BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Protecting Enterprises from External Threats

Mark Brown3 Perimeter Protection Technologies Large Enterprises Should Implement

By Mark Brown, Director of Security and Surveillance, FLIR Systems, Inc.

Enterprises face many physical security challenges, from monitoring multiple sites simultaneously to preventing unauthorized entry. Designing a system to meet the needs of a property can be a complex and costly undertaking, which is why the automation and reliability of wide-area monitoring and perimeter systems are critical. By combing thermal imaging cameras and radar technology through command and control software, organizations can find themselves better protected and prepared to handle threats.

Detect
Frequently used by the DoD market, surveillance radar is a proven technology with varying coverage ranges. Radars work simply by utilizing radio waves, and can detect an object’s location, movement, speed and direction. When strategically placed at a protected site, radars can detect, track and even classify moving objects in real-time. Because there is no video component, radar technology works rain or shine, and does not require light to function optimally, allowing for 24/7 continuous coverage.

Assess
Once a target is detected by radar, thermal imaging cameras can slew to the cue of the radar to view the target for further assessment. Much like radars, thermal cameras allow for 24/7 coverage since they to do require visible light to produce images. Thermal cameras utilize heat emitted by all objects, enabling them to “see” in total darkness as well as in light rain or fog. They provide superior image contrast for classification analytics performance in outdoor environments, allowing for more reliable alarms. Dual sensor solutions with both thermal and visible light cameras can provide even more situational awareness. While the thermal camera with built-in analytics can accurately classify whether an approaching target is a human, the optical camera allows security personnel to identify the intruder.

Respond
Command and control software is the piece of the perimeter security puzzle that brings everything together, providing users with a way to combine technologies in a scalable and flexible system. By providing static and dynamic GIS maps of protected sites, security officers can watch in real-time as objects approach their perimeter. Configurable zones allow for both “restricted” areas and high trafficked zones, cutting down on false alarm rates and saving security efforts for true events.

Join me at Global Security Exchange at 11 am on Tuesday, 25 September as I explore the future of perimeter protection technologies for education session number 5111, Protecting Enterprises from External Threats through Intrusion Detection.

Exhibitor Profile: Vistacom (Booth #2967)

The Command Center of the Future

Vistacom Control Room SolutionsBy Dan Gundry, National Control Room Sales Director, Vistacom

At the center of an enterprise organization’s security operation stands its nucleus, arguably one of the most important pieces for overall functionality and efficiency: a command center or Security Operations Center (SOC). A place where a variety of systems and solutions come together, the command center exists to provide a common operational picture, mitigate threats, and promote enhanced communication during an incident.

The goal of any command center is to monitor, assess, and respond to a variety of threats and incidents. As technologies advance and trends develop, so too do the strategies in place to meet this goal. Looking ahead, we can expect to see the following elements shape the command center of the future:

Convergence

  • Systems. Command centers today combine a number of security components, such as video, audio, video management, access control, intrusion, and more. But as end users demand an emphasis on the full umbrella of security rather than small silos, we’re starting to see facilities include additional pieces, such as risk and threat assessment, employee travel, and social media monitoring.
  • Data incorporation. Almost all of the latest devices and applications are driving big data; the amount of information available to command centers will only continue to increase, and as analytics improve, effective data aggregation must follow. The command center of the future will include dashboards that can make sense of a large amount of information and put it in a digestible format to drive streamlined decision-making.
  • Network. The wall between cyber and physical security has begun to come down, as stakeholders realize the need for collaboration to protect the entire enterprise. Visualization platforms in command centers, such as video walls, will take advantage of the growing and valuable network architecture, resulting in less hardware, more redundancy, and more reliability.
  • Communication. No longer are the days when all decision makers are in the same area as the command center. They are spread out across buildings, campuses, or even farther. Communications must include the ability to send a shared perspective of real-time content about a situation from within the four walls of the command center and beyond to first responders and stakeholders no matter where they may be to make informed decisions and implement responses.

Artificial Intelligence
Today’s security threats require a predictive and preventative stance, and emerging technologies such as analytics and machine learning allow security operators to stay ahead of the game. Artificial intelligence (AI) enables the ability to learn behaviors, making the detection and communication of anomalies easier and responsiveness more comprehensive. Tools that automate situational awareness and integrate platforms can provide operators with more timely and accurate information upon which they can base their decisions.

