https://sm.asisonline.org/Pages/On-Premise-vs-the-Cloud.aspxGP0|#91bd5d60-260d-42ec-a815-5fd358f1796d;L0|#091bd5d60-260d-42ec-a815-5fd358f1796d|Cybersecurity;GTSet|#8accba12-4830-47cd-9299-2b34a4344465On-Premise vs the Cloud0

 

 

https://sm.asisonline.org/Pages/Bully-Bosses-Can-Inflict-More-Damage-with-Negative-References.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Bully Bosses Can Inflict More Damage with Negative References

 

 

https://sm.asisonline.org/Pages/How-to-Lead-a-Diverse-Security-Workforce.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465How to Lead a Diverse Security Workforce

 

 

https://sm.asisonline.org/Pages/Taking-Flight.aspxGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Taking Flight

 

 

https://sm.asisonline.org/Pages/May-2018-Industry-News.aspxGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465May 2018 Industry News

 

 

https://sm.asisonline.org/Pages/Banks-Balk-on-Bud.aspxGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Banks Balk on Bud2018-05-01T04:00:00Z
https://sm.asisonline.org/Pages/Certification-Profile---Douglas-Beaver,-CPP.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Certification Profile: Douglas Beaver, CPP2018-05-01T04:00:00Z
https://sm.asisonline.org/Pages/Book-Review---Emergency-Planning-for-Nuclear-Power-Plants-.aspxGP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Book Review: Emergency Planning for Nuclear Power Plants 2018-05-01T04:00:00Z
https://sm.asisonline.org/Pages/The-Unseen-Threat.aspxGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465The Unseen Threat2017-11-01T04:00:00Z
https://sm.asisonline.org/Pages/Industry-News-July-2010.aspxGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465Industry News July 20102010-07-01T04:00:00Z

Security Management

 Morning Security Brief

View RSS feed

 SM Weekly

Retrieving Data

 SM Daily

Retrieving Data
Not a Member? Join Now

 

 

