own preferred methods of communicating. Traditionalists prefer face to face or phone communications, baby boomers prefer email, and Gens X/Y/Z prefer immediate access via text or chat programs. Identifying your team’s collective communications preferences allows you to select the right combination of tools that work best for them.

Leverage Communications to Build Collaboration
Opening up the best channels of communication is the first step in building collaboration. And establishing collaboration is the first step in turning a workforce into a team. Encourage employees to identify new technologies and tools, design better processes, and implement new company standards. By getting them involved in developing processes, they will be more apt to abide by them, thereby increasing throughput and workflow productivity.

For a deeper dive into this topic, we invite you on Monday, 9 September to attend Managing Four Generations in the Workforce at GSX 2019 in Chicago. You can register here.

Speakers: Maria Dominguez and Brittany Galli

Announcing Keynote: General John F. Kelly

GSX keynote speaker Gen. John F. Kelly

Gen. John F. Kelly

General John F. Kelly, U.S. Marine Corps (RET) to Speak on Geopolitics and Security

Join us at Global Security Exchange (GSX), 8-12 September 2019, and enjoy a truly engaging experience, that includes hearing unique and high-level insights from one of America’s most respected generals.

General Kelly’s keynote presentation will start Military and Law Enforcement Appreciation Day off at 8:30 am. GSX will honor all military, law enforcement, and first responders with a full complimentary day of education sessions and access to our exhibit hall—an interactive learning lab full of immersive experiences and cutting-edge technology.

Geopolitics and Security

In a world where dictators are falling and rising, governments posture for a greater impact on the global stage, and information is the critical currency, who will emerge and where will opportunities exist? The face of security changed forever on 11 September 2001, and General Kelly, a 4-Star General, U.S. Secretary of Homeland Security, and White House Chief of Staff, has continued to protect the United States both abroad and at home. His unique ability to provide first-hand insight into the evolving geopolitical landscape around the world is valuable when contextualizing the United States’ security priorities from a historical, current, and future prospective. Gen. Kelly will share his insights on the trends, risks, and potential rewards amid the ‘hot spots’ around the globe, and the role the U.S. plays (and should play), in our nation and world’s security.

Secretary Kelly enlisted in the Marine Corps in 1970 and went on to serve in a number of command, staff, and school assignments. During his command of SOUTHCOM, he worked closely with professionals in U.S. law enforcement, particularly the FBI and DEA, and the Department of Homeland Security, dealing with the flow of drugs, people, and other threats against the U.S. homeland. He went on to become the Secretary of Homeland Security before serving his country again as White House Chief of Staff until January 2019.

Don’t forget—free admission for military and law enforcement professionals!

Military and Law Enforcement Appreciation Day honors the individuals who make our communities and world a safer place. As a thank you for your service, all law enforcement, military, and first responders get FREE one-day admission to GSX on Wednesday, 11 September.

Register today! Use the code “THANKS” when registering to receive the free pass.​

 

We are excited to welcome you to Chicago!

We are excited to welcome you to Chicago!

Hello, everyone!

I am very pleased to announce that registration is open for GSX 2019. On behalf of the Chicago Chapter of ASIS International, we look forward to welcoming you to the industry’s flagship event, Global Security Exchange (GSX).

GSX continues to elevate the attendee experience with thought-provoking educational programs and valuable networking opportunities with like-minded industry professionals. In addition, there is an interactive trade show floor that allows you to explore both current and future security landscapes, exchange key ideas and best practices, expand global connections, and have the opportunity to see new innovations firsthand.

I invite all GSX attendees to take advantage of our wonderful city while you are here for GSX 2019. If you have any questions about getting around Chicago, or just need a tip for planning a business dinner, please don’t hesitate to post any questions or comments in the GSX Community.

I look forward to seeing you in September! REGISTER TODAY

Regards,

Grant Miller, MCJ, LEED Green Associate
Chairman – ASIS Chicago Chapter 003
[email protected]
asischicago.net

Welcome to Global Security Exchange

The time has finally come. Global Security Exchange (GSX) is just one day away, and in the first year of its rebrand following a 63-year history as the ASIS International Annual Seminar and Exhibits, this powerful, action-packed conference is set to deliver the solutions, networking, and world-class experience you have come to expect from the industry’s flagship event – multiplied.

