https://sm.asisonline.org/Pages/Say-Thanks--National-Security-Officer-Appreciation-Week-Kicks-Off-.aspxGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Say Thanks: National Security Officer Appreciation Week Kicks Off 0

 

 

https://sm.asisonline.org/Pages/Less-is-More.-A-KISS-Approach-to-ESRM.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Less is More: A KISS Approach to ESRM

 

 

https://sm.asisonline.org/Pages/ASIS-Awards-School-Security-Grant-and-More-ASIS-News.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465ASIS Awards School Security Grant & More ASIS News

 

 

https://sm.asisonline.org/Pages/Protecting-Fine-Art-and-Other-Industry-News.aspxGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Protecting Fine Art and Other Industry News

 

 

https://sm.asisonline.org/Pages/Global-Water-Risk.aspxGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Global Water Risk

 

 

https://sm.asisonline.org/Pages/Book-Review---Physical-Security.aspxGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Physical Security2017-09-01T04:00:00Z
https://sm.asisonline.org/Pages/Marquez-Honors-Go-To-The-Finest-Four.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Marquez Honors Go To The Finest Four2016-09-11T04:00:00Z
https://sm.asisonline.org/Pages/ASIS-Awards-School-Security-Grant-and-More-ASIS-News.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465ASIS Awards School Security Grant & More ASIS News2017-09-01T04:00:00Z
https://sm.asisonline.org/Pages/New-Employee-Onboarding-Guide.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465New Employee Onboarding Guide2017-08-09T04:00:00Z
https://sm.asisonline.org/Pages/Interoperability-for-the-Safe-City-.aspxGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Interoperability for the Safe City 2017-08-21T04:00:00Z

Security Management

 Morning Security Brief

View RSS feed

 SM Weekly

Retrieving Data

 SM Daily

Retrieving Data
Not a Member? Join Now

 

 

