education brochure - iscwest.com · education brochure @ t 2 tuesday, april 9 time title track room...

22
SIA WITH ISC SUPPORTING THE SECURITY INDUSTRY S A N D S CONVENTION C E N T E R LAS VEGAS 10-12 APRIL 2013 EXHIBIT HALL 9-11 SIA EDUCATION @ ISC REGISTER NOW AT ISCWEST.COM SIA EDUCATION @ ISC REGISTER NOW AT ISCWEST.COM FOR THE FUTURE-FORWARD SECURITY SHOW IN VEGAS •1000+ Exhibitors Informative Education Non-Stop Networking + Events Hundreds of New Products Unveiled Education Brochure

Upload: others

Post on 22-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

SIA WITH ISC SUPPORTING THE SECURITY INDUSTRY

S A N D SCONVENTIONC E N T E RL A S V E G A S10-12

A P R I L

20

13

E X H I B I T H A L L

9-11SIA EDUCATION@ ISC

REGISTER NOW AT ISCWEST.COM

S I A E D U C A T I O N @ I S C

R E G I S T E R N O W A T I S C W E S T . C O MFOR THE FUTURE-FORWARD SECURITY SHOW IN VEGAS•1000+ Exhibitors•Informative Education•Non-Stop Networking + Events•Hundreds of New Products Unveiled

Education Brochure

Page 2: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

2

TUESDAY, APRIL 9Time Title Track Room7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201

8:30 AM–10:00 AM SM01: The Holistic Security Network: A Future Envisioned

End User–Strategic Management

304

8:30 AM–10:00 AM CL01: Participating in the Bid Process

SecuritySpecifiers.com Crunch ‘n Learn

307

9:00 AM–11:15 AM PT01: PSIM Workshop: Real-world Lessons on Using PSIM to Win Business and Maximize Profit Potential

Dealer, Installer, Integrator: PSA-TEC@ISC

309

10:15 AM–11:15 AM SM02: Next Generation Security Leader

End User–Strategic Management

304

10:15 AM–11:15 AM CL02: Threats to the Food Supply... and What to Do about Them

SecuritySpecifiers.com Crunch ‘n Learn

307

11:30 AM–12:30 PM PT05: The Changing Landscape of Customer Buying Habits and the Consequences

Dealer, Installer, Integrator: PSA-TEC@ISC

309

11:30 AM–12:30 PM SM03: Assessing the Cyber Risk from Your Business Partners

End User–Strategic Management

304

1:30 PM–2:30 PM SM04: Transforming Your Security Command Post into a Strategic Information Nerve Center

End User–Strategic Management

304

1:30 PM–3:30 PM LB02: From School Lockdowns to Quiet Auditoriums: The Proven Benefits of Electric Latch Retraction

Learning Labs 201

1:30 PM–2:30 PM CL03: Part I: Forum for Creative Security Solutions

SecuritySpecifiers.com Crunch ‘n Learn

307

1:30 PM–2:30 PM PT02: Identifying Applications and Customers for Virtual Video Guard Services

Dealer, Installer, Integrator: PSA-TEC@ISC

309

2:45 PM–3:45 PM PT03: Designing CCTV to International Standards for Visual Evidence

Dealer, Installer, Integrator: PSA-TEC@ISC

309

2:45 PM–3:45 PM SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk

End User–Strategic Management

304

2:45 PM–3:45 PM CL04: Part II: Forum for Creative Security Solutions

SecuritySpecifiers.com Crunch ‘n Learn

307

4:00 PM–5:00 PM SM06: ROI and Improved Business Performance from Security

End User–Strategic Management

304

4:00 PM–5:00 PM PT04: Leadership at All Levels: Integrator-proven Practices to Increase Professionalism and Profitability

Dealer, Installer, Integrator: PSA-TEC@ISC

309

WEDNESDAY, APRIL 10Time Title Track Room7:30 AM–8:30 AM DB01: Effectively Managing the

Installation ProcessDealer, Installer, Integrator: Business Development

307

7:30 AM–8:30 AM DT01: How Enterprise Mobile Duress is Changing the Security Landscape

Dealer, Installer, Integrator: Technology

309

7:30 AM–8:30 AM PB02: The Future of Crime Prevention: Stopping Crime in Remote Areas of Campus

School Safety Series

201

7:30 AM–8:30 AM IT01: Stay Connected: Leveraging the Cloud and Mobile Applications for Enhanced Security

End User–IT Related Issues

305

7:30 AM–8:30 AM PS01: Build Your Best Project Team: The Art of Critical Decision-Making in Security

End User–Physical Security

302

7:30 AM–8:30 AM PB01: The Partnership for Priority Video Alarm Response

End User–Public Safety

304

8:45 AM–9:45 AM SS01: State of the Industry: What Will it Take to be a 2020 Security Leader?

Signature Series 502

10:00 AM–11:00 AM DB02: Put the ‘Love’ into Sales Prospecting: How to Create Effective Sales Prospecting Plans

Dealer, Installer, Integrator: Business Development

307

10:00 AM–11:00 AM DT02: Vehicle Security Systems: The Next Generation in Security Services

Dealer, Installer, Integrator: Technology

309

10:00 AM–11:00 AM NG01: Could Standards: Driving the Future While Avoiding Yesterday’s Mistakes

End User–Physical Security

302

10:00 AM–11:00 AM NG02: NFC on Campus: Using Smart Phones as Campus Credentials

School Safety Series

201

10:00 AM–11:00 AM IT02: Know Your Enemies: Secure Networks are for Everyone

End User–IT Related Issues

305

10:00 AM–11:00 AM NG04: Social Media and Publicly Available Data: Turning Tweets and Other Data into Actionable Security Intelligence

End User–Public Safety

304

11:15 AM–12:15 PM PB03: IAHSS Special Session: Emergency Notification and How It Applies To Healthcare

End User–Public Safety

304

11:15 AM–12:15 PM DB03: How to Demonstrate the ROI of Physical Security Information Management (PSIM)

Dealer, Installer, Integrator: Business Development

307

Page 3: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

3

WEDNESDAY, APRIL 10Time Title Track Room11:15 AM–12:15 AM DT03: Megapixel Networking 101:

Preparing Your Network for Megapixel Surveillance

Dealer, Installer, Integrator: Technology

309

11:15 AM–12:15 PM PS02: Critical Incidents in Higher Education: The Case for an Intelligent Response

School Safety Series

201

11:15 AM–12:15 PM PS03: A Real All-Hazards Risk Assessment Approach

End User–Physical Security

302

11:15 AM–12:15 PM IT03: Virtual Port: A Geo-spatial Security Information and Reference Tool

End User–IT Related Issues

305

12:30 PM–1:30 PM DB04: How To Design, Price and Sell Service Agreements

Dealer, Installer, Integrator: Business Development

307

12:30 PM–1:30 PM DT04: Building Information Modeling: Revolutionizing Security Systems Design and Operation

Dealer, Installer, Integrator: Technology

309

12:30 PM–1:30 PM PS04: Counterfeit Products in the Security Industry: A Very Real Problem for All of Us

End User–Physical Security

302

12:30 PM–1:30 PM VS02: 60 Sites, 50 Miles and 5 Key Lessons Learned: How One School District Made the Move to IP Video Surveillance

School Safety Series

201

12:30 PM–1:30 PM IT04: When Hackers Attack: Deployment of Credentialed High Assurance Encryption in Non-Person Entities

End User–IT Related Issues

305

12:30 PM–1:30 PM PB04: Securing the Republican National Convention using Commercial Technology

End User–Public Safety

304

1:45 PM–2:45 PM PB05: Proactive City-Wide Surveillance

End User–Public Safety

304

THURSDAY, APRIL 11Time Title Track Room7:30 AM–8:30 AM AC01: Strong Authentication

for PIV and PIV-I using PKI and Biometrics

Access Control & ID Management

307

7:30 AM–8:30 AM VS01: Getting the Most from Your CCTV System at Night Using Today’s Lighting Technologies

Video Surveillance 309

7:30 AM–8:30 AM SP07: Coordinating New Door Assembly Installation with Access Control Systems

Special Programming

302

7:30 AM–8:30 AM NG05: Turning Risk and Security Data Into Security Intelligence

Next Generation Security

304

8:45 AM–9:45 AM SS02: The Great Debate: What to Use, What to Lose

Signature Series 502

10:00 AM–11:00 AM AC02: The Transportation Worker Identification Credential: Leveraging New Technologies to Integrate Access Control Readers with High Security Standards

Access Control & ID Management

307

10:00 AM–11:00 AM NG06: The Revolution in Video: Intelligent Video

Video Surveillance 309

10:00 AM–11:00 AM SP02: SIA NPS Winners’ Forum & Emerging Technologies Spotlight

Special Programming

302

10:00 AM–11:00 AM NG03: Securely Managing Identities in the Cloud for NFC Mobile Access Control

Next Generation Security

304

11:15 AM–12:15 PM AC03: Secure Identity: Models, Best Practices and a Dose of Reality

Access Control & ID Management

307

11:15 AM–12:15 PM VS03: The Virtual Security Officer: Comprehensive Remote Managed Security Programs

Video Surveillance 309

11:15 AM–12:15 PM SP03: The Importance of Simple Interoperability

Special Programming

302

11:15 AM–12:15 PM

NG07: Part I: Smart Buildings, Towns and Cities: Technologies

Next Generation Security

304

12:30 PM–1:30 PM AC04: Leveraging Physical Identity Risk Management to Streamline Assets, Processes and People

