BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Expect Xceptional Value at GSX

In July, we updated you on the new features that will be arriving on the Global Security Exchange (GSX) show floor this September, including a new career fair, the GSX D3 Xperience—providing hands-on demos surrounding unmanned drones, droids, and defense systems—and more. Now, we’d like to share an update on the record-breaking and yet still growing GSX conference program.

Cyber Security Summit—a meeting of top government, industry, and academia thought leaders to exchange ideas and engage in a dialogue to improve the state of cyber security—will co-locate with GSX, beginning on Wednesday, 26 September. With the addition of this event to the GSX program, attendees gain access to insights from Fortune 500 CISOs and high-level government leaders that aren’t just talking about cyber security—they’re living it.

A sampling of Cyber Security Summit sessions includes:

  • Cyber Security from the War Room to the Board Room
  • Cultural Barriers & Divides between Physical & Cyber Security
  • Maintaining Cyber Readiness in an Evolving Threat Landscape
  • Panel: The Diverse Talent Gap in IT/Cyber Security
  • How Physical Vulnerabilities Can Be Used to Facilitate Cyber Attacks
  • ROI and Risk-Based Cybersecurity Investment

Cyber Security Summit joins event partners InfraGard and ISSA, as well as dozens of supporting organizations representing a range of industry verticals, for the world’s most comprehensive security event.

Education on the GSX show floor is expanding as well, with new sessions announced for Career HQ—the site of free resume reviews, a headshot lounge, and the new career fair. Programming supported by the ASIS Young Professionals council includes valuable topics, like:

  • How to Stand-Out in a Competitive Global Job Market
  • CSO Path to the Top Panel: The Resilient Plan for Career Success
  • Building Your Career Toolkit
  • Finding from the ASIS-SIA Career Pathways Initiative
  • How to Position Yourself for the Careers of the Future

Make the most of your time in Vegas by adding a classroom program from our growing Pre-Conference lineup. These programs taking place before GSX include certification reviews and courses covering the ESRM lifecycle, policy writing, security consulting, and issues in gaming security.

Register for GSX by 10 August to save $100 on your All-Access pass.

Evaluating Building Layouts to Mitigate Active Assailant Threats

By Timothy Brewer

With 2017 and 2018 both setting unfortunate new records for the number of active shooter situations, the very real and growing threat of armed assailant attacks is clear. Events such as the school shootings in Parkland, FL and Sante Fe, Texas remind us that such atrocities are regularly perpetrated against the most vulnerable members of our society, and as security professionals we must do all that we can to address this issue.

Much excellent work is being conducted to better understand behavioral science, identify indicators of a potential attacker, and secure facilities, but such measures can never be 100% effective, and tragically, 71% of attackers are able to walk legitimately and unhindered through the entrance of the facility that they are about to attack.

The average active assailant attack lasts 12.5 minutes, while the average police response time is 18 minutes, so the majority of victims in such scenarios must therefore either attempt to escape or survive within their environment. Training, drills, and communication are key components in reducing the impacts of such attacks, but security professionals should also be aware of the role that the physical fabric of the school can play in preserving life. The opportunities to exit the building quickly, safely, and without coming into contact with the attacker(s) should be maximized, and where exit is either not possible or not advised due to the threat, physical protective measures should provide an effective shelter for occupants.

In Las Vegas this September, I will be discussing the psychology and movement of building occupants during an active assailant event and describing how security design and assessment can benefit from a better understanding of the implications of the building layout on the outcomes of the attack. Attendees can gain insight into design examples which demonstrably improve and hinder building egress under conditions of panic; better understand existing and upcoming industry guidance document on this topic; and will be able to take this knowledge into their own organizations to encourage leaders to innovate security design for active assailant threats.

Join us for Evaluating the Safety of Building Layouts In Light of Active Assailant Threats at 3:45 p.m. Wednesday, Sept. 26, at Global Security Exchange (GSX), powered by ASIS International.

How Augmented and Virtual Reality Affect Security

By Travis Rothbloom

The computer. The internet. The smartphone. What’s next? Many believe that Virtual Reality (VR) and Augmented Reality (AR) will be mankind’s next giant leap and there are already instances where their influence has affected the security industry.

For the planning stages, the past decade has seen major improvements to building and infrastructure design with the use of Building Information Modelling (BIM). These 3D digital representations contain much more data than the traditional floorplan drawing, enabling security engineers and consultants to finalize much more of the system design early on and expedite its construction. For renovation and fit-out projects, 3D scanning gives these planners much more confidence that their renovation models are compatible with an existing site.