Virtual and Augmented Reality
The command center of the future will likely contain fewer brick-and-mortar aspects and more virtual concepts throughout. Forms of augmented reality will facilitate the merging of video with big data for an even more enhanced operational landscape, improving overall collaborations and responsiveness.

Enterprise organizations rely on their SOC for business operations and in times of an emergency, and as risks become more severe, a complete situational picture is necessary. Convergence, AI, and virtual reality will allow operators in command centers to achieve this by promoting automation, awareness, and rapid responses.

To see the Command Center of the Future at GSX 2018 by ASIS International, visit Vistacom at Booth #2967.

Introducing the GSX 2018 Community

By Joe McDonald, CPP, PSP

Hello, everyone! On behalf of the Las Vegas Chapter of ASIS International, we look forward to welcoming you to the industry’s flagship event, Global Security Exchange (GSX).

I am especially pleased to be able to kick off the GSX Community site today. This platform provides a terrific opportunity to connect with colleagues, keep updated on program news and updates, learn about exhibit hall promotions, and to share your experiences onsite – those “ah ha” moments and key educational takeaways. There will also be the occasional surprise along the way so be sure to check in daily.

I invite all GSX attendees to take advantage of this community. If you have any questions about getting around Las Vegas or just need a tip for planning a business dinner, please don’t hesitate to post them there.

I look forward to seeing you in a few weeks!

Bradley D. Spacy and K.T. McFarland Announced for Global Security Exchange Keynote Lineup

ASIS GSX Keynote Speakers - Air Force Major General Bradley D. Spacy and former Trump Administration Deputy National Security Advisor K.T. McFarlandAir Force Major General Bradley D. Spacy and former Trump Administration Deputy National Security Advisor K.T. McFarland are joining CNN host Fareed Zakaria and futurist Scott Klososky in next month’s GSX keynote lineup.

As Commander of the Air Force Installation and Mission Support Center, General Spacy is responsible for mission support capabilities to 77 Air Force installations, nine major commands and two direct reporting units with an annual budget of approximately $10 billion.

His Sept. 26 keynote, kicking off Military and Law Enforcement Appreciation Day at GSX, will examine the changing security landscape, both in the U.S. and around the world.

In addition, Spacy will provide details on the new AFWERX innovation and tech hub in Las Vegas and how the Air Force is looking to collaborate with the private sector to bring new security product ideas to market. Attendees will also learn about the evolving AFWERX/ASIS partnership and will be the first to hear a special announcement about the AFWERX Challenge.

McFarland will close out the conference on Sept. 27 with her address, which will take attendees on a fast-paced geopolitical tour around the globe. As the first deputy national security advisor in the Trump Administration, she will share an insider’s perspective on critical foreign policy and defense issues. McFarland’s presentation is open to all GSX registrants—including those with Expo-Only registration.

With a keynote lineup featuring recognized experts in global affairs, technological innovation and industry transformation, GSX delivers a truly comprehensive global event.

Visit our keynotes page to view complete session descriptions for each day’s address.

An Australian Perspective on a Security Systems Installation Project

By Paul Ducker

Integrating security projects within a large public transport department in a state the size of Texas with just one law enforcement agency is challenging at the best of times. There are so many hurdles to negotiate whilst managing competing priorities. When you involve public assets, using public money, it’s multiplied tenfold. It all comes down to negotiation and experience in dealing with challenges such as:

  • The suspicion that comes with people tasking you to secure ‘their’ asset
  • The always present ‘time and budget’ restraints
  • Integrating the project to complement the day-to-day operations of the asset
  • Obtaining the best outcome for the organization, the staff, and the asset

Taking the easy way, just to get the project completed, is never the right way. We operate in a business where the key factor is integrity. My name is on every project, and I stand behind each one. It’s not easy. It’s frustrating and time consuming. But that’s why we are in this business.

At the ASIS International Global Security Exchange (GSX), I will present a case study detailing the sometimes ‘Australian’ methods in ensuring a project is completed on time, on target, and on budget, including:

  • Red teaming and getting in the mind of the offender (breaking down the Westminster Bridge Attack)
  • Providing benefits to asset managers, staff, and the organization that they never thought possible
  • Reducing cameras to increase security
  • Increasing protection to an asset by removing 30 bollards from a proposed construction project (installing only two) and saving $800,000

I hope you will come to session #5116, An Australian Perspective on a Security Systems Installation Project, at 11:00 am on Tuesday, 25 September. Learn a little more about our security environment, how we assess each project, and learning through mistakes and successes. You will have a few laughs and come away with some different ways looking at what you see every day.

