This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Technology is a driving force in public safety today. There are multiple challenges that come with considering which technologies should be adopted and fielded within an organization. Prior to DHS/FEMA, he was Vice President, Emergency Management & Homeland Security for ICF International, a $1.5 Please visit our sponsors!
Increasing risks and increasing technology are the topics in this podcast. How to manage technology and risks that extend from the cyber perspective all the way to corporate leadership and climate change. The guest is Steve Durbin is the Chief Executive of the Information Security Forum (ISF). Major Endorsements: !Rescheduled
The physical security industry is being transformed by moving from being reactive to proactive , thanks to the integration of artificial intelligence (AI) and predictive analytics. Other security threats could be flagged as well, such as loitering, large crowds, fires or even unauthorized entry. Daniel Reichman, Ph.D.,
Information security is a top concern for business organizations, as research finds that cyber-attacks are launched 2,244 times a day—that’s every 39 seconds. The role of Chief Information Security Officer (CISO) is gaining popularity to protect against information security risks. The average cost of a data breach is $3.9
Now in its fourth year, the SIA WISF Power 100 program showcases 100 women who are role models, leaders, innovators and influencers in the global security industry. The Security Industry Association (SIA) has announced the 2025 honorees for the SIA Women in Security Forum (WISF) Power 100. SILVER SPRING, Md.
Security, once defined by physical measures like surveillance cameras and access control systems, has transformed into something far more intricate. Technology has propelled the industry forward, pushing organizations to integrate AI, machine learning and sophisticated data analytics into their defenses.
Produced by cyber-physical security experts for SIA, this in-depth resource examines principles, challenges and mission-critical outcomes related to IT, operational technology and security. Authored by cyber-physical security experts John Deskurakis and Chris Lynch and developed with support from sponsors Allegion, M.C.
Ryan Schonfeld is the co-founder and CEO of HiveWatch, a securitytechnology company reimagining how companies keep their people and assets safe. Security teams face chronic understaffing, with turnover rates ranging from 100% to 300% annually. Where are we now? The challenges are significant and growing. The result?
29, 2024, the Security Industry Association (SIA) sent a letter signed by 92 security businesses and organizations conveying a strong, industrywide message to Capitol Hill urging members of Congress to weigh in with the Federal Communications Commission (FCC) on a proposal that would restructure the Lower 900 MHz frequency.
The Security Industry Association (SIA) has named two industry leaders Christa Decker, vice president of the Protective Design Group at Whitman, Requardt & Associates (WRA), and Amy Dunton, business development specialist at Ameristar to serve as co-chairs of the SIA Perimeter Security Subcommittee. SILVER SPRING, Md.
CIOs as Catalysts for Change: Leading Through Technology February 21, 2025 The Chief Information Officer (CIO) role has evolved beyond IT managementits now a driving force for business transformation. Is your technology strategy evolving with business needs or reacting to them? But the demands are mounting. The reality?
The current conversations in the technology landscape are being driven by coverage of two topics: AI and cybersecurity. This is achieved through AI-powered techniques like detection and security scoring, automatic diagnostics and remediation analysis, and repurposing backup data for mining and development testing.
National Security Technician Day, held annually on Jan. 23, is dedicated to recognizing the valuable work security technicians do to secure our nation. The Foundation for Advancing Security Talent (FAST) has announced the third annual National Security Technician Day , an annual commemorative day held on Jan.
In this podcast we will be talking about technology in general and more specifically about data, the use of data and how we can mine it and apply it to a variety of purposes, using tools like GIS. The podcast guest is Jim Featherstone , He is a native of Washington D.C. From 2008 to 2018, Jim chaired FEMA’s National Advisory Council.
Employees are adopting generative AI toolswith or without company policies in placemaking it critical for organizations to implement secure, monitored AI usage now. Employees are adopting generative AI toolswith or without company policies in placemaking it critical for organizations to implement secure, monitored AI usage now.
New Security Industry Association (SIA) member Inter-Con Security is a provider of high-quality, centralized services, using an embedded support model rather than a branch model to deliver scalable, customizable and comprehensive services to clients. Department of Justice, training security forces in Latin America.
Data Security in a Demanding Regulatory Environment Data security regulation is accelerating many firms data protection processes, says Karl Schimmeck, Executive Vice President and CISO of Northern Trust. Forecasting the compliance future : New technologies think AI are getting regulatory scrutiny.
Applications in the Security Industry The incorporation of agentic AI into safety and security frameworks offers numerous benefits. Additionally, agentic AIs ability to autonomously interact with and adapt to the physical world will significantly enhance robotic applications within the safety and security sector.
You cant swing a manufacturer-branded lanyard around a security trade show floor these days without hitting 12 booths touting their latest artificial intelligence (AI) product offerings. Next time you are evaluating an AI product, dont forget the P the process or API that takes it from a technology to a solution for your application.
Security is no longer just about guards and gatesits digital, physical, and constantly evolving. What do you see as the biggest security challenges organizations face today? Security threats have grown more complex, requiring organizations to protect both physical and digital assets.
11, 2025, the Security Industry Association (SIA) Standards Committee hosted a webinar on the state of security industry standards. Peter Boriskin, chair, SIA Standards Committee, and chief technology officer, ASSA ABLOY Opening Solutions Standards are crucial for ensuring the quality, safety and efficiency of products and services.
Ten security industry professionals and students will receive scholarships to be used toward continuing education, repayment of student loan debt and professional development. SILVER SPRING, Md. – We celebrate their successes and look forward to supporting them and helping them thrive in their careers.”