https://sm.asisonline.org/Pages/Book-Review---Physical-Security.aspxPhysical SecurityGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p><em>Butterworth-Heinemann; Elsevier.com; 204 pages; $79.95.</em></p><p>​The second edition of <em>Physical Security: 150 Things You Should Know</em> is an excellent reference for security practitioners and managers. Written by Lawrence J. Fennelly and Marianna Perry, CPP, the book covers the most common concepts and concerns in security today; from lighting and CPTED to cyber and drones. To borrow from the book’s opening lines, it is a roadmap to building and enhancing an organization’s security program.</p><p>The authors do a great job of organizing an overwhelming amount of material. The book is likely to serve more as a go-to reference for a particular topic rather than to be read from cover to cover. </p><p>A security practitioner with a fundamental understanding of security will find this book to be an exceptional resource for planning security upgrades, training security staff, and finding justification for best practices with the C-suite. Many sections are nothing more than easy-to-follow checklists, so retrieving the information is remarkably simple and quick.   </p><p>The broad range of topics addressed in the book makes it impossible for the authors to dig too deep on any single issue, so many of the sections do not offer full explanations. This, however, does not take anything away from the quality or usefulness of the book. </p><p>The concepts are outlined in carefully selected paragraphs that provide just enough detail to jog the memory or provide a starting point for further research from more-focused sources. All in all, this book offers great ideas and best practices for a broad range of security topics, not just physical security.</p><p><em><strong>Reviewer: Yan Byalik, CPP,</strong> is the security administrator for the City of Newport News Virginia. He is a graduate of the Virginia Tech Corps of Cadets and has worked in a variety of security roles in higher education, amusement park, and telecommunication security sectors since 2001. He is the assistant regional vice president for ASIS Region 5A in southeast Virginia.</em></p>
https://sm.asisonline.org/Pages/ASIS-Awards-School-Security-Grant-and-More-ASIS-News.aspxASIS Awards School Security Grant & More ASIS NewsGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>This month, the Dallas Independent School District opens the doors to its newest transformational school, which is designed specifically for high school students interested in architecture, urban planning, environmental science, and community development. CityLab High School will offer students the opportunity to leverage the city of Dallas as their own hands-on laboratory.</p><p>But this cutting-edge “best-fit-school” concept, part of the city's public school choice program, comes with a daunting challenge: ensuring a safe and secure environment in an urban city center, and doing so on a limited budget.</p><p>That’s where the School Security Grant Competition, started by ASIS International and the ASIS Foundation in 2003, plays a critical role. This year, in conjunction with the ASIS International 63rd Annual Seminar and Exhibits, ASIS is awarding CityLab High School a $22,000 grant to pay for upgrades to the school’s camera system, access control system, and classroom intercoms. Axis Communications is making an in-kind donation of cameras and other equipment.</p><p>ASIS 2017 Host Committee Chairman Martin Cramer, CPP, worked closely with the Dallas Independent School District Police Department to get the word out about the grant and to identify the school with the greatest need.</p><p>“CityLab really stood out,” said Cramer. “Parents had voiced concerns about the school’s proximity to downtown Dallas, a busy interstate highway, and a homeless shelter. But with most of the school’s budget going to new construction, renovations, and asbestos removal for the 1950s building, there was little more the school could afford to improve security. These funds will go a long way to provide students and staff a safe and secure learning environment.”</p><p>The school identified a number of needed security upgrades, including network improvements, new security cameras, access control devices, and classroom intercoms covering all five floors of the building. </p><p>“In a large urban school district with limited funds, the responsibility of campus safety falls within the school’s budget,” wrote CityLab High School Principal Tammy Underwood, in her grant competition application. “This grant is an amazing opportunity for CityLab students and staff to be in a safe environment so that they can focus on their highest educational goals.”</p><p>The School Security Grant Competition is just one of the many ways ASIS International pursues its mission to advance security management best practices and give back to the community hosting the Annual Seminar and Exhibits. </p><p>“Without a doubt, school safety contributes to academic success, and promotes innovation, inquiry, and risk taking in high-poverty, high-performing schools,” wrote Underwood. “Students who feel safe are more attentive and efficient in the classroom, and they also have fewer symptoms of depression. I want parents, students, staff, and visitors to be comfortable and confident coming to our building.”​</p><h4>A World of Opportunity at the ASIS 2017 Career Center </h4><p>As the premier education and technology event for security professionals worldwide, ASIS 2017 promises unparalleled networking and career development options. </p><p>Now in its sixth year, the Career Center will continue to offer unprecedented professional value. Free to all attendees, the Career Center offers résumé reviews, career coaching, networking opportunities with employers and peers, and access to career development tools and job postings—plus free professional headshots in the Headshot Studio.