This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. This article originally appeared in All Things AI, a newsletter presented by the SIA AI Advisory Board.
I went on to co-author an undergraduate textbook on security management, The Fundamental of Security Management: A Common Sense Approach, and accepted my first position as a physical security consultant, formally launching a career dedicated to risk mitigation and security excellence.
Work authorization and signatures You will want to define the specific tasks, and the team members assigned to them, so that you ensure the work gets done by the right people, and that you avoid duplication. By having all parties sign the work authorization, you ensure everyone has read it, understands it, and agrees to it.
This growing uncertainty presents a critical challenge for the security industry, which relies on various forms of digital content daily. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.
Discover how ZenGRC’s comprehensive software can help you achieve and maintain FedRAMP authorization efficiently. Let’s explore how the right GRC solution can streamline your FedRAMP compliance journey. Request a demo today.
The Prudential Regulation Authority (PRA), Bank of England (BoE), and Financial Conduct Authority (FCA) jointly issued stringent regulations to mitigate systemic risks and contain potential crises. A notable incident in 2018 involved a significant IT failure at UK bank TSB, prompting detailed reviews by UK regulators.
Two major business continuity concerns that several speakers highlighted: the increasing dependance on third party entities and the ever-present threat of ransomware and other cyberattacks. One takeaway is that in this industry, it’s critical to be seen as a trusted expert in your organization and to focus on remaining relevant.
In this presentation, participants will explore the essential strategies for creating and managing high-performance teams within the security industry, emphasizing operational excellence. Among the robust lineup of conference sessions are several offerings on leadership, performance management and workforce development.
The Expo Seguridad México team have unveiled the SIA Education at Expo Seguridad México conference program , which includes a dynamic keynote and engaging, informative presentations from top industry expert speakers on the most current business trends, technologies and industry developments. We hope to see you there!
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. This article originally appeared in All Things AI, a newsletter presented by the SIA AI Advisory Board.
Perhaps technological innovation will one day bring this issue under control, but there is no sign of this at present. This may be more of a problem for the arts than for the sciences, in which the fruits of research are supposed to benefit all of us, but at present it is hard to tell. Scepticism induces me to prefer the latter.
Generative models, such as GANs or diffusion models, are designed to fill in missing details by making assumptions about what could be present. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.
Today, were proud that PagerDuty has secured FedRAMP Low Authorization for our PagerDuty Operations Cloud to help fill that need and, ultimately, help public sector IT professionals do more with less. The public sector cant risk AI hallucinations, where AI models present false or incorrect information as fact due to flawed data or training.
Take advantage of the opportunities presented, and lean into those skills when presenting yourself to a prospective employer. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.
Instead, it filters and presents relevant information, allowing human operators to validate findings, investigate anomalies and make high-level decisions based on a rich data set. This article originally appeared in All Things AI, a newsletter presented by the SIA AI Advisory Board.
While the authors purport to be preparing governments for future shocks, government is rather tangential. Each case study is presented in a user-friendly format: The challenge the potential shock and the players; The response the playbook and the technology behind it; Lessons learned and critical response factors; and, Whats next.
How the Act safeguards the public Martyns Law introduces a tiered framework based on the number of people present at a venue or event. The role of the Security Industry Authority (SIA) The Security Industry Authority (SIA) has been designated as the regulator of the Act because of its expertise in licensing and security compliance.
Led by Deb Radcliff, a cybersecurity analyst and journalist and the author of the award-winning Breaking Backbones Hacker Trilogy, this unique discussion will dig into the intersection of cyber and physical security and what it means for our industrys future.
Image credit: Bellwether LEAP Wallerstein Panel Series: AI + Extreme Weather Preparedness Based on panel presentations and discussions by Ali Ahmadalipour, Elena Xoplaki, Jatan Buch, and Jorge Pérez Aracil.
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. This article originally appeared in Mail Call, a newsletter presented by the SIA Veterans in Security community.
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. This article originally appeared in All Things AI, a newsletter presented by the SIA AI Advisory Board.
In surveillance, AI-powered agents can monitor and analyze real-time video feeds, detect suspicious activities and promptly alert authorities. he views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.