BIM models can also be experienced in VR. Designers can then simulate various scenarios, such as a break-in robbery or a mass evacuation due to a suspicious package, and allow different stakeholders to witness and choose between different design options based on how the situations play out. In another example, developers can be more easily convinced that spending more money up-front on landscaping that’s in accordance with Crime Prevention Through Environmental Design (CEPTD) is easily justifiable with the extra feeling of safety it brings. Security teams can begin training on their responses to various situations long before any shovels hit the dirt.

AR differs from VR in that instead of immersing somebody into a different virtual world, it takes virtual elements and places them in the real world. This enables:
• Construction workers to digitally ensure that a building has been completed to its design specifications by overlaying the BIM model in full 3D onto the site
• Security teams to continue training to virtual crisis scenarios overlaid onto their actual building
• Public to receive, to their smartphones, visual step-by-step directions to the proper evacuation or lockdown location
• Guards and first responders to react to active security situations while having real-time access to the electronic security systems at their fingertips

On the last point above, the rise of AR along with 3D sensing systems integrated into CCTV can allow a responder to effectively see people through walls, ceilings, and floors. The responder can then simply point to a door to place it in lockdown to better manage the situation. AR can also take a 3D scan of a past crime scene and overlay it back onto its original location, allowing for more detailed forensic analysis.

Join me on Monday, September 24th at GSX 2018 for Session #4301, How Augmented and Virtual Reality Affect Security. I will be presenting on all of the above use cases and giving a live demonstration of what the future has in store.

Updating Security Operations Procedures with AI Technology

By Steve Reinharz

The artificial intelligence (AI) revolution brings new technologies into daily life. We’ve seen AI usage in diagnostic applications within the healthcare industry and in the emergence of self-driving cars, and with the growth experienced in these areas, it’s become hard to avoid AI’s massive implications around the world.

But how can security move beyond Siri and Alexa and harness the power of AI to enhance security operations? There are several ways:

  • Advanced video analytics: Video analytics is one of the first major domains within the security industry that is being radically transformed by AI – and this is already in practice in many organizations today. AI enables video analytics to do much more than just alert users when a person or object has crossed a barrier.
  • Operational efficiencies: Smart security solutions, such as video management systems or networked access control and visitor management, now can take the data being collected and correlate it with patterns in behavior for employees and visitors to a facility. This data, in turn, can be used to find ways that an organization can increase efficiencies and save valuable resources.
  • Connecting devices through IoT: AI brings multiple data points together to be analyzed and transformed into actionable intelligence that can be used to solve real-world problems. AI makes it possible to take these multiple streams of information and make it meaningful and useful.
  • Robotics: Robotic technology has taken the world by storm, but it isn’t possible without the power of AI at the heart of the technology.
  • Decision-making: AI-enabled technology has the potential to take the guesswork out of answering alarms by determining which events require a call to law enforcement and which are false alarms. While much of this technology is still in prototypes, the potential is real.

As part of the upcoming GSX Conference hosted by ASIS International, I will be joined by other experts in the field to talk about how to incorporate the best of AI technology, including video analytics, robotics, and license plate recognition, into today’s security operations procedures. Attendees can gain insight into the latest AI-powered technologies that can streamline operations, increase efficiency, and enhance security across an enterprise, and will be able to take this knowledge into their own organizations to drive leaders to innovate security operations procedures.

Join us for “Update Security Operations Procedures with the AI Technology” at 2 p.m. Tuesday, Sept. 25, at the Global Security Exchange (GSX), powered by ASIS International.

Global Security Exchange (GSX) Exhibit Hall to Spotlight Innovations and Trends Shaping Security

ASIS International unveiled plans for enhanced learning, career development opportunities, and access to the groundbreaking technologies shaping the future of the security industry, as part of an exhibit hall like no other at the 2018 Global Security Exchange (GSX). In the first year of its rebrand following a 63-year history as the ASIS Annual Seminar and Exhibits, GSX, the security industry’s flagship event, is expected to attract 550 exhibitors and more than 20,000 operational and cyber security professionals to engage in learning, networking and hands-on exploration, Sept 23-27 at the Las Vegas Convention Center.

“ASIS does an incredible job providing programing that focuses on some of the industry’s most innovative emerging physical and cyber security technology. I’ve never been to an event where the keynotes and sessions connect so comprehensively to what’s happening on the show floor,” said Drew Weston, Director of Sales and Marketing at CodeLynx, Inc. “The integration of the programing and exhibits is truly seamless.”