Access Control & ID Management

307

12:30 PM–1:30 PM VS04: Cracking the Code to Forensic Video

Video Surveillance 309

12:30 PM–1:30 PM SP04: Audio Monitoring and the Law: How to Use Audio Legally as Part of a Security System

Special Programming

302

12:30 PM–1:30 PM NG08: Part II: Smart Buildings, Towns & Cities: Case Studies

Next Generation Security

304

1:30 PM–3:00 PM SS03: Cloud RMR Opportunities for Integrators

Signature Series 502

Page 4: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

4

Tuesday, April 9th

Dealer, Installer, Integrator

9:00 AM - 11:15 AM

PT01: PSIM Workshop: Real-world Lessons on Using PSIM to Win Business and Maximize Profit Potential

Is there a current opportunity in your sales pipeline that could benefit from PSIM? Or maybe there’s one you lost where PSIM could have made the difference? If you want real, practical PSIM education you can take to the bank, this workshop’s for you. Moderated by PSIM expert Dr. Bob Banerjee, this session is an active workshop and not a sit-back-and-listen presentation. It consists of 5% presentation and 95% group participation. Come to this workshop ready to roll up your sleeves and get to work. As you are taken through a vast range of topics including integration and program management to attrition, compliance, operational effectiveness and forensic analysis, you’ll be completing a workbook that will help you relate these PSIM concepts to your to a specific real or hypothetical project of your choice. Your completed workbook will be yours to take home. This workshop will include: a brief intro to PSIM; an overview/discussion of the different facets of PSIM; group discussion where participants share information and questions on current, past or “hypothetical” opportunities and discuss if and how PSIM applies; and conclusion and next steps. As a workshop participant, you will leave with a better understanding of PSIM and how PSIM can help you win business opportunities and maximize profit potential.

Learning Objectives:

1. Analyze the critical capabilities of PSIM solutions 2. Map theses key PSIM capabilities to typical end-user

requirements 3. Apply these PSIM capabilities to your own specific real or

hypothetical opportunity/scenario 4. Identify how PSIM can lay the foundation for an enterprise

migration strategy that reaches far beyond access control and video

Speaker(s): Dr. Bob Banerjee, NICE Systems

11:30 AM - 12:30 PM

PT05: The Changing Landscape of Customer Buying Habits and the Consequences

The convergence of IT and physical security may be streamlining installations and improving security performance but it is disrupting established buying processes, shifting others and creating new ones.  The changes affect everyone from the customer to all the suppliers and advisors in the supply chain but not always in a positive way.  By attending this session attendees will:

1. Obtain a deeper understanding of how the buying process positively or negatively transforms the outcome of a planned project,

2. Discover if practices, processes and deliverables meet today’s market demands.

3. Gain perspectives needed to improve cooperation with everyone in the supply chain that improves business and project results.

Moderator: Tim Brooks, PSA Security Network Speaker(s): Jim Henry, EVP, Kratos | HBE, James O’Book, General Dynamics, Mark Peterson, MC Peterson & Associates LLC, Eric Yunag, CEO, Dakota Security Systems Inc.

1:30 PM - 2:30 PM

PT02: Identifying Applications and Customers for Virtual Video Guard Services

Do your clients struggle with vandalism, theft or loitering? Virtual Guard Services combat these threats proactively. Through event-driven monitoring, virtual tours, virtual doorman and virtual chaperone services, you can provide your customers with a heightened level of protection at a fraction of the cost of an onsite security guard.

In this session we provide you with the necessary tools to: 1. Identify a Virtual Guard Service opportunity 2. Apply Virtual Guard Services based on client needs

assessment 3. Recommend technologies to aide in delivery of services 4. Calculate ROI 5. Craft a SOW for deployment

Speaker(s): Sharon Shaw, Integrator Support

Page 5: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

5

2:45 PM - 3:45 PM

PT03: Designing CCTV to International Standards for Visual Evidence

In this interactive session, end-users and technical individuals learn how to gather video evidence cost effectively. New Standards from Europe and the IEC with objective design and measurement of the effectiveness of CCTV systems using the CAST (Centre for Applied Science and Technology) face recognition guidelines, the NORMAN and ROTAKIN test targets, bring you up-to-date with current philosophies and operational issues for CCTV (VSS – Video Surveillance Systems). Design your CCTV and IP system to meet the expectations of the integrator and the client.

Speaker(s): Charlie Pierce, LeapFrog Training, Mike Tennent, Tavcom

4:00 PM - 5:00 PM

PT04: Leadership at all Levels: Integrator-proven Practices to Increase Professionalism and Profitability

In this session, hear from an expert panel of integrators how effective leadership within the organization drives success for the company as a whole. Whether you’re an owner, project manager, sales manager or representative, or any other position within a security integration business, you can guide your team and your organization forward. Learn from fellow industry-professionals in this can’t-miss session.

Moderator: Paul Boucherle, Matterhorn Consulting LLC Panelists: Mike Kobelin, VP Client Management, Aronson Security Group (ASG), Ron Oetjen, Intelligent Access Systems, Rob Simopoulos, VP Sales, Advanced Technology, Eric Yunag, CEO, Dakota Security Systems Inc.

End User - Strategic Management

8:30 AM - 10:00 AM

SM01: The Holistic Security Network: A Future Envisioned

What will the future of physical security look like? In today’s physical security market, end-users have a greater need for situational awareness and actionable intelligence than ever before—and integrators and solution providers must deliver. A multitude of vendors, disparate technologies and insufficient standards make it difficult to meet this need. Physical Security Information Management, or PSIM, while a major step forward,

is an expensive attempt at a solution that does not quite realize the full promise of IP-networked security. Imagine a more robust network-based system upon which information is compiled and analysis and assessment is performed to provide critical value. This solution could streamline and simplify event reporting, connect and engage appropriate entities, and then equip responders with actionable intelligence. No matter where an intruder is on the premises, devices on the network would profile activity and enable the best and fastest security response.

What does this network-based solution look like and how can we overcome the environmental and product-oriented challenges to get there? This panel considers how a holistic security network provides strong potential as a next-generation solution for physical security and discusses the way forward—to a better, faster security response through greater situational awareness and actionable intelligence.

Learning Objectives:

1. Discuss challenges faced by even the most forward-thinking security managers

2. Present an objective vision of the way forward and what the next-generation of physical security may look like

3. Outline the envisioned benefits of a future with a holistic IP network of physical security devices

Moderator: Paul Everett, IHS Speaker(s): Benjamin Butchko, CPP, Butchko Security Solutions, David Curtiss, Smarter Security, Darin Dillon, CPP, Convergint Technologies, LLC

10:15 AM - 11:15 AM

SM02: Next Generation Security Leader

How do you remain relevant and resilient for all hazards security risk management in fluid risk and organizational change scenarios? Learn how end-user security organizations leverage cross-functional teams and measures for solution innovations and ongoing incremental proven performance. See and hear current “mind of the customer” survey data for extraordinary insights into cutting-edge security risk mitigation.

Learning Objectives:

1. Define or clarify board-level risk expectations for security program development and execution

2. Influence local and global key stakeholders for unified protection within cultural guardrails

3. Calculate incremental year-over-year contribution with P&L neutral or net consequences

4. Template success milestones to resilience with risk problem definition, mitigation option

Page 6: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

6

Speaker(s): Francis J. D’Addario, CPP, CFE, The Security Executive Council, Bob Hayes, The Security Executive Council

11:30 AM - 12:30 PM

SM03: Assessing the Cyber Risk from Your Business Partners

Join executive level cyber security experts from Government, Financial Services, Critical Infrastructure and Defense Industrial Base (DIB) industry sectors as they analyze the common and unique challenges they face in assessing the risks introduced by cyber threats operating within their respective sectors of interest. They will examine the limitations imposed by existing technology solutions, data overload, policy frameworks and lack of information sharing, and discuss challenges related to the current lack of visibility of the cyber risks presented by the suppliers and business partners that compose their business ecosystems. Additionally, they will differentiate between the new approaches they are taking to help sector operators understand the evolving universe of cyber threats within the context of their sector business operations, and how to efficiently filter through a growing universe of cyber threat intelligence to make it actionable.

Learning Objectives:

1. Compare challenges presented by the current lack of visibility into cyber risks presented by supplier and business partner networks in their respective industries

2. Examine the limitations imposed by current security technology on their ability to understand threats, share threat information and act proactively

3. Evaluate new approaches to effectively filter through a growing universe of cyber threat intelligence to make it more actionable

Moderator: Derek Gabbard, Lookingglass Cyber Solutions Speaker(s): Matt Coose, Qmolos LLC, Brendan Goode, Department of Homeland Security, Kirstjen Nielsen, TS Clearance and DHS Suitability, Sunesis Consultion LLC, Sean Tierney, UBS AG

1:30 PM - 2:30 PM

SM04: Transforming Your Security Command Post into a Strategic Information Nerve Center

In the security realm, clear vision is the key to preventing and managing incidents. Unfortunately, for many companies, information compartmentalization can obscure that vision. A company may have literally dozens of security information silos, with little ability to analyze, correlate and synthesize this information. Ever-changing security threats and compliance

regulations only add to the challenge. Does your security organization simply show up when something bad happens? Or does it have the clear vision to effectively manage, even prevent incidents and learn from them when they happen? In this panel, security visionaries from a cross-section of industries explain how to break down the walls between security information silos and share best practices to help you transform your security command post into a strategic information nerve center.