</p><p>The excitement starts on Tuesday, September 26, with a Coffee and Careers Networking Event sponsored by the Young Professionals Council, a perfect place for great networking. Attendees currently seeking jobs in the security field will want to return later for an interactive panel session, “What Security Employers Look For and What Makes Candidates Stand Out,” where senior security executives and hiring managers will share what elements in an applicant’s history impress employers, describe what they look for in interviews, and provide advice on how to stand out from the crowd. </p><p>The day culminates with a session for ambitious professionals who have set their eyes on the top and are looking for an answer to the question, “How do you become a CSO?” This is their opportunity to hear straight from senior executives how they reached the top, lessons learned along the way, and how attendees can benefit from their experiences. </p><p>On Wednesday, the Career Center will hold another Coffee and Careers Networking Event for those looking to transition into the security field to help them create new professional connections, foster ones already made, and take part in engaging discussions on career development. Afterwards, attendees will have a chance to further build on those discussions when they take part in the “Career Development in Security” session, which will offer young security professionals the tools and best practices they need to grow their security careers.</p><p>The Career Center wraps up with a bang on Thursday with two of its most impactful sessions. The first, “Mentoring: Guiding Tomorrow’s Leaders” will provide the next generation of security industry leaders with another avenue to hone their skills to achieve their career goals, whether it’s to embark on a new challenge or advance within their organization. Panelists will examine the importance of mentoring, as well as what to look for in a mentor, key factors in building an effective relationship, and the qualities of a successful mentee. </p><p>Attendees will continue examining the future of security with a convergence panel that will explore the ever-changing relationship between information technology and physical security. As threats around the globe become increasingly sophisticated, it is vital that security professionals in every focus area can collaborate and identify comprehensive solutions for the risks facing citizens, industry, and governments around the world.</p><p>Career Coaching and résumé reviews will take place during exhibit hours. Stop by to book an appointment. </p><p>“ASIS has been instrumental to my professional development and as cochair of the Young Professionals Council, it has been particularly rewarding to help shape the high-caliber programming. From CSO perspectives to employer hiring needs to mentorship best practices and leadership skills, ASIS 2017 will provide security professionals at every stage of their careers with the tools they need to succeed in today’s job environment,” says Angela Osborne, PCI, regional director for Guidepost Solutions. “I encourage security professionals across every sector to take advantage of the breadth of career-enhancing education, advice, and professional development that will be available.”</p><p>Whether attendees are new to the security field and looking for those first valuable connections, or seasoned veterans of the industry seeking to further their existing careers, the Career Center offers a world of opportunity ready to be explored.</p><h4>International Buyer Program Helps Expand ASIS 2017’s Global Footprint</h4><p>Attendees and exhibitors at ASIS 2017 will have the chance to expand the scope of their business opportunities to a global level. Thanks to the U.S. Department of Commerce International Buyer Program (IBP), a joint government-industry effort, hundreds of global buyers from multiple delegations will attend ASIS 2017 for business-to-business matchmaking with exhibitors and attendees. The buyers represent security professionals from around the world.  </p><p>“The International Buyer Program provides an excellent opportunity for security professionals globally to benefit from the collective wisdom of the 22,000 attendees and exhibitors at ASIS 2017,” says Godfried Hendriks, CPP, managing consultant at GOING Consultancy BV and secretary of the ASIS International Board of Directors. “In today’s threat environment, security professionals need a global community of peers they can turn to year-round for support, best practices, and information sharing. ASIS 2017 will help facilitate these relationships.” </p><p>Every year, the IBP generates approximately $1 billion in new business for U.S. companies, primarily through increased international attendance at participating U.S. trade shows. </p><p>ASIS 2017’s participation in the IBP provides attendees with access to a broad array of security professionals, qualified international buyers, representatives, and distributors. It also increases the chances of finding the right international business partner. Not only will attendees meet more global buyers, representatives, and distributors, but exhibitors’ products and services can be listed in the Export Interest Directory and distributed to all international visitors for additional awareness.</p><p>Once a potential partner is identified, attendees have complimentary use of the on-site International Trade Center, where companies can meet privately with prospective international buyers, prospective sales representatives, and other business partners.</p><p>To assist in facilitating conversations, international trade specialists will be available on-site in the International Trade Center to provide matching assistance and expert trade counseling to global delegates and U.S. exhibitors.</p><p>Don’t miss out on the chance to expand your global footprint. Stop by the International Trade Center on the expo floor to learn more. ​</p><h4>All the Hub-Bub</h4><p>ASIS 2017 promises a show floor filled with fantastic networking opportunities, groundbreaking security products and service solutions from industry-leading exhibitors, and second-to-none education opportunities. At the center of it all is the ASIS Hub, an enormous 1,600-square-foot presence on the show floor that is serving as the place for all things ASIS International. </p><p>The Hub is the primary location for meeting with ASIS staff and learning more about becoming a member, obtaining one of the three board certifications, and getting involved in one of the professional interest councils. It’s also the place to unwind and recharge—literally—in the lounge with several charging stations.