More than just a new name, GSX reflects ASIS International’s commitment to unite the full spectrum of security – cyber and operational professionals from all verticals across the private and public sectors, allied organizations and partners, and the industry’s top service and solutions providers – for the most comprehensive security event in the world.

When you look around, you’ll notice that GSX is not your typical security conference. We left no stone unturned when it came to providing maximum value for your education dollars. From field expert keynotes and modernized education sessions to exceptional networking opportunities and a reimagined showroom floor, we set out to deliver unparalleled opportunities to build relationships, gain valuable insights, and expand your global peer network like never before. And we didn’t stop there…

For those who plan to be in attendance, we encourage you to embrace the professional growth that this week affords. While you’re there be sure to check out the X Stage to get a glimpse of the innovations and ideas that are poised to shape the future of the industry and stop by the Career HQ for a free career coaching session and professional headshot. Witness the intersection of security and technology at the new X-Learning Stages and immerse yourself in the GSX D3 Xperience: Drones, Droids, Defense. And of course, take time to reconnect with friends and forge new relationships at one of the many networking events planned throughout the week.

Even if you couldn’t make it to the conference this year, you can still be a part of the action. Follow the event from home on Facebook and Twitter and participate in the 2018 GSX Community forum. Sign up for Global Access LIVE! to watch the livestream of our industry-leading education sessions, or check out ASIS TV to watch broadcasts that offer expanded access to security best practices, engage new audiences, and ensure professionals like you are able to stay ahead of the security curve.

As the global voice of the security profession, ASIS is committed to helping advance security best practices. Convening the industry at GSX is an important part of that effort. However, this commitment extends well beyond this one week. Remember, we are here to support professionals like you year-round and we’re laser focused on reinvesting all of our efforts back into the education we deliver, the standards we develop, and the communities we serve. With that, we hope you enjoy all the surprises in store for you at GSX 2018.

Creating a Proactive Medical Risk Management Plan for Meetings and Events

By Jonathan Spero, M.D., CEO InHouse Physicians

With corporations placing an increased importance on duty of care, it is a priority for security professionals to have a solid medical risk management plan for meetings before an incident occurs. There is nothing associated with more liability at an event than a medical emergency improperly managed.

Identify all health risks that could be associated with your program.
Include the routine medical emergencies such as a cardiac event or a slip and fall, but also think about the risks specific to your event and location. There will be additional risks for altitude sickness, water sport activities for example. Internationally, there could be infectious disease risks, and potential food and water contamination issues.

Find out what the emergency medical system response time is to your meeting venue.
Average EMS response time is 10-14 minutes and in emergency situations every minute counts. Note the phone extension for hotel security. In the event of an emergency, 911 should be activated by the hotel security team. Ask the director of security at your venue for information on closest (and best) hospitals and urgent care facilities. It’s also a good idea, especially for large venues, to ask what entrance EMS responders should to use to get to your meeting space. Are there two personnel certified in CPR/First Aid that are available 24 hours a day to respond to any medical emergency? Is there an automated external defibrillator, or AED, on the property?

Consider onsite medical support.
Having a physician onsite for your program makes sense in certain circumstances such as large program, offsite board of directors meeting, or an international incentive trip where the standard of care and/or emergency response times may not be acceptable

Join me at Global Security Exchange for session #6209, Medical Risk Management for Meetings and Events on at 2:15 pm on Wednesday, September 26, for additional details on medically risk-proofing meetings. Attendees will receive a checklist of action items on how you can prepare for any type of business gathering.

Exhibitor Profile: Vanderbilt Industries (Booth #2865)

The Rise of Networked Access Control

By Lynn Wood, Product Portfolio Manager, Vanderbilt

We’ve seen the rapid development and expansion of the cloud and Internet of Things (IoT) impact almost every aspect of the security industry; from surveillance technology to video management systems to data storage, the opportunities presented by increasing interconnectivity and communication between devices have revolutionized the way users handle security operations. And the access control market is no exception: according to research by Security Sales & Integration, 71 percent of companies were deploying a networked access control system in 2017.