Learning Objectives:

1. Identify three opportunities for reducing information compartmentalization in my security operation

2. Identify three actions I can take to transform my security command post into a strategic information nerve center

3. Apply at least one best practice to my organization, as described in one of the panelists’ success stories

Moderator: Bob Banerjee, PhD, NICE Systems Speaker(s): Brad Brekke, Target Corporation, Tim Rigg, Duke Energy, Chris Swecker, Chris Swecker Enterprises

2:45 PM - 3:45 PM

SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk

This session explores qualitative verses quantitative risk analysis, and includes a discussion on determining asset value, threat, vulnerability and risk from both the aggressor and asset owner points of view. Three distinct quantitative methodologies will be examined -- CARVER, a tool used by U.S. Special Operations Forces to evaluate vulnerability and risk from an aggressor’s point of view; MSHARPP, the most commonly one used by security professionals, which takes the asset owner’s perspective; and a combination of the two, the RAVA Methodology, developed by the U.S. Navy. Assessment components of each methodology, including their likenesses, differences, advantages and disadvantages will be discussed.

Learning Objectives:

1. Differentiate between qualitative and quantitative analysis2. Assess and select the methodology that best suits your

assessment needs

Speaker(s): Douglas G. Haines, Haines Security Solutions, LLC

Page 7: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

7

4:00 PM - 5:00 PM

SM06: ROI and Improved Business Performance from Security

Return on Security Investment, or ROSI, is consistently a top consideration in the Security Management marketplace. Security practitioners charged with spearheading a Security Management program want concrete ways to calculate ROSI. No longer just about mitigating risks and protecting assets, smart security today measures security effectiveness, the business value derived from a security management solution, and the gains in new functionality outside the realm of traditional security. In this session, you receive a roadmap of considerations that can help you think outside traditional ROI parameters when you evaluate your current infrastructure or assess future purchases.

Learning Objectives:

1. Distinguish ROSI from typical ROI assessments 2. Identify new ways to meet business challenges and better

serve your business 3. Review examples of smart security that deliver concrete ROSI 4. Develop concrete strategies to apply these principles to your

organization

Speaker(s): Kevin McCaughey, Schneider Electric, Steve Russo , IBM Corporation

Learning Labs

7:30 AM – 11:30 AM

LB01: Enable the Cable for IP Video

Surveillance video is moving rapidly away from proprietary analog systems to IP network systems. Physical infrastructure is changing as cameras and other BAS devices are attached to the network through structured cabling and IP protocols.

In this learning lab, participants learn about IP surveillance systems trends and how to efficiently install a reliable and warranted IP surveillance system. From selecting the right cameras and cabling to utilizing diagnostic tools and testing devices, participants will gain essential installation and troubleshooting skills required for IP Video Systems.

Who should attend: Security and cabling contractors and installers, and IT professionals implementing video surveillance over a network.

*To maximize the learning opportunities and engagement between the students and instructors, participation in this lab is

limited to the first 20 registrants.

Learning Objectives:

1. Set up the cabling system from the switch to the camera

2. Test connections and cables using electrical testers3. View the impact of video traffic on an IP Network 4. Troubleshoot problems created by the bandwidth required for

video

Lead Instructor: Moses Ramos, Pelco by Schneider Electric Instructors: Carol Everett Oliver, Berk-Tek, a Nexans Company, Karl Griffith, Graybar, Barry Johnson, Fluke Networks

1:30 PM – 3:30 PM

LB02: From School Lockdowns to Quiet Auditoriums: The Proven Benefits of Electric Latch Retraction

The tragedy of the Sandy Hook Elementary School shooting in Newtown, CT last December dramatically brings to light the need to effectively manage access in an active shooter situation. How efficiently and rapidly access and egress are controlled in a crisis can save lives. In this hands-on learning lab, participants examine opportunities for providing electric latch retraction in a variety of settings. Often found in schools and hospitals, electric latch retraction is also used in libraries, theaters and other environments sensitive to noise.

In this hands-on learning lab, participants examine opportunities for providing electric latch retraction devices, review motorized retraction methods and the accessories needed for installation. Students will install a motor kit into a mechanical exit device, make wire connections and power on for operation.

Students should be proficient in the use of basic hand tools, multi-meters and basic electricity. Additional knowledge in electronic access control is beneficial, but not essential.

*To maximize the learning opportunities and engagement between the students and instructors, participation in this lab is limited to the first 20 registrants.

A basic understanding of mechanical devices is required.

Learning Objectives:

1. Identify where Electric Latch Retraction can be incorporated into a building or school

2. Upgrade a mechanical exit device to electrified and wired 3. Wire and test the ELR for proper operations

Lead Instructor: Russell J. Corriveau, ASSA ABLOY Instructors: Bob Cullum, Dugmore & Duncan, John Hunepohl, ASSA ABLOY, Rodney W. Weaver, ASSA ABLOY

Page 8: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

8

SecuritySpecifiers.com Crunch ‘n Learn

8:30 AM - 10:00 AM

CL01: Participating in the Bid Process

Each year, thousands of projects involving security equipment go through a bid process. There are numerous opportunities to participate for suppliers of security equipment and services. In this how-to session, speakers discuss how to get products specified, provide specifier support, identify bidding projects and prepare winning bid proposals. Industry experts bring their unique perspectives on how to effectively participate.

Learning Objectives:

1. Distinguish between the roles of the different players in the bid process for projects involving security

2. List ways to discover projects suitable for bidding 3. Identify ways to service and interact with the specification

writers

Moderator: Chad Kaser, iSqFt Speaker(s): Carri Holmes, CPP, CSI, Ingersoll Rand Security Technologies, Daniel M. O’Neill, TSG Solutions, Mike Kobelin, Aronson Security Group

10:15 AM - 11:15 AM

CL02: Threats to the Food Supply...and What to Do about Them

In this session, attendees learn of threats to the American food supply, how those threats may manifest, and the regulatory response from the U.S. Government to combat them. Mitigation options – from security initiatives to engineering practices and quality assurance – will be discussed. Information will be presented on the new Food Safety Modernization Act (FSMA) and its potential impacts to food producers and suppliers and what organizations can do to prepare for FSMA implementation.

Learning Objectives:

1. Assess the potential regulatory impacts of FSMA 2. Identify ways to prepare your organization or clients to reduce

(or plan for) the potential FSMA implementation and related compliance costs

3. Discover potential alternative opportunities to service existing clients or approach new ones, and determine if additional exploration is warranted

4. Identify potential new uses or prospective new product

lines to help organizations and integrators address FSMA for affected organizations

Speaker(s): Justin Hamilton, Burns & McDonnell, R J Hope, Burns & McDonnell, Bill Sokolowsky, Burns & McDonnell

1:30 PM - 2:30 PM

CL03: Part I: Forum for Creative Security Solutions

In this highly interactive session, participants explore various customer case studies in which innovative and unconventional solutions were developed to solve uncommon problems. Starting with a statement of a unique customer situation that defied a conventional approach, a panel of industry experts and session attendees offer their potential solutions. The actual resolution will then be revealed along with the supporting rationale and what was needed from the manufacturer or integrator to make it happen. Cases will be drawn from across the industry.

Learning Objectives:

1. Maximize “out of the box” thinking to develop innovative and creative solutions

2. Identify ways in which manufacturers and integrators can respond to unusual customer challenges

3. Compile a list of creative solutions to apply to difficult problems

2:45 PM - 3:45 PM

CL04: Part II: Forum for Creative Security Solutions

In this highly interactive session, participants explore various customer case studies in which innovative and unconventional solutions were developed to solve uncommon problems. Starting with a statement of a unique customer situation that defied a conventional approach, a panel of industry experts and session attendees offer their potential solutions. The actual resolution will then be revealed along with the supporting rationale and what was needed from the manufacturer or integrator to make it happen. Cases will be drawn from across the industry.

Learning Objectives:

1. Maximize “out of the box” thinking to develop innovative and creative solutions

2. Identify ways in which manufacturers and integrators can respond to unusual customer challenges

3. Compile a list of creative solutions to apply to difficult problems

Page 9: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

9

WEDNESDAY PROGRAMMING

Dealer, Installer, Integrator - Business Development

7:30 AM - 8:30 AM

DB01: Effectively Managing the Installation Process

It is critical for today’s systems integrators to be organized, detailed and focused on customer benefits and outcome at all stages of project delivery. Without good organization, critical tasks and details can be missed, which may result in project delays, increased costs, and dissatisfied customers. This session examines the key processes and steps to follow to ensure successful and timely completion of your projects.

Learning Objectives:

1. Identify key concepts for ensuring timely and successful project completion

2. Define troubleshooting items to follow to ensure quick resolution to issues

Speaker(s): Steve Oplinger, Integrated Fire & Security Systems Inc., Benjamin Butchko, Butchko Security Solutions

10:00 AM - 11:00 AM

DB02: Put the ‘Love’ into Sales Prospecting: How to Create Effective Sales Prospecting Plans

Sales prospecting is one of the most critically important activities sales teams can perform. So, why is it always so difficult to get it done? This session is designed to help you take the “ugh” out of sales prospecting. Learn how to create effective and manageable prospecting plans for each member of your sales team, complete with targeted sales goals; defined, quantified and measurable prospecting activities; a methodology for tracking progress; and evaluating success. If you are serious about sales prospecting, this is a “must attend” session for you.