</p><p>The Hub will function as the go-to space for everything related to ASIS councils, with council members standing by to answer questions and offer expertise. The 34 ASIS councils explore focus areas like Crime Prevention and Loss Prevention, Healthcare Security, Information Technology Security, Investigations, Physical Security, and much more. There is a council for security professionals in nearly every discipline and industry sector.</p><p>The staging point for multiple Fireside Chats, the Hub will provide attendees an opportunity to interact in small groups with speakers after select education sessions. Members can visit the Hub for updates on the certification programs and exhibitor press conferences. And this year, the prize booth is located inside the Hub, where, twice a day, lucky attendees will walk away with exciting prizes.</p><p>Members of ASIS International are part of the largest community of security professionals worldwide, all with the shared goal of advancing global security. Engaged in their local communities year-round, members are dedicated to the security mission and making all communities safer places to live. Additionally, ASIS certifications are recognized worldwide as the gold standard of excellence in security management. Offering Certified Protection Professional® (CPP), Professional Certified Investigator® (PCI), and Physical Security Professional® (PSP) accreditations that are transferable across all industry sectors and geographic borders, ASIS certifications are valuable investments in advancing a security career. </p><p>Those who stop by the Hub can gain insights and tools needed to further their careers, get more involved in the Society, and learn about the unmatched benefits of membership in ASIS International. ​</p><h4>LIFETIME CERTIFICATION</h4><p>Congratulations to the following members who have been named Lifetime Certificants.</p><p>• Thomas M. Prochaska, CPP</p><p>• W. David Rabern, CPP</p><p>• David O. Best, CPP</p><p>• Walter F. Bodner, CPP</p><p>• James M. Gill, CPP</p><p>• Peter Urbach, CPP, PCI, PSP</p><p>• Richard G. Steele, CPP</p><p>• Samuel E. Manto, CPP​</p><h4>LIFE MEMBER </h4><p>The ASIS Board of Directors has granted life membership to Bob Battani, CPP.</p><h4>MEMBER BOOK REVIEW</h4><p><em>The Key to Keys: 5 Steps to Developing an Effective Access Control System</em>. By Randy Neely. CreateSpace Publishing; available from Amazon.com; 118 pages; $15.95.</p><p>While this book could more aptly be titled <em>Keys: A Memoir</em>, author Randy Neely does a sound job of highlighting a widespread challenge that everyone in the security business has experienced at one time or another—the effective control and accountability of key and access systems.</p><p>Neely employs first-person narrative to recount his professional history and how he invented key and access control systems, relying too much on personal description for a professional publication. </p><p>Nonetheless, the author does a superb job of bringing to life the adage that necessity is the mother of invention. After experiencing a series of expensive lost key episodes, he created a system to more effectively manage keys. Valuable first-hand stories help round out the problem-impact-solution triad. </p><p>Neely chronicles the financial and legal impacts that inadequate controls can bring. For example, a single set of lost master keys cost a university nearly $350,000. The impact doesn’t end with the bottom line, but it can also adversely affect legal documents and court cases, as well as an organization’s reputation.</p><p><em>The Key to Keys </em>has some instructive value to students of security management, but it goes too far in promoting the author’s products. Further, some of the photos, tables, and figures lack defining labels or captions, are presented out of focus, or do not adequately line up.  </p><p>The most valuable lesson from this book is that motivation and initiative can inspire an earnest practitioner to not only safeguard people and property, but also to take that next step and invent new and effective ways to help improve security practices.</p><p><em><strong>Reviewer: Terry Lee Wettig, CPP</strong>, is an independent security consultant. He was previously director of risk management with Brink’s Incorporated and a U.S. Air Force chief master sergeant. He is a doctoral candidate in organizational management and a member of ASIS. ​</em></p>
https://sm.asisonline.org/Pages/Book-Review---Weakest-Link.aspxBook Review: Weakest LinkGP0|#91bd5d60-260d-42ec-a815-5fd358f1796d;L0|#091bd5d60-260d-42ec-a815-5fd358f1796d|Cybersecurity;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p><em>Bloomsbury Business; Bloomsbury.com; 240 pages; eBook; $21.99.</em></p><p>Cybersecurity is a complex issue that spans multiple disciplines and occupational fields, and it’s a topic that can make executives nervous. <em>The Weakest Link: Why Your Employees Might Be Your Biggest Cyber Risk </em>offers an in-depth look at the cyber vulnerabilities that exist within organizations. It offers an international perspective on how to implement simple strategies through situational awareness, observation, and other methods. </p><p>The authors are seasoned practitioners with excellent credentials. Their real-world experience translates into viable text as they articulate their viewpoints through practical standards, charts, graphs, diagrams, behavioral explanations, scenario-based examples, and other materials.</p><p>Research indicates that employees create one of a company’s biggest vulnerabilities as they connect to the Internet through internal resources. Today nearly all employees complete at least some of their duties on a computer, tablet, machine, or other peripheral that is connected to a computer network. This book highlights just how easily they can put an entire organization at risk.</p><p>The authors explain the import­ance of having specific policies, procedures, and protocols in place to prevent internal vulnerabilities from becoming active threats. They recommend implementing a strong security culture throughout the organization by engaging leaders and creating a plan that involves all of the internal stakeholders. The plan must be purposeful, collaborative, defined, communicated, accountable, enforced, and—perhaps most importantly—realistic. Other practical strategies from the textbook are based on strict historical and proven principles. </p><p>The only shortfall of this book is that some of the examples and models provided are brief and not fully explained. Additional real-world examples and case studies would help the reader see how the principles can be applied. That said, this interdisciplinary book is a great addition to security management literature and applicable to other organizations in the international community.  </p><p><em><strong>Reviewer: Thomas Rzemyk, Ed.D.</strong>, is a professor of criminal justice at Columbia Southern University and director of technology and cybersecurity instructor at Mount Michael Benedictine School. He is a criminology discipline reviewer in the Fulbright Scholar Program, and he is a member of ASIS.</em></p>