In this candid Q&A presented by the SIA Women in Security Forum (WISF) IlluminateHER subcommittee , the mother-daughter team discuss the realities of building a business together, navigating bias and how their values continue to shape scDataComs growth. For some, that might cause a strain, but for us it’s been a force multiplier.
Image: Whitehall Street Station Flooding LEAP Wallerstein Panel Series: AI + Extreme Weather Preparedness Based on panel presentations and discussions by Dr. Terri Adams-Fuller, Dr. Equisha Glenn, and Dr. Miguel-ngel Fernndez-Torres. Accessed 20 May 2025 [link] Metropolitan Transportation Authority. Climate Resilience Roadmap.
Since its implementation in 2018, GDPR enforcement has only intensified, with regulatory authorities increasingly willing to impose substantial penalties for violations. New regulatory guidance, court rulings, and different interpretations from EU member states’ data protection authorities can quickly change compliance requirements.
This presentation outlines key steps to prepare for a respectful involuntary separation before, during and after the conversation. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association (SIA).
Artificial intelligence is everywhere today, featured in boardroom discussions, strategic plans and vendor presentations. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. This article originally appeared in All Things AI, a newsletter presented by the SIA AI Advisory Board.
Thieves are more likely to target sites with lax security measures as they present lower risks of detection and apprehension. Contact law enforcement: File a report with local authorities and provide applicable equipment details and GPS information. Request their assistance with documentation if needed.
It has been republished with the authors credit and consent. This is particularly useful if you want to clone an entire VM and present a second iteration of it back to a Hyper-V cluster. This article originally appeared on Andy Yuns blog. To see this in action, watch this narrated demo recording.
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. This article originally appeared in RISE Together: A Newsletter for Emerging Security Leaders, presented by SIA’s RISE community.
Platforms that offer flexible configurations and tailored solutions can better meet diverse client needs, while subscription-based pricing models present opportunities for recurring revenue. This article originally appeared in RISE Together: A Newsletter for Emerging Security Leaders, presented by SIA’s RISE community.
The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. The team is also very excited to be exhibiting at ISC West this year! Please stop by and visit us at Booth #35098.
Airports present unique challenges when it comes to security and safety because of their size, risk profile and multiple access points. DAA, formerly the Dublin Airport Authority, in Ireland provides examples of using modern technology to ensure both happy passengers and high security.
19-21 in New York City, and the Security Industry Association (SIA) and ISC East recently revealed full conference details for the SIA Education at ISC East program , including keynote presentations from top luminaries and over 70 sessions from top industry expert speakers on the most current business trends, technologies and industry developments.
Polycrisis has been around for a couple of decades and the initial concept came from the French philosopher Edgar Morin and co-author Anne Brigitte Kern in their 1999 book Homeland Earth: A Manifesto for the New Millennium. If we are living in a world of polycrises there will be new risks, and risks will present themselves in different ways.
LEAP Wallerstein Panel Series: AI + Extreme Weather Preparedness Based on panel presentations and discussions by Gustau Camps-Valls, Flix Francs, Luis Gmez-Chova, and Ana Ruescas. In particular, the disconnect between national and regional authorities hindered swift decision-making. the exposure and thus risk).
While this presents a potential threat to productivity, it also offers an opportunity for security service providers to lighten the load by using AI-enabled security-as-a-service (SaaS) solutions that unify and consolidate key functions across one platform.
DA : Throughout the entire process, from the initial sales presentation and extending through the implementation and installation phases, I thoroughly enjoy the challenge. This presents a unique opportunity for us to augment our knowledge and hone our skills alongside fellow industry professionals from across the nation.
Authored by cyber-physical security experts John Deskurakis and Chris Lynch and developed with support from sponsors Allegion, M.C. SIA is proud to present this groundbreaking new report on the critical area of operational security technology, said SIA CEO Don Erickson.
Inter-Cons approach aligns with these industry advancements, reinforcing its ability to provide comprehensive, scalable solutions that address both present and future security concerns. The post SIA New Member Profile: Inter-Con Security appeared first on Security Industry Association.
AC : The convergence of AI, the Internet of Things and cloud technologies presents enormous opportunities for the industry. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association.
An accomplished author and speaker, Black has published works on economic development, pension and healthcare reform, and performance management. He has delivered presentations on police-community relations, infrastructure development, public procurement, and long-term financial planning.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content