At GSX, the exhibit hall will be transformed into a learning lab environment featuring thousands of security products, technologies and service solutions, as well as immersive learning opportunities designed to connect the current threat landscape, as well as emerging risks, with leading solutions available in the marketplace. New show floor features include:

  • X Learning Theaters:
    • X Stage—features leading-edge technologies and their impacts across the industry, examining innovations like blockchain and cryptocurrencies, AI, drones and robotics, social media and the digital self;
    • Xcelerated Exchange Stage—provides a forum for the critical discussions that need to take place between practitioners and solution providers to proactively address the current and future security landscape; and
    • Xperience Stage—showcases case studies and other tried-and-true best practices that address security challenges facing practitioners across all industry sectors, including active shooter scenarios, bullying in the healthcare industry, and the risks associated with hosting a public event at cultural institutions.
  • Career HQ, with new career fair and enhanced career center:
    • Job seekers will have access to resume reviews, a headshot studio, career coaching, professional development sessions and networking opportunities with employers and peers—all free. The new career fair will have top companies looking to hire talent, such as the Department of Homeland Security (DHS) and Apple.
  • D3 Xperience (Drones, Droids, Defense):
    • Supported by Association for Unmanned Vehicle Systems International (AUVSI), the GSX D3 Xperience will deliver an immersive learning experience focused on the impact of Unmanned Systems on the security industry. Education and demos will showcase the emerging technology around the use of drones, droids and counter-UAV defense systems.
  • Innovative Product Awards (IPAs) Showcase:
    • The 2018 Innovative Product Awards highlights the new products and services on the GSX show floor that are poised to disrupt the security marketplace. The submission deadline is August 3.

In addition to these features, the exhibit floor will house an International Trade Center and the ASIS Hub, which includes access to ASIS Council representatives, live streaming interviews, and fireside chats.

“We have completely re-engineered GSX to provide more opportunities for security practitioners, solution providers, students, military and first responders. From Career HQ and the International Trade Center to our three unique theaters of education and live demos, attendees and exhibitors will find tremendous value in our immersive, engaging, and informative expo hall,” said Richard E. Chase, CPP, PCI, PSP, 2018 president, ASIS International. “There is no other event that compares to what GSX is offering this year, and we’re just getting started. We will continue to evolve and grow GSX in the years ahead as a part of our new brand promise to unite the full spectrum of security professionals to create the only global “must attend” security event.”

GSX brings together attendees, exhibitors and press from more than 100 countries. To learn more and to register, visit www.gsx.org/register. Members of the press are eligible to receive a free all-access pass, including keynote presentations, education sessions, and the show floor. Email [email protected] with your media credentials to register.

A Zero Trust Approach to Information Security

By Christopher Frenz

With the pandemic ransomware attacks of both WannaCry and NotPetya devastating companies around the globe, ransomware was a prominent headline in 2017. It’s estimated that in 2017, companies recovering from these and other ransomware attacks incurred $5 billion in damages.

One of the hardest hit industries was healthcare—as readily demonstrated by the UK’s National Health Service, Erie County Medical Center, and other hospitals that fell victim to various types of ransomware. WannaCry in particular exposed just how devastating a ransomware attack can be on the healthcare industry, as it not only impacted systems that store patient data, it also resulted in the encryption of medical devices. WannaCry concretely demonstrated that vulnerabilities in medical devices have the potential to impact patient care and patient safety. This attack established a wholly new and wholly unacceptable meaning for the term denial of service.

Comprehensive guidance for preventing, mitigating, responding to, and recovering from ransomware attacks can be found in the OWASP Anti-Ransomware Guide, and security guidance for protecting medical device deployments can be found in the OWASP Secure Medical Device Deployment Standard. One particularly effective control present in both guidance sets is that of network segmentation—as a segmented network can help to isolate threats and prevent them from spreading throughout an organization.

Join me on Wednesday 26 September at GSX 2018 for Session 6133, A Zero Trust Approach to Information Security, to see how network segmentation can be taken to the next level and a zero trust network created to stop the spread of malware and other threats throughout any organization.

Less Than Three Months Left Until GSX!

This Sept. 23-27, the newly rebranded Global Security Exchange (GSX), formerly the ASIS annual seminar and exhibits, is expected to attract 20,000+ cyber and operational security professionals, vendor partners, media, students, and allied organizations for enhanced learning, career development opportunities, and access to the innovative technologies shaping how business gets done. Taking place at the Las Vegas Convention Center, GSX will deliver a number of exciting updates to the event, which has been widely recognized as the industry’s flagship event for more than 60 years.

GSX offers a record 300+ education sessions, where global subject matter experts from ASIS, ISSA, and InfraGard will speak to best practices and issues facing the profession, as well as emerging risks and threats. Expo floor education will include three new X stages featuring sessions on disruption, innovative technologies, AI, mixed reality, cryptocurrency, and more.