https://sm.asisonline.org/Pages/Global-Water-Risk.aspxGlobal Water RiskGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​If, as biblical wisdom reveals, the meek shall inherit the earth, then perhaps it will be the dirty, not the pure, who help build a sustainable global future—at least when it comes to water, say scientists.</p><p>As an issue of global significance, water security has recently vaulted to prominence. Half of the world’s largest cities now experience water scarcity, and roughly two-thirds of the world’s populace face seasonal or annual water stress. </p><p>The future looks even drier. Demand for water is expected to exceed supply by 40 percent within 15 years, if current conditions continue. By 2025, absolute water scarcity will be a daily reality for an estimated 1.8 billion people, according to a United Nations (UN) estimate. Water scarcity can lead to instability and violence; the crisis in Syria was triggered by, among other factors, a historic drought from 2007 to 2010.</p><p>But water security is a complex issue, and scarcity is merely one of its components.</p><p>Most activities that require water produce wastewater. As water usage grows, so does the production of wastewater. And more than 80 percent of wastewater worldwide is released into the environment untreated according to some estimates. </p><p>This discharge can contribute to devastating consequences. In 2012, for example, more than 800,000 deaths worldwide were caused by contaminated drinking water, inadequate handwashing facilities, and insufficient sanitation services. </p><p>In the oceans and larger seas, wastewater discharge sometimes causes deoxygenated dead zones that harm an estimated 245,000 square kilometers of marine ecosystems, according to UN estimates.</p><p>But instead of being discharged, wastewater can be treated—and reused. And more officials and experts are realizing the benefits of this new approach. </p><p>“Wastewater is gaining momentum as a reliable alternative source of water,” says the recently released United Nations World Water Development Report for 2017: Wastewater, the Untapped Resource. </p><p>“Wastewater is no longer seen as a problem in need of a solution, rather it is part of the solution to challenges that societies are facing today,” the report finds. “Wastewater can also be a cost-efficient and sustainable source of energy, nutrients, organic matter, and other useful by-products.” </p><p>Given the skyrocketing demand for water, the positive effect that wastewater reuse could have on the global water crisis is “immense,” says Robert Glennon, a water policy expert at the University of Arizona and author of Unquenchable: America’s Water Crisis and What to Do About It.</p><p>“This is a very big deal,” Glennon tells Security Management. He cites the example of the state of Arizona, which has been active in reusing water for a few decades now. Facilities like golf courses and ballparks can consume large amounts of water, he says, so Arizona’s water reuse practices have been helpful. </p><p>Moreover, state officials have formed WateReuse Arizona, a group that assists communities in achieving sustainable water supplies through reuse. Among other things, the group offers scholarships for Arizona college students interested in specializing in water reuse and reclamation.</p><p>On the U.S. federal level, the U.S. Department of the Interior announced in May that it awarded $23.6 million to seven states for researching, planning, designing, and constructing water reuse projects. </p><p>Often, treating wastewater so that it can be reused for agricultural purposes is less expensive than purifying it to the level where it can be used as drinking water. Given this, countries are becoming more aggressive in their water reuse programs, according to the report. </p><p>For example, in 2013, 71 percent of the wastewater collected in the Arab states was safely treated, and 21 percent was being reused, mostly for irrigation and groundwater recharge.   </p><p>Other regions are realizing the potential benefits of wastewater reuse. In the Asia Pacific region, some countries have discovered that byproducts from domestic wastewater, such as nitrogen, phosphorous, and salt, have potential economic value. </p><p>For example, case studies in Southeast Asia have shown that revenues generated from wastewater byproducts, such as fertilizer, are significantly higher than the operational costs of treating the wastewater. That provides an economic incentive for water reuse, the report finds. </p><p>However, “more needs to be done across the region to support municipal and local governments in managing urban wastewater and capturing its resource benefits,” the report adds. </p><p>In Latin America and the Caribbean, urban wastewater treatment has almost doubled since the late 1990s, so that between 20 and 30 percent of wastewater collected in all sewer systems is now treated. </p><p>“Treated wastewater could be an important source of water supply in some cities, particularly those located in arid areas (such as Lima), or where long-distance transfers are required to meet growing demands, particularly during drought (such as São Paulo),” the report finds.   </p><p>While progress in reusing wastewater has been made in the United States and around the world, there are still constraining factors hindering even more progress, Glennon says. One is cost; some localities in developing countries struggle to afford construction of wastewater treatment plants.   </p><p>Another is that countries like China and India continue to use unsustainable practices when it comes to their water supply, such as “pumping groundwater with impunity.” India, for example, has yet to truly face up to its water shortage crisis and change its practices. “The rules of groundwater pumping remain so relaxed,” Glennon says. </p><p>And in places where water scarcity is currently not a huge issue, some officials have the attitude of, “Why should I bother to reuse water if I can just drill a well?” Glennon says. He compares this attitude to the mistaken belief that an unlimited number of straws can be placed in the same glass—eventually, all the liquid will be sucked out. </p><p>In addition, there are some security issues related to the practice of wastewater reuse, says Yves Duguay, CEO and founder of HCIWorld, who has had on-the-ground experience with audits of water works and other infrastructure systems. For example, systematic controls in the process are needed to ensure that health, safety, and security requirements are maintained. “Most of the time, my audits have shown a lack of oversight and controls, along with poor contract performance management. This can increase the risk for water reuse,” he says. </p><p>This is doubly important in areas where waste management operations, which can include water reuse, are linked to corruption and even organized crime. “How certain are we that waste, solid or liquid, is being disposed as expected and regulated?” he asks. </p><p>Still, developed countries like the United States and Canada can show leadership by developing a systematic approach to the recycle and reuse of wastewater, Duguay says. And since it is not an “in-your-face issue,” wastewater reuse needs more awareness and advocacy so it is not crowded out by more publicized political concerns. “There is little room on our governments’ agenda for such a topic, unless it is talked about and frequently communicated to the general public,” he explains.</p><p>Nonetheless, in areas of the world where water scarcity hits hardest, it will ultimately become a necessity to reuse treated wastewater, because supply will not hold out, Glennon says. “Some places will have to use that for drinking water—there is simply no alternative,” Glennon explains. Duguay echoes this view: “There is no doubt that we need to control our utilization of water; it’s a unique resource that is not infinite,” he says. </p><p>In the end, the UN report argues that, in a world where limited water resources are increasingly stressed by over-abstraction, pollution, and climate change, it is imperative for officials around the globe to focus on wastewater treatment and reuse.   </p><p>“Neglecting the opportunities arising from improved wastewater management,” the report concludes, “is nothing less than unthinkable.”  ​ ​</p>
https://sm.asisonline.org/Pages/Safety-in-Shared-Spaces.aspxSafety in Shared SpacesGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​Coworking spaces  are on the rise around the globe. These flexible work settings allow people without a traditional office building to still enjoy many of the amenities that come along with having a dedicated work environment. </p><p><em>The 2017 Global Coworking Survey</em>, conducted by Deskmag, along with SocialWorkplaces.com, found that there are an estimated 13,800 active coworking spaces worldwide, hosting more than 1 million people. </p><p>This represents a major increase from five years ago, when just 2,070 coworking spaces were used by 81,000 people globally. COCO, a coworking company based in St. Paul, Minnesota, offers several different levels of membership and types of space, so clients are only paying for the amount of time they need and space they require, says Megan Dorn, director of operations at COCO. </p><p>“Our idea in doing that was to be with our clients as they grow—from the beginning of their business, to hiring employees, to maybe needing private offices—which we also have,” she says. “So that’s what makes us a little bit different than your typical coworking space.” </p><p>When the company started in 2010, it had to distribute physical keys to its members, “which is a nightmare as you’re trying to grow,” she notes, and a security concern if a key was ever lost. </p><p>Because COCO normally leases its space in a larger building, it needed a security solution that was as flexible as the working environment it provides. “We usually have to find ways—when we’re opening a space or acquiring a space—to work with the building to find ways to get our security system installed,” Dorn explains. </p><p>When COCO acquired a new space in Chicago last May, the existing security system was a door locked by a PIN code, which the building never changed. The PIN code was distributed to a large number of people.</p><p>“The space got broken into a week before we acquired it. Laptops were stolen, and people were really on edge,” she notes. “So as soon as we came in to the Chicago space, one of our top priorities was to get a really solid access and security system in place.” </p><p>COCO turned to Brivo’s OnAir, a cloud-based access control system that easily integrated into the company’s membership dashboard, called Bamboo. Using Brivo, COCO can easily distribute keycards to its clients and manage membership usage and levels. </p><p>To set up the system, Brivo representatives come to COCO’s space and add card readers to the appropriate doors. They also set up schedules and the different access levels for membership types.</p><p>COCO has one membership accountant who works out of the company’s headquarters and oversees assigning new members a keycard number through Brivo. “It’s all digital, so it can be done remotely,” she notes. </p><p>A community manager at the member’s location—the lead COCO employee for that site—can then log on to Brivo and see which card number has been assigned for that client, add the number to their member profile in Bamboo, and distribute it. </p><p>Changing, granting, and revoking access levels, as well as keeping track of when members come and go throughout the building, are all managed through the Brivo platform. </p><p>“Say you want to upgrade a member from part-time to full-time. We’re able to just go into Brivo and quickly change your access. It’s active the moment that you do it,” she notes. “That’s actually been really helpful for us, given we have all this variability in types of membership.” </p><p>When a member badges in, a wealth of information comes up on the Brivo dashboard for the community manager to see. “Their picture, their name, their membership level, how many times they’ve checked in already that month, it immediately shows up,” she says. “So it tells you in real time exactly who’s in your space and when.”