Learning Objectives:

1. Establish effective sales prospecting goals and activities I can use daily

2. Create a real sales prospecting plan with quantifiable and measurable prospecting activities

3. Correlate prospecting activities needed to meet sales quotas

Speaker(s): Tracy Larson, WeSuite, LLC

11:15 AM - 12:15 PM

DB03: How to Demonstrate the ROI of Physical Security Information Management (PSIM)

Organizations often struggle to demonstrate the return on investment of new technologies. Showing clear, long-term cost savings or cost avoidance is an effective way to illustrate the value of a technology investment. Doing so also allows personnel and management to align on business needs, priorities and goals for how the solution or system will be used.

In this session, PSIM experts share multiple scenarios of significant cost savings and avoidance credited to physical security information management; detail qualitative and quantitative results; and outline how PSIM can reduce operational costs and capital expenditures, prevent compliance violations, minimize property loss and reduce risk. Participants’ pressing questions about how a PSIM investment can be quantified and justified in public and private organizations will be addressed.

Learning Objectives:

1. Determine how PSIM may offer cost savings or cost avoidance to your organization

2. Identify how PSIM can enhance the value and effectiveness of my current security and operational systems

3. Identify the elements necessary to develop a business plan to justify a PSIM solution

Speaker(s): James Chong, VidSys

12:30 PM - 1:30 PM

DB04: How To Design, Price and Sell Service Agreements

Back by popular demand! This highly charged, financially rewarding and entertaining session on how to design, price and sell service agreements is for clients with security systems. Specifically, learn how to design the right service agreement to minimize your exposure and maximize profit, motivate your sales force to sell them to both new and existing clients, and package your contracts to minimize risk. Ideas discussed in this presentation are based on the actual experiences of one of the most profitable security firms in the United States. These real-world applications will generate a significant profit for all attendees.

Learning Objectives:

1. Evaluate the need to sell service agreements2. Design the right service agreement to minimize your exposure

and maximize profit3. Effectively price your services to maximize profit

Speaker(s): Alan Kruglak, Genesis Security Systems LLC

Page 10: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

10

Dealer, Installer, Integrator - Technology

7:30 AM - 8:30 AM

DT01: How Enterprise Mobile Duress is Changing the Security Landscape

Roughly two million Americans are victims of workplace violence every year. Though those who work with money or the public are most at risk, violence can strike any workplace at any time, so organizations need to be prepared. Over the past decade, requirements for security systems have evolved beyond securing buildings to include protecting the people in and around those buildings.

While it is impossible to entirely eliminate the potential of workplace violence, Enterprise Mobile Duress Systems are proving to be effective in responding to violent or potentially threatening situations in hospitals, education campuses, banks and convenience stores. This presentation examines the application and key considerations when selecting an enterprise mobile duress system.

Learning Objectives:

1. Outline the principles of enterprise mobile duress2. Identify and apply best practices for implementing enterprise

mobile duress solutions across various markets and applications

Moderator: Deborah O’Mara, Security Dealer and Integrator Speaker(s): Guy Grace , Littleton Public Schools, Mark Jarman, Inovonics, Bryan Jones, HSS, Barry Nixon, National Institute for the Prevention of Workplace Violence, Inc., Ray Osborne, UC San Diego Health System  

10:00 AM - 11:00 AM

DT02: Vehicle Security Systems: The Next Generation in Security Services

Security professionals know the single biggest risk to any facility is an improvised explosive device. Every building’s loading dock and vendor entrance is an easy target. For high-profile buildings, vehicle security is a must. Even in buildings that do not have a heightened need for security, controlling vehicle access and reporting on vendor activity remains essential to risk management. This session guides participants through the requirements of an effective vehicle security system.

Authorizing access to facilities could depend on whether a

delivery was scheduled, the vehicle belongs to an insured vendor and/or the driver has proper credentials. To manage the overall risk of vendors, vehicles and the visiting worker, factors such as insurance, background checks and instances of past bad behavior are essential to authorizing access. Securing a building requires both staff and systems to understand who is entering and exiting the building.

As any security program must look at access control, the management of vendor access has, to this date, been largely overlooked. Essentially, our industry is barely scratching the surface of truly securing buildings because we have not addressed the vulnerabilities related to loading docks, freight cars and other secondary entrances.

Learning Objectives:

1. Mitigate risk associated with vendors access to “the back door”

2. Discuss how a cloud-based solution offers an affordable, feature-rich means to addressing problems with integrated location-based assets

3. Determine how to develop new lines of business, generate incremental business with existing clients and develop a new area of recurring monthly revenue (RMR)

Moderator: Laurie Aaron, Building Intelligence Inc. Speaker(s): Jeffrey C. Friedman, Building Intelligence/Shortpath, Noel Medina, Time Warner Center

11:15 AM - 12:15 PM

DT03: Megapixel Networking 101: Preparing Your Network for Megapixel Surveillance

Can you simply plug megapixel surveillance cameras and a storage box into your existing network for an instant video surveillance system? Maybe, maybe not. In this session, participants learn what to consider when designing a networked megapixel digital video surveillance system.

Learning Objectives:

1. Identify the basic components of a megapixel video network2. Distinguish between MJPEG & H.264 image compressions

and how they relate to bandwidth and storage3. Identify common errors that are made when planning a

megapixel network surveillance system

Speaker(s): Ted Brahms, Arecont Vision, Greg Varga, Cisco Systems

Page 11: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

11

12:30 PM - 1:30 PM

DT04: Building Information Modeling: Revolutionizing Security Systems Design and Operation

Now more than ever, building projects are being completed using 3D information modeling tools. Building Information Modeling, or BIM, is transforming how facilities are specified, built and managed. Learn all about BIM, why it has been adopted in the architecture and engineering world, and how it can help you improve the overall design of your next building.

While this session will feature a live demonstration of a popular BIM software package, the demonstration will be non-commercial. Its purpose is to provide participants with valuable insight into how these tools are being used to speed the design process, while addressing some of the coordination issues that are common to all construction projects.

Learning Objectives:

1. Describe what Building Information Modeling is and how it is being used in the design and construction field

2. Discuss BIM object families and how they are used to capture information about security objects included in building design

3. Identify how BIM is used to coordinate design issues and to present information to members of the design team

Speaker(s): Brent Bauman, CTS-D LEED® AP, Stantec

School Safety Series

7:30 AM - 8:30 AM

PB02: The Future of Crime Prevention: Stopping Crime in Remote Areas of Campus

Colleges and universities are focused on providing safe and secure environments for their student and staff, which often requires focusing on perimeters and remote buildings as much as the well-traveled areas to provide comprehensive security and safety. But protecting remote areas is challenging. Traditional guard patrols are often cost prohibitive and surveillance cameras provide little chance to stop incidents before they occur.

New technologies are changing the world of crime prevention in campus environments. This session highlights how today’s innovative universities are deploying automated detection systems that leverage built-in intelligence to automatically identify potentially dangerous targets to deter criminal behavior and prevent crime. At the same time, these emerging technologies can also be used as an automated security escort, illuminating a

person’s path to keep them safe and increase visibility. Not only do these solutions stop crime, but they provide an additional layer of safety for students, researchers and staff.

Learning Objectives:

1. Distinguish between proactive and reactive security measures2. Discuss intelligent detection systems3. Augment existing guard services with new technologies

Speaker(s): Rolland Trayte, FutureSentry

10:00 AM - 11:00 AM

NG02: NFC on Campus: Using Smart Phones as Campus Credentials

Get a sneak peek at the future of credentials by way of Villanova University and the University of San Francisco. Students and faculty are taking advantage of the latest in security technology by using their personal mobile phones to enter dorms, classroom buildings and offices. In the words of the student participants, “It’s just plain cool!”

Near Field Communications (NFC) is all the rage in the mobile phone market and is causing the number of NFC-enabled phones to increase substantially and quickly. These universities are currently piloting its use for access control on campus, making it ultra-convenient for students to manage their university credentials, and saving time and money for the administrative staff. Learn about their system of issuing access credentials virtually to student phones and how the students perceive this innovative way of using access control and other campus features that are normally associated with physical smart cards or ID badges. Get the real scoop from the administrators and program directors themselves, and their perception on the future of this technology in the security industry.

Learning Objectives:

1. Discuss how the NFC pilot program was executed and how both universities are using the technology on campus

2. Identify how students and administrators benefit through the introduction of NFC into a campus environment

3. Assess the opportunities NFC technology might hold for the future of access control, and how those learnings could reflect onto other campus environments or market segments

Speaker(s): Jeremy Earles, Ingersoll Rand Security Technologies, Kathy Gallagher, Villanova University

Page 12: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

12

11:15 AM - 12:15 PM

PS02: Critical Incidents in Higher Education: The Case for an Intelligent Response

The deployment of assets and Standard Operating Procedures in response to on-campus critical incidents are only as effective as the training of the personnel that stand ready to protect students and faculty. Personnel not tested under high-stress conditions can and will fail to execute orders in a systematic and timely manner when catastrophe strikes. New technologies enable an Intelligent Response to address these critical situations with automated, policy-driven, rules-based decision making and timely deployment of critical resources.