Cybersmart Buildings: Investments in Connectivity and Automation

By Jason Rosselot, CPP, CISSP

Your building is talking.

Can you quiet it down before hackers hear?

“Door held open.” “Object left behind.” “Access granted.” Building systems—from security and life safety systems to building automation and controls—generate and process data 24/7/365. Today’s buildings and the people, assets, and information protected by them are comprised of systems of systems and networks of networks. Unfortunately, most security professionals don’t speak the language of IT and cyber, and as a result, those buildings and everything in them is left vulnerable.

Is the answer to have IT take over building systems? Should the security department focus only on mechanical keyed locks and physical barriers? Do we even have keyed locks anymore? The answers are resoundingly “no”, “no”, and “yes”. While building systems are becoming increasingly connected and often leverage much of the IT infrastructure that the rest of the organization relies on, there is no reason the security department shouldn’t evolve to effectively manage their own systems and devices. Everyone in the security department doesn’t need to run out and get a Cisco certification, but clearly there is a need for at least one person on the team to take on the mantel of “security technologist.”

When Booz Allen Hamilton, who staffs a tremendous amount of the U.S. offensive cyber capability, and Johnson Controls, who helped launch the building controls industry, began discussing the cybersecurity posture of critical building systems, it was apparent to both companies that from the manufacturer to the integrator, and finally sitting with the customer, the need to raise awareness and educate was at a critical juncture. The tremendous benefits of connectivity and automation in building systems are increasingly becoming at risk as the key stakeholders in the ecosystem of building are unaware of how their action or inaction to design, develop, and deploy systems with cybersecurity built in are increasing their risk. In the case of security and life safety systems, the very systems purchased to protect assets may actually be putting those assets at risk.

Join me at 3:30 p.m. on Tuesday, September 25th at Global Security Exchange (GSX) for Session #5326, Cybersmart Buildings: Investments in Connectivity and Automation.

OSPAs Finalists Announced

OSPAs Finalists Announced

Now in their third year, the U.S. 2018 U.S. Outstanding Security Performance Awards (OSPAs) are part of a global awards program to recognize and reward companies, teams, and individuals who have performed at an exceptional level within the security sector.

The full list of finalists are:

Outstanding In-House Security Manager/Director

  • Major Alexander R. Liggett – 11th Security Support Squadron
  • Raymond Gerwitz – Executive Director, Deputy Chief Security Officer – MD Anderson Cancer Centre

Outstanding Security Team

  • Allied Universal SJURT Puerto Rico
  • Hillsboro Technical Operations Security
  • Sodexo

Outstanding Security Consultant

  • Luke Bencie – Security Management International
  • Michael Glasser – Glasser Security Group
  • Michael A. Silva, CPP – Silva Consultants

Outstanding Contract Security Company (Guarding)

  • Admiral Security Services
  • Global Elite Group Inc
  • Sodexo Inc

Outstanding Security Training Initiative

  • Bloomberg Security Operations
  • Matthew W. Doherty – Hilard Heintze
  • Wombat Security, a division of Proofpoint

Outstanding Security Equipment Manufacturer

  • IDIS America
  • Kisi Inc
  • SmartWater CSI LLC

Outstanding Security Officer

  • Cynthia Hale – Allied Universal
  • Richard W. Sullivan – FBI Phoenix Division

Outstanding Young Security Professional

  • Drew Weston – CodeLynx
  • Eric Oleksy – Allied Universal
  • Russell Mallette, CPP – Allied Universal

Winners will be announced on-site at GSX during a networking luncheon on Monday, 24 September. Tickets for the luncheon are included with an All-Access pass, or can be purchased for $90 with a free Expo-Only pass. Learn more about registration options for GSX and register today.

Increasing The Ability To Survive In Critical Trauma Incidents

By Richard Smith

The horrific events in Parkland, Florida, Sutherland Springs, Texas, and, unfortunately, other locations around the U.S., have propelled a nationwide conversation on preventing and responding to an active shooter situation. This dialogue has led to an increase in training focused on empowering people to take action—to heed the DHS recommendation to ‘run, hide, fight’. By taking part in this discussion and participating in these trainings, we’re actively working to reduce the number of victims.

These critical conversations are one (very important) piece of the puzzle. We must also have a frank discussion about what happens if prevention fails. Essential to surviving the first ten minutes of a critical incident—whether it be an active shooter scenario or a significant weather event—is knowing how to control severe blood loss.