</p><p>The business value of OnAir is immense for COCO, Dorn points out, because the company can tell how often members are actually using the space, and whether they have made payments, as soon as they present their access card to the door reader. </p><p>“Let’s say someone is delinquent on payment. As soon as the member checks in, there’s going to be big red circle with an exclamation point [on the dashboard]–you can’t miss it,” she says. “It’s definitely helped us lower the sheer amount of delinquent payments that we have, and receive that payment.”</p><p>When a member badges in, Brivo also alerts the community manager if that person hasn’t been in the space very often that month. </p><p>“If we can find a member who we consider at-risk, who hasn’t been using the space, and we’re alerted to that we can reach out to them, invite them to an event, or try whatever we can to reengage them,” Dorn says. </p><p>COCO is also in the initial stages of using Brivo MobilePass, which lets COCO staff remotely lock and unlock doors via a smart device, for members who want to access the space after-hours but forget their keycard. </p><p>Because of how easily it can deactivate and reactivate access, COCO also encourages members who leave the company to keep their keycards. </p><p>“The goal is to try to get the member to come back. So if you have that card and you come back, you’re already set up in our system, all we have to do is reactivate the card and then we’ll also waive any setup fees,” Dorn says. </p><p>She notes the combination of security and business insights from Brivo has been tremendous for COCO. </p><p>“Brivo as a security system has helped us go from being a group of people working out of a space to a full-fledged company,” she says. “It really helps us manage all of the different types of membership and the stages of business they’re in.” </p><p><em>For more information: Nicki Saffell, sales@brivo.com, www.brivo.com, 301.664.5242 ​</em></p>
https://sm.asisonline.org/Pages/Protecting-Fine-Art-and-Other-Industry-News.aspxProtecting Fine Art and Other Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​PROTECTING FINE ART</h4><p>Thousands of visitors enter El Museo Thyssen-Bornemisza in Madrid each day to view the museum’s priceless masterpieces. To safeguard the precious art, the museum recently switched from analog video surveillance to an IP-based system. Bosch Security Systems helped the museum create a single integrated security system with a Bosch Video Management System and IP cameras that provide recording and storage of images, in addition to video analytics.</p><p>A special “museum mode” enables administrators to predefine a perimeter around an artwork, creating a virtual, invisible protective barrier. When the perimeter is breached by, say, an attempt to touch an artwork, an alarm is sent to the control center and security’s mobile devices, so personnel can quickly take action. This virtual barrier is a convenient alternative to conventional infrared barriers.</p><p>For those exhibits displayed in low-light conditions, the museum selected Bosch IP cameras with starlight technology. These cameras ensure that dimly lit areas can be properly monitored without additional lighting, and the museum need not compromise artistic concepts and ambience for security reasons.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>BriefCam video analytics embedded in Milestone’s video management platform are making efficient video investigation possible for Massachusetts General Hospital.</p><p>Bristow U.S. LLC won a contract from Hess Corporation for medevac services in the Gulf of Mexico.</p><p>Disaster recovery service provider Databarracks has announced that it is now a corporate partner of the Business Continuity Institute.</p><p>EyeLock LLC entered into a partnership with STANLEY Security to deliver EyeLock’s suite of access control solutions to North America.</p><p>Hikvision will help secure the iconic Holocaust Memorial Miami Beach.</p><p>BSE (formerly the Bombay Stock Exchange Ltd.) selected IBM Security to design, build, and manage a cybersecurity operations center.</p><p>IDSecurityOnline entered into an exclusive distribution agreement with ScreenCheck for its new line of durable ID card printers.</p><p>Lexmark International, Inc., announced that its Secure Document Monitor uses Intelligent ID’s Endpoint ID.</p><p>XProtect IP video management software from Milestone Systems was selected to protect a Picasso exhibit at the Tomie Ohtake Institute in São Paulo, Brazil.</p><p>Scania AB is using a Morse Watchmans key control and management system. </p><p>NAPCO Security Technologies, Inc., will supply Pepperdine University with its Trilogy Networx Locks for use on the Malibu, California, campus.</p><p>OnSSI is integrating its Ocularis 5.3 with S2 Security Corporation’s NetBox software.</p><p>Quantum Corp. announced that Zhejiang Uniview Technologies Co. Ltd., will become a Quantum value-added reseller and strategic alliance partner. </p><p>Razberi Technologies will embed CylancePROTECT software from Cylance in Razberi ServerSwitchIQ appliances.</p><p>Security Door Controls added Ascheman Marketing Group to its national family of security industry sales and support centers.</p><p>Siklu Inc. signed a distribution agreement with ALLNET, which will carry Siklu’s complete line of millimeter wave wireless radios.</p><p>TierPoint, LLC, is partnering with Compass Datacenters to build a new facility in Broken Arrow, Oklahoma.​</p><h4>GOVERNMENT CONTRACTS</h4><p>American Traffic Solutions won a contract from the Houston-Galveston Area Council for traffic control, enforcement, and signal pre-emption equipment.</p><p>ASPIDER-NGI and SURFnet, the Dutch National Research and Education Network, are partnering on eSIM to develop applications with an initial focus on identity management and authentication.</p><p>Axon announced that the Alameda County Sheriff’s Office in California purchased Axon Body 2 cameras and a five-year Evidence.com license.