The once-trusted, traditional mechanical lock-and-key access control systems may still function adequately in some instances, but these technologies can be less secure than newer door solutions. Complications can easily arise, such as in the case of a lost key or if access to a facility needs to be restricted. Security, building management and privacy concerns are likely to develop, as a company may not know who’s entering and exiting the building at all times.

Today’s access control users expect more of an integrated system than a one-size-fits-all solution that is cumbersome to operate and expensive to scale. The shift to networked access control systems takes the hardwiring and complicated installations out of the equation, while also enhancing security and flexibility. A single interface that integrates multiple points of entry and can be accessed through a connected smart device anywhere at any time provides the ultimate simplicity and convenience.

Networked access control technology enables users to achieve two critically important components of a security system: remote and instant accessibility. Deciding whether access to a building should be granted or denied must be an immediate process, and this can quickly be accomplished through a central, networked hub rather than at the door. In the event of a security incident, real-time reporting capabilities facilitate streamlined response and all access can be restricted quickly.

Other useful functions of networked access control systems include the ability for technical queries to be diagnosed and resolved on the go, enabling site issues to be dealt with efficiently, thereby minimizing disruption. Users can also view real-time muster reports to aid in tracking all employees or students in the event of an emergency.

Networked access control solutions, such as Vanderbilt ACT365, take advantage of the increasingly valuable cloud and IoT to supply end users with the freedom they desire through a secure, easy-to-use interface. Features such as remote monitoring, real-time muster reporting and central management contribute to the expanding growth of networked access control and allow users to save time and money while achieving peace of mind.

Can You Be Liable for Your Vendor’s Data Breach?

By Kathy Winger, Attorney at Law

Kathy WingerAs a business attorney, one of my most important obligations is to help clients manage their legal risks, which these days include exposure in the cybersecurity/data breach arena. One expanding area of concern is liability for a third-party vendor’s data breach. If your business shares confidential information with third-party vendors in its line of work, you are now obligated to ensure that those vendors keep that information secure. If the vendor fails to do so, your business could be liable for the damages that flow from a data breach involving your information. Luckily, there are a several ways to help protect your business on this front.

First, be crystal clear about the details of your contract with any third-party vendors. The contract should address your liability versus the vendor’s liability and require indemnification in the event of a vendor data breach. You should also research your vendor’s data security standards and practices to confirm that they are as good or better than your own and are being followed and updated. This should be done at the beginning of the relationship and periodically throughout the contract term. Since you will be depending on your vendor’s security to protect the information you share, it makes sense for you to be mindful of their standards, to make certain that they are followed and to be compensated if you suffer a loss.

Finally, your third-party vendors should confirm that they have adequate and appropriate cyber insurance to cover you in the event of a breach. In fact, if and where possible, the vendor should name your business as an additional insured on its cyber insurance policy.

If you’d like to learn more about this topic and other legal risks that business owners and technology professionals face in the world of cybersecurity and data breaches, join me at Global Security Exchange at 11 am on Tuesday, 25 September for Session #5333, Cybersecurity and Data Breaches from a Business Lawyer’s Perspective.

The information presented here is for general educational purposes only. It does not constitute legal advice and does not create an attorney-client relationship.

6 Ways to Make the Most of Your GSX Xperience

The industry’s flagship event only comes around once a year. With only six days left until GSX, follow these six simple pieces of advice and you’ll be well on your way to making every minute count…

  1. Make a Game Plan

    • Download the GSX 2018 mobile app to browse our record-breaking 350+ session education lineup, speaker bios, build a personalized schedule, locate the most talked about exhibitors, map your route, and more. Search “GSX 2018” on Google Play and the App Store.
  2. Sign Up Ahead of Time

    • Save time and money onsite at GSX 2018 by registering ahead of time. Expo-only passes increase to $75 onsite for non-members. Register today at GSX.org/register.
  3. Get Up Close and Personal

    • The GSX Exhibit Hall is the best place to experience the latest security technologies and innovations. Don’t miss the X Learning Stages, the GSX D3 Xperience, the Con-X-tions Lounge, or the Fireside Chats in the ASIS Hub.
  4. Bring a Friend

    • Adventures are always more fun when you have a friend. Explore the exhibit hall together or divide and conquer to make sure you don’t miss a thing! Spread the word on social media with those who couldn’t attend by using the hashtag #GSX18.
  5. Make Connections

    • Be prepared to meet new people! Don’t forget to bring extra business cards. If you plan to take advantage of the career fair, don’t come empty handed. Bring a few copies of your resume to share to help you score your next big career move!
  6. Pack Accordingly

    • There’s so much to see you don’t want to miss a beat. Make sure you pack the most comfortable shoes to get you through the day. And don’t forget, it might be warm outside, but it can get chilly in the convention center. Don’t forget to bring a sweater to keep you warm.