Recent mass casualty events, like last year’s hotel shooting in Las Vegas or the Boston Marathon bombings, saw lives saved as bystanders—“immediate responders” if you will—began administering aid before trained first responders arrived. Many of these immediate responders were medical, military, or off-duty law enforcement personnel who had one thing in common: hemorrhage control training.

The role of the immediate responder is a crucial one in helping people survive future active shooter events. Consider that the average EMS response time in an urban area is seven minutes—longer in rural areas—and even after EMS has arrived on scene, there may still be a delay as law enforcement secures the area. Yet a person can bleed to death in three to five minutes, depending on the severity of injury.

Can every one of those victims afford those seven minutes, or more? We must train and equip employees, security, teachers, and, sadly, even our children, to survive should the worst happen.

Join me on Wednesday, 26 September at the 2018 Global Security Exchange GSX 2018 for Session #6221, Surviving the First 10 Minutes: Increasing The Ability to Survive in Critical Trauma Incidents. I will present on the role of the immediate responder and demonstrate equipment recommended for their use.

School Security the Focus of ASIS International 2018 Security Cares Program

Boon Edam at ASIS 2017

Free education at Global Security Exchange to address school violence prevention and response; panelists include Las Vegas law enforcement, government, mental health, and security professionals

ASIS International’s free Security Cares education program will provide the Las Vegas community with access to important school security discussions led by ASIS School Safety and Security Council experts. Topics include pre-violence indicators, target hardening, and best practices on how to engage the entire community—school administrators, law enforcement, security professionals, and mental health providers—in the effort.

The program kicks-off with a Tuesday, Sept. 25 “School Security: Beyond the Headlines” panel at 12:30 pm PT that will be live streamed from the exhibit hall on www.GSX.org. Speakers from the ASIS School Safety and Security Council will discuss active shooter and the conditions that lead to these acts of violence, the use of data and analytics in prevention, technology and procurement assessment, and measures that can be taken to secure soft targets.

The Wednesday, Sept. 26, in-person program at the Las Vegas Convention Center will take a deep dive into the role communities play in keeping schools safe. Panelists will examine pre-violence indicators, implementing ‘see something, say something’ policies, issues surrounding how reported behaviors are escalated, resources available to connect at-risk individuals, and the importance of taking a collaborative approach to assess threats. The program will wrap up with a tabletop exercise designed to provide attendees with a real-world example and best practices to take back to their communities.

View program details and register at GSX.org/securitycares.

Exhibitor Profile: Boon Edam (Booth #1715)

Boon Edam at ASIS 2017 Security entrances are a critical part of any facility’s overall security plan. Ideally, they are part of a layered approach to security that includes the appropriate elements for the needs of the facility, the level of sensitivity of the work or materials that are housed there, and the number and type of people that need to enter or exit the facility on an hourly or daily basis. But, did you know that not all of them are the same or work the same way? We believe the more familiar you are with security entrance types and capabilities in terms of their impact and risk mitigation level, the better.

The User Knowledge Challenge

Real security entrances won’t fit in your pocket or briefcase, so potential users need opportunities to see these products first hand. They can witness demonstrations, explore strengths and weaknesses, and have experts on hand to discuss impacts to the organization in terms of people, process and technology, integration, and more. That is what makes the GSX show an ideal venue to put a range of offerings on display and meet with potential users, installers and specifiers to help them increase their first-hand knowledge about these security problem-solvers.

For example, one of the many innovative products we will be highlighting this year is the Boon Edam Circlelock Combi. The Circlelock Combi is a cylindrical mantrap portal solution that has a sliding door on one end and an opening on the other end that is designed to be mounted to an existing wall and swing door. Because of this design, it can be fastened, for example, to an existing fire-rated door, converting it instantly into a mantrap solution that prevents piggybacking 24/7 and eliminates the need for manned supervision, all while maintaining the fire rating and benefits of the swing door.

GSX Supports Users and Integrators Alike

By bringing a variety of products and demonstrating them at the show, we are able to strengthen and improve our communication with integrators and potential users alike, making them aware of solutions they may not realize are already available, as well as answering questions. At this year’s show, we are able to clearly show how the Circlelock Combi mentioned above can save considerable space compared to the traditional, DIY mantrap vestibule design. It can also easily implement multi-factor authentication using a wide variety of biometric identity verification technologies, including iris and facial recognition, in addition to traditional keypads and other devices. Seeing this solution in person is the best way to understand it and get a sense of its extremely high security level and the smoothness of the user experience.