Also on the show floor, enhanced Career HQ programming includes more education, free headshot studio, and a job fair, featuring leading employers like Apple and the Department of Homeland Security—to name a few.

The brand new D3 Experience, supported by AUVSI, offers demonstrations that take a deep dive into issues of unmanned systems security.

These updates, coupled with illuminating keynote addresses from CNN host Fareed Zakaria and futurist Scott Klososky and world-class networking at Brooklyn Bowl and Drai’s Nightclub along the famous Vegas strip, make GSX the year’s can’t-miss security event.

Browse the GSX Blog to learn more and keep updated on program news and announcements.

Advanced pricing is available until August 10, saving you $100 on your All-Access pass. Visit www.gsx.org/register.

Exhibitor Profile: Awareity (Booth #3282)

Awareity is a multi-industry leader and creator of the first-of-its-kind Community-wide Fusion Platform. Established in 2010, Awareity is on a mission to make the world safer using research-based data, evidence-based data, and a passion to help organizations and communities disrupt and prevent incidents and tragedies before they occur.

Community-wide Fusion Platform

Awareity’s Community-wide Fusion Platform offers not only a new category of solution, but a critically needed solution for disrupting, preventing, and stopping active shooters, workplace violence, nurse violence, and numerous other acts of violence. The Community-wide Fusion Platform is successfully preventing incidents and tragedies across multiple industries by eliminating common and dangerous gaps in threat assessment and intervention efforts.

A Different Kind of Camera

15+ years of research into post-incident reports from mass shootings and other acts of violence have provided extremely valuable lessons learned and exposed how “Walking, Talking, Social Media Cameras” can be the difference maker in preventing Active Shooters and other acts of violence.

What are “Walking, Talking, Social Media Cameras”?

People. A student, employee, teacher, family, friend, counselor, principal, nurse, parent, other family member, neighbor, law enforcement, mental health expert, social worker, child services agent, social media user, and other community members who observe warning signs and pre-incident indicators. With a Community-wide Fusion Platform, a central, community-wide team (Threat Assessment Team (TAT), Behavioral Intervention Team (BIT), etc.) could securely see all of the warning signs and pre-incident indicators BEFORE the escalation and attack occurs. When the right people have the right information, they can take the right steps to intervene and prevent attacks before they occur.

Expanding Reseller Program

Awareity is expanding our Reseller Program so leading and forward-thinking Security/Safety Integrators can create differentiation, new prospects, and new revenues to complement current product and service offerings.

Imagine the difference when warning signs and pre-incident indicators are collected and acted upon before incidents and tragedies take place. Join us and help us make schools, colleges, organizations, and communities safer.

For more information, please visit www.awareity.com or visit us at booth 3282 at GSX, September 24-27, 2018.


Managing a Global Workforce in a Crisis

By Tim Crockett

In today’s world, the health and well-being of your employees across the globe is an increasingly important focus. In the face of terrorist threats, natural disasters and health epidemics, the increasing duty of care obligation for employers is undeniable. The question then becomes: what is the best way to pro-actively ensure the safety of your employees, travelers and expats?

When an incident occurs, time to react is critical and four factors are essential: 1) know where global employees are located 2) determine if any employees are impacted by the incident 3) communicate with them and 4) assess their safety needs.

Technology undoubtedly plays a key role in this. Location-based data and knowledge of where your employees are or where they’re going to be is critical. However, technology alone cannot meet an organization’s duty of care needs. Once you know who might be affected by an incident, what happens next? How do you reach those people, and what do you do if they need help? The fact is that it doesn’t matter how technologically advanced the world becomes, nothing can take the place of human interaction and insight. Your employees should have access to relevant information before they travel, empowering them to avoid many of the hazards faced today. This same system should provide the employee the ability to pick up the phone and talk to an expert. Whether they require advice, assistance or find themselves in danger, the knowledge that they have immediate access to medical and security professionals can make a world of difference.

This human element is also critical for risk program managers and other stakeholders. Access to real-time information and guidance on how best to communicate with executives and family members can be the deciding factor in whether an incident is managed successfully or not.

Join me on Monday, September 24th at GSX 2018 for Session #4102, Managing a Global Workforce in a Crisis. We will be discussing the critical combination of technology and human interaction in next generation crisis management and sharing a case study of the 2017 London Bridge Terror Attack.

Career Opportunities in Security Management

By Ron Martin, CPP

It is important to note that security is a business function, not a subset or spin-off of the criminal justice system. Therefore, security management is a distinct field of academic study, separate and apart from criminal justice. Entrants to the industry seek internships, cooperative or work study programs, and entry level positions with employers.