Drones and College Football Stadium Surveillance

By Richard Ham

Unmanned Aircraft Systems (UAS), commonly referred to as “drones” are changing the face of security surveillance. While some form of autonomous systems has been flying since 1918, the level of expertise and skill required often made them impractical. New sensors and cameras, as well as new safety technology and a workable regulatory environment, have made them not only practical, but the preferred method for large venue surveillance. Three areas of rapid advancement may be the tipping point to your ability to use UAS technology to improve your security posture:

  • A mature regulatory environment with practical waiver processes. Just a few years ago, waivers for operations or controlled airspace could take up to a year. The most recent automated systems allow some airspace waivers instantly and the advent of a remote pilot certificate with training standardized requirements and reduced confusion.
  • New sensors and software improve long distance surveillance without detection. New cameras can read license plates from distances exceeding half a mile and can incorporate facial recognition. Infrared cameras for night flying can detect and differentiate biological forms and are the standard for search and rescue missions covering large areas
  • User friendly UAS platforms with easy to learn programs for autonomous flights. My young students have no pilot skills to compare to UAS flying, but they are very adept at software. With sensors to avoid collision to reduce risk, the remote pilot can program the entire flight and operate it with the push of a button and monitor previously programmed flight plans.

During special events such as NCAA Division I football games or other large events, these three advancements have tipped the scales to reduce risk and improve capability. Nearly all large scale events can improve security surveillance by retaking “the high ground.”

Please join me at GSX for Session #4116, Using Drones for College Football Stadium Surveillance, on 24 September at 10:30 AM.

9 Education Sessions You Don’t Want to Miss

GSX’s largest-ever education program has something for everyone. From workshops to simulations, our 350+ education sessions are bursting with the latest industry knowledge and are designed to deliver actionable takeaways that help shape your security strategy today and in the future.

With just nine days left until GSX begins, we wanted to share with you nine sessions sure to draw a crowd. Make sure you set aside time to check out these valuable discussions.

Register Today

9. The Nightmare that Won’t End: A Negligent Security Mock Trial

Session 4218   |   Monday, 24 September   |   2:15 – 4:15pm   |   N113-114

The scenario: A criminal who was not supposed to be on site commits a horrible act on company property. A letter arrives. The company is being sued. Soon the director of security is in a courtroom with a lawyer, second guessing every decision. In a mock trial, lawyers and security personnel present patterns of testimony that show how to and how not to deal with the dreaded lawsuit. The result will help others learn not only how to get through such a lawsuit, but also what steps to take beforehand to prevent the initial tragedy.

8. Facility Security Design from Conception to Completion

Session 4222   |   Monday, 24 September   |   2:15 – 4:15pm   |   N201-204

Developing physical security systems requires professionals to have a solid understanding of the design process. Come away with a basic understanding of the process by completing a real-world project. Learn how to conduct risk assessments, develop functional requirements, and identify mitigation measures that are the basis of design. Understand how to translate the requirements into construction documents and apply the tools and techniques into a virtual facility. The process and skills discussed are reinforced through interactive learning and the sharing of knowledge among the participants.

7. How to Adapt Your Security Posture to the Infusion of Drones

Session 4203   |   Monday, 24 September   |   2:15 – 3:30pm   |   N209–212

With the rapid deployment of small drones across the globe, security organizations are scrambling to become familiar with the threat they represent as well as with ways to use this new technology as a force-multiplying asset. Learn from drone industry professionals and a physical security design engineer about the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Come away with answers to various questions, such as How can drone flights be detected? Are drones trespassing? Can drones be stopped in the air?