In this session, an expert panel of campus security professionals cite real-world examples of the deployment of systems that enable an Intelligent Response and are helping them respond to critical incidents effectively and maintain compliance with regulations, such as Clery Act reporting.

Learning Objectives:

1. Assess the gaps and weaknesses in current policies and procedures likely to drive the need for an integrated and intelligent response

2. Apply technologies throughout my organization that lend themselves to rules-based decision making

3. Engage stakeholder groups necessary to drive organizational change

Moderator: Berkly S. Trumbo, CRSP, Siemens Industry, Inc Speaker(s): David S. Burns, CEM, UCLA, Alison Kiss, Clery Center for Security On Campus, Thomas Komola, MIT, Laura Ploughe, Arizona State University

12:30 PM - 1:30 PM

VS02: 60 Sites, 50 Miles and 5 Key Lessons Learned: How One School District Made the Move to IP Video Surveillance

When the Escambia County School District IT department decided to transition its 60 schools to a single video surveillance solution, it knew there would be challenges. Each school was responsible for its own surveillance system, so there was a wide array of equipment and service contracts already in place. The district’s geographic area extended upwards of 50 miles, so centralized system management and maintenance were a must. In addition, many of the principals accessing the video were non-technical and working on Mac computers, necessitating a cross-platform solution.

The IT department also had its own wish list. The system had to be hybrid to accommodate existing analog cameras, but able to transition to all-IP video as time and resources allowed. Plus, the team wanted a web-based option that would eliminate some of the complexity involved in providing law enforcement with immediate access to live video in an emergency situation, where visual verification is crucial. In this case study presentation, participants learn the details of the experiences and lessons learned in moving the Escambia County School District to a single IP video surveillance solution across 60 sites and 50 miles, while accommodating non-technical users and critical first responder scenarios.

Learning Objectives:

1. Assess whether it makes sense for your organization to transfer responsibility for IP video surveillance to your IT department to maximize budgets and operational efficiencies

2. Identify the system requirements needed to standardize on a single video surveillance solution across multiple remote sites and for non-technical users

3. Establish protocols for immediate live viewing into a facility for remote patrols or “active shooter” scenarios working with local law enforcement

Speaker(s): Brian Johnson, Escambia County School District

End User – Physical Security Issues

7:30 AM - 8:30 AM

PS01: Build Your Best Project Team: The Art of Critical Decision Making in Security

Security projects are never one and done. They requiring months of planning, design, product selection, implementation and, finally, usage. One misstep along the way can lead to months of headaches and wasted money. There’s an art to critical decision making and execution in the physical security process and for using your #1 asset -- your project team! Learn best practices for managing the entire spectrum.

This session covers what to look for in your project team, from integrators, to manufacturers, to consultants and design engineers; provides a technology update and separates innovation and confusion; addresses how to measure device performance and guarantee it meets your specification in the real world; discusses the importance of certifications, from product, to industry, to UL; and highlights the Top 10 ‘Don’ts’ in the security design process.

Page 13: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

13

Learning Objectives:

1. Assemble a complete project team to eliminate costly missteps

2. Achieve successful, compliant project milestones3. Identify product and industry certifications

Speaker(s): Steve Surfaro, Axis Communications, John Hunepohl, ASSA ABLOY, Frank Varona, Ross & Baruzzini, Darnell Washington, SecureXperts

10:00 AM - 11:00 AM

NG01: Cloud Standards: Driving the Future While Avoiding Yesterday’s Mistakes

With cloud computing becoming one of the hottest technologies transforming the practice of physical security, standards have become a central focus in ensuring that the costly proprietary mistakes of yesterday aren’t repeated in this new, open era.  At the same time that the shift to cloud has enabled new business models for security companies, it is exposing both providers and integrators to more new IT issues than even the IP migration of the past decade.  In this panel, we examine several key areas of cloud standards relevant to physical security practitioners: identity in the cloud, cloud security, and cloud integration, and the standards organizations (SDO’s) that are relevant to all of them.

Learning Objectives:

1. Articulate how the potential standards-based cloud services can transform next generation physical security applications

2. Identify how service providers and integrators are leveraging hosted services to increase operational efficiencies in security related to identity management

3. Assess how current and emerging cloud-enabled business models will affect the way PACS and identity service providers operate

Speaker(s): Sal D’Agostino, IDmachines, Joe Gittens, SIA, Steve Van Till, Brivo Systems

11:15 AM - 12:15 PM

PS03: A Real All-Hazards Risk Assessment Approach

Tufts University recently developed a comprehensive All Hazards Risk and Vulnerability Assessment Methodology utilizing a combination of best practice risk assessment methodologies. The team developed a comprehensive list of over 100 hazards and, where possible, scientifically calculated the likelihood of occurrence and consequences. Where proven hazard models

were not available, the team developed mathematical models to project the scope and probability of hazard events. Some unique hazards analyzed included active shooter, rape, suicide, workplace violence, harassment, vehicle to pedestrian accident and global climate change effects, such as flash floods and increased likelihood of hurricanes and tornados in the Northeast United States. The consequences to buildings were based on the resiliency of each building, as well as the building value. The resulting information allowed the University to quantitatively assess risk to all facilities and intelligently make improvements to plans, systems and process to significantly reduce campus-wide risk.

Learning Objectives:

1. Identify and quantify hazard events specific to your organization

2. Apply the hazard analysis to a comprehensive approach to managing risk across your organization

3. Identify the best practices and standards available for conducting all-hazard risk assessments

Speaker(s): Geoffrey C. Bartlett, Tufts University, Daniel M. O’Neill, TSG Solutions, Inc.

12:30 PM - 1:30 PM

PS04: Counterfeit Products in the Security Industry: A Very Real Problem for All of Us

Counterfeit and knock-off security products are becoming increasing more available due to the proliferation of internet e-commerce web sites selling these products, and the techniques they use to appear at the top of search engine results. Illicit products represent a safety threat and a security threat, as well as job losses in the security industry. This issue affects all stakeholders, including manufacturers, OEMs, installers and end users. This presentation addresses the threats that counterfeit products represent, how bad the problem is today, how to detect counterfeit products and what initiatives individual stakeholders and the security industry can take to mitigate the risks.

Learning Objectives:

1. Improve your ability to recognize counterfeit products2. Discuss the scope of the program and the issues caused by

counterfeit products3. Identify what governmental agencies are trying to do to

combat counterfeiting and actions the security industry can take

Speaker(s): Michael L. Davis, HID Global

Page 14: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

14

End User - IT Related Issues

7:30 AM - 8:30 AM

IT01: Stay Connected: Leveraging the Cloud and Mobile Applications for Enhanced Security

New mobile applications allow users to communicate, share and monitor video from mobile devices. Mobile apps allow playback of recorded video and allow users to unlock doors and turn a smart phone into a flexible surveillance camera for enhanced situational awareness and greater security. With new technologies, such as cloud services and unified platforms, video streams are optimized using unique transcoding algorithms to best fit the user’s viewing device. Users are provided with the ability to watch live surveillance video, search video timelines for specific surveillance footage and control cameras remotely across multiple sites. In this session, participants learn how mobile applications are changing the security landscape — allowing for more data to be derived from surveillance and access control platforms while providing a high level of security and optimizing operations.

Learning Objectives:

1. Describe how mobile applications are increasing security, enhancing flexibility and maximizing operations for end-users

2. Assess how mobile applications can help build business for the integrator

3. Define the next wave of security technologies and how these have been driven from consumer applications

Speaker(s): Jumbi Edulbehram, Next Level Security Systems

10:00 AM - 11:00 AM

IT02: Know Your Enemies: Secure Networks are for Everyone

In today’s world, IP has standardized and revolutionized the communications architecture. Digital delivery requirements to or from customer locations have opened up new markets, yet introduce a new world of threats. Along with the benefits brought by extensive change come new risks that can “virtually” cripple operations. Inbound and outbound calls can be stopped, signals hidden and data captured. These new threats can come from anywhere in the world, any time of day. New tactics are being invented daily with the single objective of capturing your data. “Back doors” need to be protected as well as entrances to a building. Hacker’s count on lack of knowledge. Get educated. This seminar will help you design defenses against these new threats.

Learning Objectives:

1. Define common security risks in the alarm industry2. Assess how to best use the tools available to help assess

network security vulnerabilities3. Inform users of how to create the best working solutions to

meet security threats

Speaker(s): Bill Brousseau, CISSP, Secure Global Solutions, LLC

11:15 AM - 12:15 PM

IT03: Virtual Port: A Geo-spatial Security Information and Reference Tool

Learn how the Port of Long Beach (CA) is integrating information from standard security applications, such as video, vehicle tracking and ship acquisition systems, with open source information so that it can be data-mined to deliver real-time, actionable intelligence. The foundation of this domain awareness tool is Geo-spatial Information System (GIS)-based, which combines Security, Information Technologies and Engineering into a common platform. This advanced platform secures layers of information from various Port stakeholders that identify critical asset locations, and then collects plans, creates a dynamic daily operational plan, and adds historical data and news feeds to provide the best real-time security posture picture at any time, on any given day, for the benefit of end-users and regulatory agencies alike.