The broad attendance of the show, and even the presence of other exhibitors, can also help reinforce our efforts. For example, while we often find that security staff are aware of Boon Edam, general management may also attend this show, and thus the security staff may have an opportunity to bring these managers to our booth for a closer look. And because attendees may have just learned about other related security technologies such as iris recognition during their visit, it is a perfect opportunity to tie these ideas together and discuss how their security challenges can be best met.

We always enjoy the direct interaction and questions we get from GSX show attendees, as every project is unique and has its own special challenges. Keep them coming and we hope to see you there!

Multigenerational Strategic Leadership

By Brittany Galli

Why do we consistently wonder why we aren’t farther ahead in our profession or respected like we want to be? The 5 essential traits of great leaders reflect personal attributes, not roles inherent to the position. We sometimes forget how these foundational steps are the things that can either earn us the next promotion or lose us the job.

Grow Your EQ and Connections: Make authentic, valuable, strategic connections and foster them. Manners in the workplace should not be forgotten. Have you said thank you to every person on your team this week for something they’ve done, something they’ve delivered or for the way they acted in a situation?

Use Your Resources: On LinkedIn, always send a note with any connection you make. Something as simple as “Great connecting with you- let me know if I can ever help you” or “Great hearing your thoughts today on ESRM – have a great week ahead.” can help you in the future more than you know.

Be the Mentor You Would Want: Mentors get the most workplace kudos. People in the workplace will talk about you in one light or another – it’s your responsibility to make them say things like “He’s a great mentor,” or “She really helped me when I couldn’t figure out how to deal with this person.”

Self-Promotion: How do you promote yourself? Do you hang 5k T-shirts in your office or desk? Do people even know you outside of work? Do they know that you give away 100 lbs. of canned goods to families during the month? Or help with a foster agency in your spare time? Promote yourself in all facets of life and what keeps you going – people want to connect with people and they need topics to do so.

Millennials are Starving for Wisdom – Use Them! It’s now a widely found statistic that members of older generations who are receiving promotions are the ones that leverage younger generations to learn how to get ahead. Learn from millennials in your life – harness them for a 1 hour per week meeting to learn something you don’t know – Excel, Instagram or how to share photos on your phone via airdrop. Then – reward them for it. Offer your own knowledge of a leadership craft or strategy they haven’t experienced yet.

Join us Tuesday, September 25th at 11 am to learn more about these topics and Multigenerational Strategic Leadership Guidance: How to be Seen, with a strategic roadmap presented by Maria Dominguez, CPP – SVP, Bank of America and Brittany Galli – Chief Success Officer, Mobotour.

Young Professionals GSX Experience Now Accepting Applications

Applications due: COB 17 August 2018

2017 award winners Scot Nabors (left) and Rachael Paskvan (right) pose with ASIS International Board Member Tim McCreight, CPP.

Since 2014, the ASIS Young Professionals Council has helped young professionals attend the annual ASIS conference and provided them with tremendous opportunities for security education, networking, and professional development. The 2018 Global Security Exchange (GSX) Experience award winner(s) will receive the following:

  • One complimentary All‐Access Pass to Global Security Exchange (GSX), 23 –27 September in Las Vegas, Nevada USA
  • Lodging for four nights (Sunday – Wednesday)
  • Airfare voucher or credit (not to exceed $500)
  • Recognition throughout the annual meeting and ASIS TV interview
  • One President’s Reception ticket
  • One Opening Night Celebration ticket

For consideration to receive this award, please complete the application in full, inclusive of the personal statement.

Submissions are due COB 17 August 2018 by email to Manuela Turner at [email protected].

ELIGIBILITY: Only young professionals who are ASIS members in good standing are eligible to apply. In addition, the incumbent should not have received an ASIS‐sanctioned award within the past year. Young professionals are defined as those 40‐years old or younger.

CRITERIA: Recipient(s) will be selected based on the need expressed in the application. A panel of ASIS members  will review all applications. Winners will be notified by email on, or before, 7 September 2018.

Please note: Winners are responsible for their own ground transportation and any incidental costs  accrued, including additional in-room costs and any meals not provided through the All‐Access Pass registration. Winners may be asked to provide a write‐up of their experience following the conference.

Download the Application