6. Innovations in Soft Target Protection

Session 4313   |   Monday, 24 September   |   3:45 – 5:00pm   |   N109-110

An increase in attacks on soft targets around the world challenges security professionals to deploy innovative security measures capable of deterring, detecting, and preventing terrorist and idiosyncratic attacks. At the same time, the measures used must accommodate critical business requirements. Review highly-effective security strategies, proven methods, and the proper design of security operations that minimize the potential for attacks but recognize the functional needs of a typical soft targets. Examine examples of proper security designs at publicly accessible facilities and venues.

5. School Emergency Preparedness Using a Tabletop Exercise

Session 4306   |   Monday, 24 September   |   3:45 – 5:00pm   |   N205-208

During any emergency, security professionals must be able to draw from all available resources. The special skills, training, and capabilities of staff play a vital role in coping with the effects of any disaster as well as its aftermath. Working in teams, participants take on specific roles (spokesperson, scribe, stakeholder). After an emergency scenario is introduced, participants draw on the experiences of their team members then share responses as the scenario unfolds.

4. Defending Against Vehicle Ramming Attacks

Session 5118   |   Tuesday, 25 September   |   11:00am – 12:15pm   |   N119

Vehicle ramming attacks are on the rise. As security measures have become more sophisticated and effective, violent extremists have responded with attack methods that require little preparation and can be carried out by a single individual. Working together, local governments and the private sector can devise mitigation strategies to help protect lives. Join representatives from two public-private security partnerships, Hennepin County Sheriff’s Office Shield in Minneapolis and NYPD SHIELD in New York City, to discuss how cities are addressing this deadly threat.

3. Manage Your Security Organization Through ESRM

Session 5207   |   Tuesday, 25 September   |   2:00 – 3:00pm   |   N113-114

Are you a C/ISO or security executive having a difficult time developing a career map for your team? Are you a security Manager or Director having a difficult time communicating the “vision of security” from your level to your reports? Are you a line supervisor struggling to lead a guard force? Come learn how Enterprise Security Risk Management, or ESRM, can help provide performance expectations to all career levels across a security organization. You will also learn how ESRM can help security personnel understand how to elevate themselves in this dynamic and ever-changing industry.

2. Building a Security Program from Scratch

Session 6220   |   Wednesday, 26 September   |   2:15 – 4:15pm   |   N111-112

Imagine that a newly-hired director of security has been asked to create a security plan by the organization’s C-suite. The director knows that a successful physical protection program includes the effective integration of people, policies and procedures, and technologies, but can the plan help determine the best choices for this new organization? How can the findings be presented effectively to the C-suite? Come away with the basics needed to prepare a security plan that includes threat identification and risk mitigation. From selecting the right technology, to creating a balanced budget, to integrating ESRM, learn how to create a tailor-made security program for an organization.

1. How to Position Yourself for the Careers of the Future

Session 7003   |   Thursday, 27 September   |   11:30am – 12:30pm   |   Career Center

Available with a FREE Expo-Only Pass. Register Today!

We are bombarded with news reports and studies about how some jobs will disappear in the future or be done by robots. How do we position ourselves for careers with longevity and for the new careers of the future? Our panel will share their insights on the careers of the future and provide guidance on how you can position yourself for future success and ensure you are gaining the skills needed to have a resilient career.

Top 10 Reasons to Get Your FREE Expo-Only Pass

We’re officially within 10 days of Global Security Exchange (GSX) 2018! As the industry’s flagship event for more than 60 years, the newly rebranded GSX—formerly the ASIS International Annual Seminar and Exhibits—will deliver exciting updates to its annual conference at the Las Vegas Convention Center this year.

With an expected 22,000 registered attendees, GSX is one of the largest gatherings of security professionals in the world—bringing together cyber and operational security professionals, vendor partners, media, students, and allied organizations for enhanced learning, career development opportunities, and access to the innovative technologies shaping how business gets done.