Learning Objectives:

1. Discuss how a GIS-based platform can enhance security2. Identify how data mining of real-time information can be used

to give security a more proactive and informed approach to protecting their facilities

3. Identify challenges that can materialize when using non-security systems for Security purposes

Speaker(s): Michael S. McMullen, Port of Long Beach

12:30 PM - 1:30 PM

IT04: When Hackers Attack: Deployment of Credentialed High Assurance Encryption in Non-Person Entities

This entertaining multimedia session provides a comprehensive review of hacker attack types, threats and techniques used in 2011-2012, followed by an introduction to the first high assurance endpoint security solution for non-person entities.

An expert panel explores the entry-level foot printing technologies used by hackers and provides examples of how a hacker can get

Page 15: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

15

from the mail room to the executive floor using weaknesses that can be injected into an information system, such as an electronic scale tied to a device connected to a metering facility or a multi-function office machine connected to corporate email assets.

Learn how technologies exist to integrate identity and access management credentials to non-person entities and how the incorporation of these technologies mitigate the threats posed by peripherals and network infrastructure devices that are connected to information technology networks.

The established FICAM policy assures effective government-wide identity, credential and access management. The Credentialed High Assurance Encryption framework authenticates devices for secure communication, while enabling government and corporate personnel to access systems without cumbersome password or permission processes. This session explores several case studies involving physical and cyber security deployment and this vital structure.

Learning Objectives:

1. Identify hacker attack types, threats and techniques2. Identify relevant standards and communicate them to

management3. Discuss the importance of certifications in the design process

Moderator: Steve Surfaro, Axis Communications Speaker(s): Kent Browne, Dell SecureWorks, Ron Martin, CPP, Open Security Exchange, Darnell Washington, SecureXperts

End User - Public Safety

7:30 AM - 8:30 AM

PB01: The Partnership for Priority Video Alarm Response

The Partnership for Priority Video Alarm Response brings together three key stakeholders involved with reducing property crime and its costs: Law Enforcement, Alarm Companies and Insurers. This session details how Priority Video Alarm Response is ensuring this public/private partnership delivers greater value to the community by increasing the rates of arrests and apprehensions of intruders.

Creating a win-win scenario all the way around, Priority Video Alarm Response is helping insurers reduce losses by catching more crooks in the act; increasing law enforcement’s arrest and apprehension rates, in some communities by as much as 50%; and helping alarm companies deliver greater value and a heightened sense of security to their customers as they upgrade existing systems to video to provide their customers with Priority Response.

Through a case study format, this session documents how the partnership has evolved and strengthened. A chief of police will relate what this has meant to local business owners; an insurer will discuss the multiplier effect of arrests on reducing future burglaries; and industry experts will outline the distinctions between surveillance, video alarms and unmonitored video, and describe how video alarms compliment high-resolution video surveillance systems.

Learning Objectives:

1. Create local partnership with insurers and law enforcement to deliver more arrests and combat property crime

2. Discuss the true value of arrests as “deterrence” and how video alarms are different from traditional surveillance cameras and DVRs

3. Discuss how video alarms enhance and strengthen video surveillance and deliver immediate event-based video clips to law enforcement for immediate response

Moderator: Keith Jentoft, Videofied - RSI Video Technologies Speaker(s): Steve Dye, Grand Prairie Police Department, Fred Lohmann, NICB (National Insurance Crime Bureau)

10:00 AM - 11:00 AM

NG04: Social Media and Publicly Available Data: Turning Tweets and Other Data into Actionable Security Intelligence

How can publicly available data contribute to greater situational awareness? How can public- and private-sector organizations leverage information in social media to identify risks and mitigate threats from weather, natural disasters, terrorism or civil unrest?

An increasingly broad and deep array of publicly available information – active fires, vacant housing, hurricanes, earthquakes, census data and more – is available to risk and security operations teams. Learn to use this free data to improve planning, day-to-day operations and emergency response. Join data visualization expert John Nelson as he explores the new frontier of publicly available information – social media – and how to leverage information contained in tweets.

Learning Objectives:

1. Use the key components of publicly available data -- time, location and content -- to provide security intelligence and increase situational awareness

2. Apply visualization techniques to publicly available data to assess risks from tornadoes, earthquakes, fires and other disasters

3. Assess how the use of social media, a form of publicly

Page 16: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

16

available information, increases situational intelligence for planning, day-to-day operations, special events or emergencies

Speaker(s): John Nelson, IDV Solutions, Det. Paul Parlon, UMASS Boston

11:15 AM - 12:15 PM

PB03: IAHSS Special Session: Emergency Notification and How It Applies To Healthcare

Seconds count….

• How quickly from the time a hospital learns of an emergency until the time staff, physicians and volunteers react as they are trained for that emergency situation?

• How quickly are visitors inside and outside the facility notified of an emergency situation?

• What type of response instructions are given to visitors? • How are various patients notified of an emergency situation?• How are staff members who may not be at the facility at the

time of the emergency notified?• Are neighboring businesses notified of the emergency?• What are the public relations issues associated with

emergency notification systems?

Multiple methods of communication are necessary to ensure that all persons on a healthcare campus respond appropriately.

Speaker(s): Lisa Pryse, IAHSS President

12:30 PM - 1:30 PM

PB04: Securing the Republican National Convention using Commercial Technology

Securing a large national event doesn’t require complex, custom technology. In securing the 2012 Republican National Convention, law enforcement communicated, collaborated and operated using commercially available hardware and software, including 4G/LTE, instant messaging, secure voice, interoperability and video on smart phones and tablets.

This session reveals the actual equipment and solutions deployed for the Tactical Communication Officer role and showcases the successful results through a combination of multimedia, including video and photographs from the convention, and hands-on live demonstrations. Far from the standard presentation using slides, this experience will be delivered in a story-telling format that will ensure it’s highly interactive.

Learning Objectives:

1. Discuss the evolution of the deployment of an advanced, mobile broadband solution using 4G/LTE

2. Evaluate how to use commercial technology to support security operations for large-scale public events

3. Evaluate the impact on security personnel roles and responsibilities, and the importance of a healthy public/private partnership in solving significant challenges

Speaker(s): Kevin McFadden, Cisco, Morgan Wright, Crowd Sourced Investigations, LLC

1:45 PM - 2:45 PM

PB05: Proactive City-Wide Video Surveillance

Effective and proactive city-wide surveillance is proven to dramatically reduce crime, improve public safety, and heighten trust between law enforcement and the community, all while reducing costs. In this session, participants get step-by-step instruction for implementing a city-wide surveillance system that enables real-time situational awareness and response capability; discuss what it takes to get buy-in from key stakeholders, including the community, dispatchers and officers; and assess the anatomy of a DUI from the time the suspect enters his vehicle under the influence to the field sobriety test.  

Learning Objectives:

1. Define the requirements of a pilot program to demonstrate the value of a public safety, city-wide surveillance solution.

2. Qualify an integrator that will be able to fulfill the technology attributes of a solution specific for their city.

3. Demonstrate the process from start to completion of a successful city-wide surveillance solution.

Speaker(s): Russ Dalzell, Redlands Police Department, Ray Leblond, Leverage Information Systems

Page 17: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

17

THURSDAY PROGRAMMING

Access Control & ID Management

7:30 AM - 8:30 AM

AC01: Strong Authentication for PIV and PIV-I using PKI and Biometrics

Explore the various standards and guidance related to compliance with HSPD-12 objectives. This session highlights the FIPS 201-2 changes and the challenges they impose. Card and card holder authentication is a major part of meeting these requirements, so biometrics and PKI are addressed in greater detail. The session is for those who need to know how biometrics can be used as an authentication to meet SP 800-116, along with FIPS 201-2 deployment in access control.

Learning Objectives:

1. Identify the current challenges to meeting FIPS 201 and interoperability

2. Value the benefits of PKI (public key infrastructure) and how it relates to FICAM, chain of trus and challenges in supporting PKI

3. Identify challenges and ways to succeed in using biometric credentials in FIPS 201, recognizing speed, accuracy and cost factors

Speaker(s): John Cassise, Innometriks, Inc., Bob Fontana, CSCIP/G, Codebench, Adam Shane, PSP, AMAG Technology

10:00 AM - 11:00 AM

AC02: The Transportation Worker Identification Credential: Leveraging New Technologies to Integrate Access Control Readers with High Security Standards

The Transportation Worker Identification Credential (TWIC) is a vital security measure that will ensure individuals who pose a threat do not gain unescorted access to secure areas of the nation’s maritime transportation system. There are different ways of reading the TWIC card ranging from solutions that meet basic Government requirements, like “flash-pass” and biometric access control readers, to solutions that integrate different pieces in one solution and exceed Government requirements. This session provides Security Management professionals and system integrators with an understanding of the available technologies and explores, in case study format, the successful access control

solution developed for the Port of Long Beach.

Learning Objectives:

1. Leverage ways of increasing security and efficient entry into secure areas

2. Identify the different technologies available to read TWIC cards

3. Identify ways of integrating security components into an access control reader

Speaker(s): Curtis “Curt” P. Campbell, SSA, Gary Chavarria, TRL Systems, Inc., Christopher J. Crump, 3M Cogent, Inc., Walter Hamilton, Identification Technology Partners (IDTP)

11:15 AM - 12:15 PM

AC03: Secure Identity: Models, Best Practices and a Dose of Reality

It used to be that issuing ID badges and ensuring that access was either granted or denied was enough. Decreasing risk and improving safety is now the mandate. Central to all of this is Identity Management.