The industry needs a more diverse community of entry level analysts and technicians. This session will provide a summary of security career opportunities along with the supporting career competencies. The essence of this session is the career competency model developed from the United States Department of Labor Model. Many entrants are not aware of the industry’s career opportunities. Nor do they know the competencies required.

In the security industry, as well as in all industries, there are three distinct actors in the career development process-the employer, institutions, and the individual. The employer’s role is to provide employment opportunities and establish competencies for their employees. The second actor is “the institution”. An obvious example is the school system, but industry associations play an important role as well. They can provide a baseline competency for the industry they serve. Finally, there is the individual. He/she must obtain the requisite knowledge, skills, and abilities to apply and compete for many career opportunities the industry will offer.


New in 2018! ASIS is offering student members a complimentary all-access registration to GSX. For a $20-per-year ASIS membership, students can participate in the on-site career center and job fair, attend important foundational sessions like Security Careers: The What and the How, build their professional network, and more! Learn more about the student membership opportunity.


This session will cover the “What and the How” of security management. The “what” are career opportunities. The “how” are the core career competencies an individual will need to satisfy the employer’s workforce requirements.

Join me on September 26th for Session #6122, Security Careers: The What and the How.

Cryptocurrency Security Challenges

By Brent Barker

Criminals are early adopters of new technology. They use it to create new crimes and improve old crimes. Law enforcement and the laws are always playing catch-up. This is especially true for cryptocurrencies.

In 2017 the value of cryptocurrencies exploded. At its high, they had a total value of $823 billion USD. The rising value attracted investors and criminals. Bitcoin was the first cryptocurrency but now there are over 1,600. Most are legitimate, but some are scams. One cryptocurrency was even called ponzicoin.

The single largest theft of cryptocurrencies took place in January 2018. Hackers stole $530 million from the cryptocurrency exchange Coincheck. Several people who became rich from cryptocurrencies have been kidnapped and forced to hand over the private key that accesses their cryptocurrencies. Once someone has your private key and steals your cryptocurrency, it is gone. There is no way to get it back.

Countries are using cryptocurrencies. Venezuela introduced the petro earlier this year to avoid U.S. sanctions. And North Korea is suspected of secretly mining cryptocurrencies to earn hard cash.

Companies are using cryptocurrencies as a new way to raise investment money. Most are legitimate, but one study found that over 18% of them were suspicious and likely involved fraud.

But there is good news. Cryptocurrency transactions are not as anonymous as previously believed. They can be tracked, and owners identified. Law enforcement is learning how to “follow the virtual money.”

Today, the attention is on the cryptocurrencies, but many see the greatest potential from blockchains, the software that powers cryptocurrencies. Many believe blockchains could change the world as much as the internet. In the future, every business will use blockchains in some manner including the security industry.
Join me on September 24th at GSX 2018 as I explore the criminal use of cryptocurrencies, law enforcement investigations and examine the enormous potential of blockchains to fight crime in the future. Join me for Session #4309, Bitcoins, Blockchains and Crime.

Fareed Zakaria, Scott Klososky to Kick-off GSX Keynote Lineup


The Global Security Exchange (GSX) keynote lineup will kick off on Monday and Tuesday with presentations from Fareed Zakaria, global thinker, columnist and CNN host, and futurist and technology visionary Scott Klososky.

Zakaria, host of CNN’s Peabody Award-winning “Fareed Zakaria GPS,” is former editor-at-large of TIME magazine, a three-time bestselling author, and one of Foreign Policy magazine’s Top 100 Global Thinkers.

At GSX, Zakaria will open the conference with an examination of important forces, developments, and risks affecting the global community. His remarks will encompass cyberthreats—espionage, ransomware, spear phishing—which know no boundaries. The once-local crime syndicates that have now metastasized over whole regions and continents. Global expansion and outsourcing, which means managing international teams and varying cultures. And more. With an emphasis on international intelligence and security, Zakaria will explore what it means to live in a truly global era.

Klososky returns as the GSX Tuesday keynote following his popular 2017 presentation, “The Technology Integration of Man.” Building on his continued involvement with chief security officers and ASIS stakeholders in the past year, Klososky will address the impact of today’s rapid digital transformation on security management and leadership. He will build a compelling case for managing and using technology—and knowing when not to use it—to gain a competitive advantage and lead successfully into the future.

The keynote speakers for Wednesday and Thursday morning will be revealed in the coming weeks. Attendees can register by 10 August to save $100 on their all-access pass. To learn more and to register, visit www.GSX.org/register.