Not sure whether a free expo-only pass is worth your time? Here are 10 reasons why…

1. To check out the interactive GSX D3 Experience – *New this year!*

Join us in this new feature area for education and hands-on demos exploring unmanned and interactive robotics. If you are looking to implement a drone program within your organization, need to hire a drone-as-a-service company to augment security, are concerned about how to counter the threat of rogue operators, seek to understand how to harden your facility to prying eyes or more dangerous incursions, or just want to learn about the latest cutting edge technologies, the GSX D3 Xperience will open your eyes to new possibilities!

PLUS— have the chance to take your own turn at the commands to pilot a drone through the “gauntlet”—our own UAV obstacle course where the winning time will take home a DJI Phantom Pro system.

The GSX D3 Experience is a brand-new exhibit hall feature brought to GSX 2018 with the support of the Association for Unmanned Vehicle Systems International (AUVSI).

2. To immerse yourself in one of our three X-Learning stages

Each X-Learning stage has its own style and content and is designed to offer the security practitioner something unique. Those stages include:

The X Stage (Booth #4042) –Discussions at this stage cover topics such as frontier technology, innovation, and the future of security. Dynamic and  leading-edge educational tracks, panels, and discussions focused on embracing technology to find effective solutions to security challenges make the X-Stage a must-see stage.
The Xperience Stage (Booth #141) – This stage is all about case studies, evidence of effectiveness, and the argument for efficiency. Here, you’ll find showcases of tried-and-true best practices and conversations that are focused on underlining success factors, rather than the value of a specific product.
The Xcelerated Exchange Stage (Booth #151) – At this stage, enjoy town hall-style discussions, debates around current security challenges, and various applications of technology and procedure. This stage provides a forum for the discussions that need to take place between practitioners and solution providers to propel the industry forward.

3. To mingle with your fellow professionals at the Con-X-tions Lounge

Continue the conversation from the X Stages, while also recharging, relaxing and networking with peers. The Con-X-tions Lounge is THE place to be as our industry-leading speakers socialize with GSX-goers after their X Stage presentations.

4. To beef up your career game at our Career HQ

Be sure to stop by Career HQ, where you’ll find FREE resume reviews, a professional Headshot Studio with award-winning photographers and makeup artists, one-on-one career coaching sessions, professional development sessions, and networking opportunities with leading employers and industry professionals.

5. To scope out your next career move at the Career Fair

As we speak, organizations like the Department of Homeland Security and Apple are looking to hire talent like you, and they know that the best talent around will be at the Career HQ Career Fair.

Register in advance to increase your opportunity to interact with employers before, during, and after the event!

6. To catch the illuminating address by Thursday’s keynote speaker, K.T. McFarland

McFarland will close out the conference on Thursday, 27 September with her address, which will take attendees on a fast-paced geopolitical tour around the globe. As the first deputy national security advisor in the Trump Administration, she will share an insider’s perspective on critical foreign policy and defense issues. The Thursday is open to all GSX registrants—including those with Expo-Only registration.

7. To get exclusive access to the International Trade Center

GSX 2018 is proud to be a participant in the U.S. Department of Commerce International Buyer Program (IBP), which recognizes the event’s worldwide importance in the security industry. All attendees and exhibitors are invited to stop by the International Trade Center, where you’ll find:

• Private conference rooms for meetings
• Interpreters
• Export counseling by U.S. Department of Commerce trade specialists
• Matchmaking services for international attendees and exhibitors
• Export directory of exhibitors
• Relaxing lounge to relax and recharge

8. To get the skinny about the latest industry resources at the ASIS Hub

ASIS International thrives on providing its members with the resources, tools, and connections to grow professionally. Visit the ASIS Hub, Booth #3557 to learn more and take advantage of all that we have to offer, including:
• Fireside Chats
• Council Pods
• Passport Prize Drop Off
• Charging Lounge

9. To get access to the FREE ASIS Happy Hour on the show room floor

Join us for happy hour in the exhibit hall to celebrate the end of the first day of the show! Enjoy complimentary drinks as you network with your peers and colleagues and explore essential solutions at this interactive happy hour, designed to increase your connections.

10. Networking, Networking, Networking

Connections are made all throughout GSX—in exhibit hall sessions, receptions, lunches, and the exhibit hall—you never know who you’ll meet next! And there’s no better place to network with the global security community than these must-attend events. Don’t miss this once a year opportunity!

 

Register for your Expo-Only Pass Today