Top C-suite, cybersecurity and business leaders – including keynote speaker Nasdaq’s Phil Mackintosh– will headline the security industry’s executive conference taking place Oct. At SNG 2024, the security industry will gather for top-level information sharing, networking and business analysis. 8-9 in New York City.
The three companies will be honored for their impressive leadership, engagement in SIA programs and contributions to the security industry at The Advance, SIAs annual membership meeting. The Security Industry Association (SIA) is pleased to announce that Convergint, Wavelynx and Wesco will each receive a 2025 SIA Member of the Year Award.
In this podcast we look at one individual county and the security measures used from a physical and cybersecurity perspective, but then also preventing voter fraud from occurring. Register for DyPop here: www.thereadinesslab.com/shop/p/dynamic CBRNe Convergence Orlando 2024 28-30 October, Orlando, Florida L3Harris Technologies' BeOn PPT App.
Cybersecurity Leadership: The Complete Guide to Building and Leading an Effective Security Team by Pure Storage Blog Summary Strong leadership in cybersecurity has never been more critical. With a solid team and a culture of security, leaders can reduce risk and protect their organizations from cyber threats.
Is a Top Security Priority March 28, 2025 Scott Ray Chief Operations Officer Cybersecurity is a must-have for every organization, perhaps nowhere more so than in the defense industry. It also encourages contractors to continuously improve their security posture and proactively stay ahead of regulatory changes and potential breaches.
The Security Industry Association (SIA) presented seven new members to the SIA Board of Directors at The Advance , SIA’s annual membership gathering, held March 28 during ISC West , and the SIA Board of Directors confirmed its new officers during the board’s March 28 meeting at ISC West. LAS VEGAS, Nev. –
The Security Industry Association (SIA) has named Erica McCann and David McCarthy as the 2025 recipients of the SIA Industry Advocate Award. The 2025 awardees were recognized during Security Hill Day, an event held March 4-5 in which security industry executives convened in Washington, D.C., SILVER SPRING, Md.
Jim Richards is the CEO of Total Security Solutions. For those unfamiliar with ballistic security, it would be easy to assume the process is as simple as a single piece of bullet-resistant glass. Framing : Doors, windows and other points of entry are the inherent weak spots in a security system.
Tips for Securing Your Data by Pure Storage Blog Summary Cyber extortion is a type of cybercrime thats surging. Publicized breaches erode confidence, particularly in industries like finance and healthcare, where data security is paramount. These tools check for known vulnerabilities and compliance with security standards.
New Security Industry Association (SIA) member Zeptive is a provider of state-of-the-art vape detection and air quality monitoring technology for schools, businesses and public spaces. SIA spoke with Will Hargett, CEO of Zeptive, about the company, the security industry and working with SIA. Tell us the story of your company.
NexusTek Secure by Design: Powering Life Sciences Innovation from Lab to Launch April 25, 2025 Jay Cuthrell Chief Product Officer Life Sciences is undergoing rapid transformation, fueled by technological advancements, evolving regulations, and shifting market dynamics.
New Security Industry Association (SIA) member CSI Security and Electric serves its customers as a trusted partner in pioneering security and electrical solutions. The team quickly made a name for themselves by going above and beyond with their tailored security solutions. Tell us the story of your company.
Backup Software Vulnerabilities : Exploiting security weaknesses in backup tools 4. How often patch updates are implemented and security holes are scanned. But modern cybercriminals have demonstrated their ability to bypass even the most advanced security measures. How easy it is to identify your backup storage locations.
This award program, presented by SIA’s RISE community together with Brivo and the Foundation for Advancing Security Talent, recognizes 25 new and emerging security leaders for their impact in advancing the security industry. SILVER SPRING, Md. – 17-18 in New York City.
She brings skills and insights developed over 25 years working with leaders in healthcare, public safety, defense, and security. L3Harris Technologies' BeOn PPT App. She brings skills and insights developed over 25 years working with leaders in healthcare, public safety, defense, and security.
Security threats are shifting faster than ever. Security threats are evolving rapidly, shaped by a combination of cyber vulnerabilities, supply chain risks, geopolitical instability, and natural disasters. This blog explores key security challenges and provides actionable strategies for organizations looking to build true resilience.
Among the robust lineup of conference sessions is an all-new track on workplace violence and school security. Among the robust lineup of conference sessions is an all-new track on workplace violence and school security. Ahrens, CPP, CSC, CHPA, FSyl, security market group leader, Affiliated Engineers Speakers: Sean A.
This cloud-based solution ensures data security, minimizes downtime, and enables rapid recovery, keeping your operations resilient against hurricanes, wildfires, and other unexpected events. This ensures data is always protected securely and can be restored on demand, eliminating the need for a constantly running disaster recovery setup.
In this podcast Pete Gaynor, the immediate past Federal Emergency Management Agency (FEMA) Administrator and Acting Secretary of Homeland Security shares what he knows about how the national disaster response system functions. The roles and responsibilities of local, state and the federal government.
By aligning your DR strategy with a resilient networking foundation, you provide the secure, reliable infrastructure necessary for swift and seamless recovery. How to Achieve It: Leverage robust replication technologies that deliver RPOs of seconds for mission-critical data and services. Compromised security can exacerbate the damage.
How Cybercriminals Are Leveraging AI to Build Better Attacks January 23, 2025 Paul Barrett VP, Sales Enablement With decades of experience in the IT and cybersecurity space, Ive had the privilege of guiding midsize businesses through the complexities of an ever-changing technology landscape.
At the end of August 2023, the Security Industry Association (SIA) filed an amicus curie (“friend of the court”) brief in support of a U.S. Implementing BIPA-compliant security-related applications of biometric technologies, already difficult in Illinois, could become impossible. Read SIA’s brief here.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content