However, Identity has been poorly managed throughout the industry mostly because the fundamentals have been poorly understood. Too much assumption, marketing, “high-level” pitches that sound like panacea. Identity is hard work. It is technical and most of it is not something one can see, feel or touch to put together. The card itself is only the tip of the iceberg.

This session breaks down strong identity so attendees walk away with functional knowledge of what secure identity really is, how to apply it, and how to approach a project with a level of competency that reduces risk and promotes success.

Learning Objectives:

1. Discuss “secure identity” fundamental concepts2. Distinguish between the various types, contexts and vendor

related “high-level” pitches3. Outline the various technical components, required skills sets

and resources needed to make a secure identity ecosystem

Speaker(s): Terry Gold, CSCIP/G, Independent Identity Analyst

Page 18: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

18

12:30 PM - 1:30 PM

AC04: Leveraging Physical Identity Risk Management to Streamline Assets, Processes and People

Learn how to identify and strengthen core pillars of physical identity and access management (PIAM) information by incorporating three A’s: Availability, Accuracy and Agility. Based on research into the actual challenges faced by enterprises in streamlining assets, processes and people for efficiently managing PIAM IT, this presentation covers in-depth artifacts of the 4A [Availability, Access, Accuracy and Agility] IT Risk Framework by George Westerman and Richard Hunter within the context with PIAM.

Learning Objectives:

1. Discuss the correlation of managing physical identities to enterprise risk and its impact

2. Identify the dynamic elements of a physical identity management strategy

3. Define next steps for my organization’s physical identity strategy

Speaker(s): Ajay Sharma, Quantum Secure

Video Surveillance

7:30 AM - 8:30 AM

VS01: Getting the Most from Your CCTV System at Night Using Today’s Lighting Technologies

Correctly designed lighting can drastically improve the performance of a surveillance system, deliver usable CCTV images, deter crime, maximize security and safety, and protect assets. But what should an integrator or user of CCTV consider in terms of lighting when designing and installing a surveillance system? What is the right type of lighting for surveillance? And what makes a good lighting design? This session answers these questions and more.

Through this session, participants review the main types of lighting technologies in today’s security market; learn the pros and cons of each and how they affect a CCTV system in terms of image quality, reliability and longevity, energy and cost efficiency, and capital outlay; and gain insight to achieve the correct relationship between the camera, lens and illumination. Experts will guide participants through the best techniques for designing, setting up and installing lighting to meet specific site requirements, and how to align it with the camera system.

This session is for CCTV professionals ready to receive the knowledge to make informed decisions on the best lighting to suit their specific design and implementation needs for top level security and safety at night.

Learning Objectives:

1. Specify the best lighting configuration for specific site and CCTV requirements for top level night-time security with appreciation of its environmental and economic impact

2. Design and set-up a lighting system to maximize CCTV image quality and security

3. Implement smart operational lighting techniques for the most efficient and effective security system

Speaker(s): Kristen Seguin, Raytec, Tony Whiting, Raytec

10:00 AM - 11:00 AM

NG06: The Revolution in Video: Intelligent Video

These days, a massive amount video is being recorded, but never watched or reviewed, due to lack of time. As a result, events and activities are missed, and suspicious behavior is not noticed in time to prevent incidents. This has led to the development of Intelligent Video (IV). Intelligent video comprises any solution where the video surveillance system automatically performs an analysis of the captured video. Applications range from analytics such as video motion detection and audio detection, to more advanced systems including camera tampering detection, people counting, virtual fences, and vehicle license plate recognition. Additionally, intelligent video systems can extract video and data from surveillance video streams and integrate that information with other applications, such as retail management systems or access control systems, creating new benefits and opening up new business possibilities. Join us to learn how Intelligent Video is reducing the vast amount of information contained in video, making it more manageable for systems and persons.

Moderator: John Convy, Sr., BRS Labs Speaker(s): Steve Surfaro, Axis Communications

11:15 AM - 12:15 PM

VS03: The Virtual Security Officer: Comprehensive Remote Managed Security Programs

With each passing year, Remotely Managed Security Programs are becoming more mainstream. Video verification of alarms is rapidly becoming the new standard. But there is so much more to Remote Managed Security than alarm verification. Traditional uniformed guards are being replaced with Virtual Security Officers.

Page 19: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

19

A true Remote Managed Security Program has to go well beyond alarms and other event triggers. Virtual Officers can manage access and escort requirements, and even oversee quality and safety compliance! The key to these advanced services is Live-View Monitoring, not just verification.

This session provides an overview of the technologies and services available. Participants will learn how to qualify vendors, develop budgets and integrate virtual officers into their security programs. Several case studies will be used to illustrate the diverse application of Virtual Programs.

Learning Objectives:

1. Differentiate between video verification and live-view monitoring

2. Assess how and where virtual officers can replace or augment onsite guards

3. Develop creative applications and understand the budget components of a Virtual Security Program

Speaker: Wade Pinnell, Huffmaster Companies

12:30 PM - 1:30 PM

VS04: Cracking the Code to Forensic Video

Eyewitness testimony is notoriously unreliable and popular TV crime shows, like CSI, have set unrealistic expectations amongst jurors for what to expect from forensic evidence. On the flipside, there’s the grainy surveillance video images we’re used to seeing on the nightly news. What then is reality?

Video surveillance cameras should be the ultimate objective observers. Advancements in technology are leading us closer and closer to the CSI ideal. HDTV and Megapixel video provide exceptional pixels per foot for identification. Time wasted searching video is a thing of the past with new technology greatly reducing video search times. Commonly targeted crime areas that pose difficult lighting conditions, such as dark alleys and unsupervised construction sites, are matched with color-at-night video and superior wide dynamic range. In today’s innovative IP video world, there’s now a camera for every need. The challenge is knowing when, where and how to deploy and configure these technologies. Join us for a discussion about the latest in IP video technology and how it is making forensic use of video more reliable both in and out of court.

Learning Objectives:

1. Distinguish between reality and Hollywood2. Determine when, where and how to deploy IP technologies3. Implement correct technologies to increase forensic use of

video

Moderator: James Marcella, Axis Communications Speaker(s): Rich Cowgill, Los Angeles Police Department, Dan Michelinie, BriefCam

Special Programming

7:30 AM - 8:30 AM

SP07: Coordinating New Door Assembly Installation with Access Control Systems

Building, fire, life-safety, and accessibility codes have specific requirements that govern the installation, modification, and maintenance of swinging fire and egress door assemblies throughout the life of their installation.  As an owner or manager of an access control company, your personnel need to be aware of the special code requirements that affect swinging door assemblies.  On construction projects, partnering with door and hardware suppliers ensures the new fire and egress door assemblies will meet their code requirements while providing the security and convenience the owner desires.  Attending this presentation will provide you with the basis for determining how your company might benefit by partnering with door and hardware suppliers on new construction projects. 

Learning Objectives:

1. Explain NFPA 80’s operational requirements of swinging fire door assemblies

2. Coordinate the application and installation of access control hardware on new swinging door assemblies

3. Reduce call backs to the job site

Speaker(s): Keith Pardoe, Door & Hardware Institute

10:00 AM - 11:00 AM

SP02: SIA NPS Winner’s Forum & Emerging Technologies Spotlight

In this highly-anticipated forum, the Security Industry Association presents the winners of the 2013 New Product Showcase, which was established in 1979 to recognize innovative products, services and solutions in electronic physical security. Technologies showcased through this program are used in the protection of life and property in residential, commercial and institutional settings.

At the NPS Winners’ Forum, judges will present the winners of the top two awards: the Best New Product award and the Judges’ Choice award. Representatives from the winning companies will provide insight into how these cutting-edge innovations

Page 20: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

20

are transforming the industry and participate in a Q&A session with NPS judges. This year’s forum includes the first Emerging Technologies Spotlight, a new component of the NPS awards program that highlights the NPS judges’ choice for the most exciting emerging technology solution that is not yet ready for market. The solution presented during this spotlight is not eligible for an NPS Award in 2013, but may well be one of next year’s winning solutions.

Speaker(s): Jennifer Martin, Pixim, Inc

11:15 AM - 12:15 PM

SP03: The Importance of Simple Interoperability

With the video surveillance market making the shift from analog to IP it is more important than ever to understand the importance of simple interoperability between the various components of the video system and the IT network on which it is hosted. This educational panel, moderated by the Security Industry Association, focuses on how an end-to-end system – cameras, video management, analytics, storage and bandwidth – can be easily integrated and achieves high-quality results through the use of recognized industry standards and open architecture to meet the growing demands of the video surveillance market.

Learning Objectives:

1. Identify the standards relevant to the design and procurement of an IP video system

2. Identify and assess key IT Department considerations related to the integration of best-of-breed solutions

Speaker(s): John Convy, Sr., BRS Labs, Joseph Gittens, Security Industry Association, Robert Muehlbauer, Axis Communications, Fredrik Wallberg, Milestone

12:30 PM - 1:30 PM

SP04: Audio Monitoring and the Law: How to Use Audio Legally as Part of a Security System

Learn about the legalities of using audio monitoring technology in security systems. Differentiate between covert and overt monitoring, address relevant expectations of privacy, and demonstrate steps to ensure legal compliance when using audio. As a result of this session, attendees will gain clarity on the differences between video surveillance laws and applicable audio laws, and better assess whether audio technology may be used with full knowledge of legal considerations. Only a basic understanding of security systems and applications is required.