</p><p>An updated Disaster Resilience Scorecard was developed for the United Nations Office for Disaster Risk Reduction by AECOM and IBM with support from USAID and the European Commission.</p><p>Mosaic451 was awarded a contract for technology products and related services from the city of Charlotte, North Carolina.</p><p>The STRATTON U.S. Coast Guard cutter recently deployed with a small unmanned aerial system, the Insitu ScanEagle, which helped in four interdictions—seizing more than 1,676 kilograms of illicit contraband and apprehending 10 suspected drug traffickers.</p><p>Nextdoor social network for neighborhoods is partnering with the U.S. Federal Emergency Management Agency to support its mission to help communities prepare for and mitigate all hazards.</p><p>UL received a grant from the U.S. Defense Advanced Research Projects Agency for cybersecurity testing of Internet of Things (IoT) gateways for industrial control system applications to help mitigate security risks.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>Forbes named Allied Universal to its America’s Best Employers list for 2017.</p><p>ByteGrid Holdings LLC was awarded FedRAMP Ready status by the U.S. Federal Risk and Authorization Management Program.</p><p>ClearDATA was granted EU-U.S. Privacy Shield Certification.</p><p>Concurrent Technologies Corporation was recognized as a 2017 Best for Vets employer by Military Times.</p><p>Conformance Technologies announced that its InConRadar offering received the Electronic Transactions Association’s PayPal Tech Innovation Award for best risk solution.</p><p>Crowe Horwath has been designated as a HITRUST CSF Assessor by HITRUST. </p><p>At KuppingerCole’s recent European Identity & Cloud Conference in Munich, Germany, the Danfoss IoT security framework project was recognized with an award in the Best IoT Security Project category.</p><p>EventTracker announced that SC Magazine awarded EventTracker SIEMphonic with a perfect five-star rating in the 2017 UTM/SIEM/NGFW annual product Group Test review.</p><p>EyeLock LLC received a U.S. patent for enabling a single camera to acquire iris biometrics, as well as a face image, by providing suitable illumination for both.</p><p>FreeWave Technologies, Inc., announced that its ZumLink 900 Radio Series and Industrial IoT Programmable Radio were named bronze award winners by the American Business Awards and the IT World Awards, respectively.</p><p>G2’s Payment Laundering Detection was named a 2017 Pay Awards winner in the Fraud Fighter category. The selection was made by a panel of payment industry experts assembled by Paybefore.</p><p>The G4S North America Training Institute was named one of the best organizations for learning and development by Chief Learning Officer magazine for the fourth consecutive year.</p><p>Hikvision announced that its DS-2TD4035D-25 Bi-Spectrum PTZ Camera System was named the 2017 ESX Innovation Award winner in the video </p><p>surveillance category.</p><p>Hillard Heintze announced that it achieved ISO/IEC 27001:2013 information security certification from the BSI Group.</p><p>NAPCO Security Technologies announced that its StarLink Connect was awarded a 2017 ESX Innovation Award in the intrusion systems category.</p><p>OpSec Security gained ISO 14298 security standard accreditation for its Washington and Leicester facilities.</p><p>The Protection Bureau announced that The Monitoring Association renewed its TMA Five Diamond Monitoring Center designation.</p><p>Zenitel Group announced that TMC named Vingtor Stentofon’s TCIV-6 IP SIP Video Intercom a 2017 Unified Communications Product of the Year Award winner.​</p><h4>ANNOUNCEMENTS</h4><p>Boon Edam Inc. announced that a new production line for its Lifeline Optical Turnstiles is now operational at the company’s Lillington, North Carolina, factory.</p><p>Continental Access, a division of NAPCO, launched a newly revitalized website at www.cicaccess.com.</p><p>The Cross-Cultural Institute introduced Badges2Bridges, a new training program that helps police officers and law enforcement professionals work effectively with minority communities.</p><p>DataPath, Inc., expanded operations in the Washington, D.C., area to complement its existing Maryland office. </p><p>Detection Technology Plc. completed the expansion of its Beijing factory, with a larger production floor and new investments in automation and technology.</p><p>Frontier Services Group Limited acquired 25 percent of the International Security and Defense College in Beijing, becoming the largest private security training school in China.</p><p>F-Secure acquired Digital Assurance, a U.K.-based security consultancy firm.</p><p>The former Giesecke & Devrient Banknote business unit is now the Giesecke+Devrient Currency Technology independent subgroup.</p><p>Sheriff’s agencies will use the Lockheed Martin Indago quadrotor small unmanned aerial system to perform search-and-rescue operations as part of the Project Lifesaver International program that supports clients with autism, Down syndrome, and dementia.</p><p>The Master Lock Company relocated its headquarters to a newly renovated campus in Oak Creek, Wisconsin.</p><p>Point Blank Enterprises acquired Gould and Goodrich.</p><p>PSA Security Network acquired USAV, a team of audio-visual integrators, and its affiliate CI Edge. </p><p>The Security Industry Association (SIA) established the SIA Public Safety Working Group to develop recommendations to improve the safety, security, and sustainability of cities.</p><p>Security On-Demand Inc. acquired Infobright Approximate Query technology and intellectual property assets from Infobright Corporation.</p><p>Software Assurance Forum for Excellence in Code released two best practices documents to help combat growing security vulnerabilities. One is on threat modeling, and the other is about third-party components.</p><p>Tyco Security Products is partnering with the mayor of Boston and the Boston Women’s Workforce Council in a program designed to close the gender wage gap for women in the Boston area.</p><p>In a team-building exercise, Vector Security’s managers and senior executives constructed travel-version wheelchairs for donation to the Keystone Chapter of the Paralyzed Veterans of America.</p><p>Vision-Box reinforced its support to border control officials in Portugal, sponsoring the Conference “SEF and the Economy.” ​ ​</p>