Learning Objectives:

1. Differentiate between different uses of audio technology, i.e., surreptitious, and covert versus overt listening

2. Demonstrate and articulate whether or not a person being monitored has a reasonable expectation of privacy and under what circumstances a conversation may be monitored

3. Ensure compliance to both Federal and State statutes when applying audio to security systems

Speaker(s): Donald Shiffer, JD, Louroe Electronics

Next Generation Security

7:30 AM - 8:30 AM

NG05: Turning Risk and Security Data Into Security Intelligence

Turn risk and security data that is normally difficult to sort, review and make use of for anything other than incident review into intelligent, visual information for use by your security team and other business stakeholders. The visualization of risk and security data through geo-location, time and analytic tools positions the security team in a whole new light to the C-suite and enables you to provide security intelligence to the enterprise in three key areas: Business Decision-Making, through visualization for business continuity during incidents and disasters, such as last year’s  Superstorm Sandy; Compliance, to industry-specific resiliency requirements, duty-of-care and internal mandates; and strong Risk Management and Remediation, to identify security vulnerabilities, threats and needs associated with protecting assets. Learn how to transform the data you already house in your security systems, asset and facility data stores, and human resource databases into actionable security intelligence though data visualization. 

Learning Objectives:

1. Identify how enabling trends in hardware, software and data are leading to a significantly improved security and risk visualization.

2. Differentiate between traditional PSIM integration and a more comprehensive visual integration of global, metro and local-level physical security data.

3. Mitigate risk exposure through data visualization – identifying, investigating and taking action on potential threats near people and assets

Moderator: Laurie Aaron, Building Intelligence Inc. Speaker(s): Jeff Hearne, Dell, Inc., Mike Howard, Microsoft , Scott Sieracki, IDV Solutions

Page 21: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

21

10:00 AM - 11:00 AM

NG03: Securely Managing Identities in the Cloud for NFC Mobile Access Control

Now that it is possible to create, manage and use secure identities on Near Field Communication (NFC) mobile devices for physical access control and other applications, there is a growing need for an easy way to securely distribute digital keys to mobile phones and manage them through the duration of their use.

Additionally, with the expansion of the Bring Your Own Device (BYOD) phenomenon, deploying physical access and PC login applications on smartphones requires security assessment, proper planning, and the right technology and provisioning infrastructure. The co-existence of physical and logical access control on a BYOD smartphone also creates the need for adequate cloud storage security so these devices can be used for network and application logon.

Learning Objectives:

1. Identify the key components for building a mobile access ecosystem and preparing for the future within an existing physical access control infrastructure

2. Enumerate the challenges of over-the-air credential provisioning and management (generation, delivery, management and revocation) and how cloud security can overcome them

3. Discuss how converged physical and logical access and the rise of Bring Your Own Device fit into the mobile access environment

Speaker(s): Tam Hulusi, PhD, HID Global

11:15 AM - 12:15 PM

NG07: Part I: Smart Buildings, Towns and Cities: Technologies

According to 2011 IMS Research, it is expected that North American video deployments in city surveillance will double in market size by 2016. The image of a city as well-maintained, safe and secure is critical for its growth. Building an integrated cyber-infrastructure secures critical information assets by implementing recommended measures against known exploits. In this two-part session, we examine several technologies and case studies, spanning security and surveillance to preparation, education and policy for cyber and infrastructure assurance. Join us as we examine region-wide community and smart city defensive cyber strategies; learn of community-based cyber security exercises that emphasize the importance of protecting cyber infrastructure, information sharing and cost effective solutions; and explore

the future of integrated buildings to see how IT network and communications technologies are helping facility managers build tactical, corporate infrastructures, supporting their strategic goals. Additionally, we explore the City of Chicago’s case study in multi-geographic, multi-agency deployment. Dallas, Texas and Phoenix, Arizona illustrate how cloud-based IT infrastructure can help fight the temporal nature of crime, while China’s Shenzhen transportation surveillance system is an illustration of a large-scale deployment unifying current and future infrastructure technologies. Please note that Part I (11:15 am – 12:15 pm) focuses on smart cities and building technologies, and Part II (12:30 – 1:30 pm) examines their application.   

Speaker(s): Steve Surfaro, Axis Communications, Kent Browne, Dell SecureWorks, Ed English, elerts

12:30 PM - 1:30 PM

NG08: Part II: Smart Buildings, Towns & Cities: Case Studies

According to 2011 IMS Research, it is expected that North American video deployments in city surveillance will double in market size by 2016. The image of a city as well-maintained, safe and secure is critical for its growth. Building an integrated cyber-infrastructure secures critical information assets by implementing recommended measures against known exploits. In this two-part session, we examine several technologies and case studies, spanning security and surveillance to preparation, education and policy for cyber and infrastructure assurance. Join us as we examine region-wide community and smart city defensive cyber strategies; learn of community-based cyber security exercises that emphasize the importance of protecting cyber infrastructure, information sharing and cost effective solutions; and explore the future of integrated buildings to see how IT network and communications technologies are helping facility managers build tactical, corporate infrastructures, supporting their strategic goals. Additionally, we explore the City of Chicago’s case study in multi-geographic, multi-agency deployment. Dallas, Texas and Phoenix, Arizona illustrate how cloud-based IT infrastructure can help fight the temporal nature of crime, while China’s Shenzhen transportation surveillance system is an illustration of a large-scale deployment unifying current and future infrastructure technologies. Please note that Part I (11:15 am – 12:15 pm) focuses on smart cities and building technologies, and Part II (12:30 – 1:30 pm) examines their application.   

Speaker(s): Steve Surfaro, Axis Communications, Chris Gandy, Las Vegas Metropolitan Police Department

Page 22: Education Brochure - iscwest.com · Education Brochure @ T 2 TUESDAY, APRIL 9 Time Title Track Room 7:30 AM–11:30 AM LB01: Enable the Cable for IP Video Learning Labs 201 8:30 AM–10:00

S I A E D U C AT I O N @ I S C W E ST

22

SIGNATURE SERIES

Wednesday, April 10th, 8:45 AM - 9:45 AM

SS01: State of the Industry: What Will it Take to be a 2020 Security Leader?

An exciting new leadership movement – Security 2020™ – is evolving as a highly collaborative and cross-functional enterprise risk mitigation strategy. Informed by this generation’s most influential and visionary leaders, it is call to action for more persuasive solution innovations and business case studies. Those who relevantly align finite security resources against rising board-level risk, with optimum results for brand reputation, offer legacy contributions. Data-centric product, process and service ROI studies are just now making their way to academic and industry forums. Next generation leaders are, for the first time, collaboratively instructed with well-documented successes and failures.

Don’t miss this panel of industry leading practitioners, service providers and thought leaders as they share findings on what it will take to a 2020 security leader. This session is ideal for security proven practice leaders and next generation talent who aspire to be relevant and valuable to the clients, communities and the organizations they serve.  

*Open to all ISC Badge Holders

Moderator: Bob Hayes, Security Executive Council Speaker(s): Phil Aronson, Aronson Security Group, Francis D’Addario, Strategic Influence and Innovation, Timothy Rigg, Duke Energy

Thursday, April 11th, 8:45 AM - 9:45 AM

SS02: The Great Debate: What to Use, What to Lose

Decision 2013: What technologies should you use and which ones should you lose? This session will use a classic debate format, complete with referee, issues, refuting arguments and rebuttal. In the fast-paced world of technology innovation, new options seemingly appear every day for today’s security professional, from HDTV, to megapixel, to hosted/cloud services, to networking, to video analytics. Each can be an asset to your security system, but if deployed improperly can become a huge liability. Panelists will regale the audience with implementation stories from the past – some good, some bad – to help inspire success. Then they’ll debate on new technologies and the decision-making processes to include, ignore or postpone deployment for your electronic security system. Come for the debate. Stay for the information.

Learning Objectives:

1. Determine which technologies are assets or liabilities2. Identify the latest and greatest products and technologies3. Learn from others’ successes and mistakesModerator: Steve Lasky, Cyngus Security Media Speaker(s): Jay Hauhn, Tyco Integrated Security, Gordon Hope, Honeywell, Fredrik Nilsson, Axis Communications

Thursday, April 11th, 1:30 PM - 3:00 PM

SS03: Cloud RMR Opportunities for Integrators

As product margins continue to erode, recurring revenue is becoming an essential component of an integrator’s profit picture. Now, cloud-based service offerings are beginning to populate the landscape and offer new opportunities for the integrator. This session examines offerings in video, access control, and PSIM, and presents an integrator perspective on the opportunity.

Learning Objectives:

1. Describe various cloud-based physical security services and their relevance to systems integrators.

2. Evaluate the potential for Recurring Monthly Revenue (RMR) in video, access control, and PSIM.

3. Identify situations where cloud-based technologies are most likely to apply.

4. Describe where integrators have had success to date in realizing cloud-based RMR.

5. Relate likely technology trends in cloud-based services

Moderator: Ray Coulombe, SecuritySpecifiers.com Speaker(s): Chris Brown, Check Video, Brian Carle, Carle of Salient Systems, Scott Haugland, SureView Systems, Rob Hile, Integrated Fire and Security Solutions, Inc., Steve Pineau, Viscount Systems