https://sm.asisonline.org/Pages/Banks-Balk-on-Bud.aspxBanks Balk on BudGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​When seasoned security manager and longtime ASIS International member Brian Gouin started working as a consultant and virtual security manager for a medical marijuana production facility in Maryland, he certainly had some questions about the security challenges that the new gig might pose.  </p><p>Would external theft be a problem?  He had no experience in this sector, and dark visions of criminal cartels stormtrooping the facility to steal product occasionally crossed his mind. Luckily, that never happened.</p><p>"External theft has really not been a big problem. Surprisingly, there has not been a lot of that," says Gouin, who has spent nearly 30 years in the security industry and is currently owner of Strategic Design Services, a firm specializing in security design and project management services.</p><p>Still, the marijuana production facility did employ armed guards, because it held product that was worth at least $5 million. "That's more dollar value than 99 percent of banks in the state," Gouin explains. And since marijuana is so easy to sell, that product can be considered almost the equivalent of cash, he adds.   </p><p>But unlike external theft, internal theft was a problem. Employees sometimes helped themselves to a bit of product "to go" when leaving the facility for the day. Finding ways to screen workers on the way out was difficult. Complicating this matter is that keeping track of the on-hand marijuana supply can be a complex task. "You can't inventory it the way you inventory other products. You have to dry the plant; when you dry the plant, it loses weight," Gouin explains.  </p><p>And working with certain company employees was an unusual experience, even for a veteran security consultant well-accustomed to adjusting to different types of office cultures.  "It's so unique because of the type of person working there. Most of these people five years ago were running from the cops and making this stuff in their basement," Gouin says. "They are naturally distrusting of security."  </p><p>Overall, many of the facility's biggest security challenges stemmed from the fact that it is a nearly all-cash business. The ramifications of this are many. For instance, cash at a thriving marijuana business can accumulate quickly; but when it comes time to deposit the money earned, banks generally do not want to accept huge currency bundles, which can result in scrutiny from federal regulators, Gouin explains.</p><p>Given this, many marijuana businesses are forced to keep significant cash on hand. Some outgoing expenses, like compensation for day workers and certain bills, can be paid in cash, Gouin explains. Much of the rest can be deposited in smaller amounts that are spread out, so the bank will accept them. Of course, transiting large amounts of cash can also be risky, so the operation bought and used an armored vehicle, described by Gouin as "a small vanny-type thing."</p><p>Still, in one way the business that Gouin works for is lucky—it found a local bank that will take its money.  </p><p>Because U.S. federal law still includes marijuana on its Schedule I list of illegal substances, no large "tier one" bank will do business with cannabis companies now, says Joshua Laterman, CEO and founder, National Association of Cannabis Businesses (NACB). This is the "black letter of the law" that means that banks can be charged with crimes like money laundering if funds they have accepted from cannabis companies are mixed with other funds and enter the U.S. federal wire deposit system. This could lead to a federal indictment. </p><p>"No tier one bank enters the sector unless the law changes or some type of [exception] is put into place, like a safe harbor," Laterman says. "There is no cure, full stop."</p><p>This is a significant problem, given the growth and revenue-generating power of the cannabis industry. Going into 2018, nine states and Washington, D.C., had legalized marijuana outright; for medical purposes, marijuana is legal in 29 states and D.C. This year, at least 12 states are poised to consider marijuana legalization; Vermont already did so in January. On the whole, the industry generated $7 billion in revenue in the last 12 months, and this figure is expected to rise to $10 billion this year, according to NACB.</p><p>Given this revenue generation, some local banks (like the one working with Gouin's facility) and credit unions have tried to step in and fill in the vacuum. "It's the only show in town right now," Laterman says. These local banks often charge an extra compliance fee, and they usually just provide an account and some checks, without offering more involved services like credit cards. On the whole, these banks believe that the potential reward is worth the potential risk, and that working with local business is "in service of their mission." </p><p>"It's all very hyper-local," Laterman says. "They do it in a very personal way."</p><p>Nonetheless, these local banks usually cap the amount of deposited funds at $250,000, the limit that the Federal Deposit Insurance Corporation (FDIC) will insure. All things considered, there are not nearly enough of these smaller banks willing to accommodate all the revenue. "It's like trying to handle a two-liter soda with a Dixie cup," Laterman says.  </p><p>Across the northern border, no such problem exists. Canada has legalized marijuana for medicinal purposes throughout the country, and banks and other financial institutions have no problem working in the industry. "You're seeing investment banks, you're seeing accounting firms, and you're seeing law firms who will not do any transactions in the United States, but they are doing a lot in Canada," Laterman explains.</p><p>However, back in the United States, it is possible that there will be some movement on the legal issue in the near future. Some analysts have said that if more states continue to legalize marijuana, it will simply not be tenable for the country to have two sets of applicable law. Congress will have to act and change the banking laws to allow for an exception, so that a licensed marijuana distributor can use the banking system.</p><p>Moreover, what may help drive an effort for a solution is the U.S. government's realization that an industry generating billions in revenue without a banking and finance structure to support it could turn into a security nightmare. </p><p>"The money needs a place to be put, and there's not enough places to put it in. That's a growing public safety risk," Laterman says. California, he adds, holds some promise as a potential solution driver. As part of that state's legalization effort, officials set up a high-powered working group to address the legal issues. "It's a great effort; they are getting great people around the table," Laterman says.</p><p>He adds that NACB, which describes itself as the only self-regulatory organization (SRO) in U.S. cannabis, will continue its work of professionalizing the industry with credentialing, licensing, education, and other such programs. "We need to address the trust and information gaps, and better understand who the players are," Laterman explains. </p><p>Meanwhile, security managers who are curious about what it is like to work in the U.S. cannabis industry may want to check out The Marijuana Project, a novel published by Gouin (under the pen name Brian Laslow) that was in part inspired by his experiences in the industry. </p><p>In the book, security expert Sam Burnett, a conservative family man who runs a security program at a medical marijuana production facility, wrestles with the moral issues of working with the drug while he navigates the dangerous plot twists and turns that the thriller storyline takes him through. Although the book is fiction, the various industry issues and scenarios that the main character, a security expert, is involved with may be of educational value.</p><p>As for the real-life Gouin, who initially wondered if working in the cannabis sector would tarnish his professional reputation, he now says his experience was a positive one for his business: "It gave me another niche." And so his advice for fellow security managers who are interested in following his lead is "go for it"—as long as they do their due diligence beforehand.</p><p>"You have to understand the quirks of the industry," he says. ​</p>
https://sm.asisonline.org/Pages/Certification-Profile---Douglas-Beaver,-CPP.aspxCertification Profile: Douglas Beaver, CPPGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>Douglas Beaver, CPP, was a police officer with the Montgomery County Police Department in Maryland, when he started his own security and investigations services business on the side. As the business grew, he eventually had to choose between continuing in law enforcement or embarking on the entrepreneurial path. He took the leap.</p><p>For many, transitioning from a military or law enforcement career into the private sector can be an unsettling and daunting experience. Beaver tackled this challenge by researching the relationship of law enforcement to private security firms. During his research, he discovered the American Society for Industrial Security—now ASIS International—and he sought to learn more about the opportunities ASIS offers. Understanding the value of networking and the importance of remaining current within the industry, he joined the Society to tap into this security management resource.</p><p>For 20 years, he served as president, CEO, and chief investigator for AmGuard Security and Patrol Services. By the time he sold the business to a national provider in 2005, he had grown his company to include more than 300 employees to support operations in the Washington, D.C., metro area.</p><p>Having sold his company, he wasn't ready to stop working. He attained his Certified Protection Professional® (CPP) certification in 2009. "I realized that I needed more than simply business experience to compete for senior level positions within the security industry," Beaver says. "I needed a gold standard certification that would demonstrate my knowledge and competency to prospective employers. Unlike any other security industry accreditation that I've seen, the CPP certification covers a broad spectrum of security principles and practices."</p><p>"The CPP designation provided me with a distinct advantage when competing for positions, particularly in 2009, when jobs were scarce, and unemployment remained high," he adds. "The certification was instrumental in my selection for my present senior level security role. A CPP certification was written into the position description and was prerequisite for even being considered."</p><p>Beaver now serves as director of corporate security for the National Museum of Women in the Arts in Washington, D.C. He oversees a team of 40 officers with five direct reports. His responsibilities touch access control, scheduling personnel, developing emergency preparedness and business continuity plans, budgeting for system upgrades, conducting interviews, purchasing equipment, and more. </p><p>In addition to these job responsibilities, he is presently an active member of two ASIS councils. Embracing his museum role, he serves as chair of the ASIS Cultural Properties Council. He also serves on the Global Terrorism, Political Instability, and International Crime Council. </p><p>Far from the job shortage that faced the industry a decade ago, Beaver foresees a bustling security industry moving forward. "Opportunities abound in both public and private services," he says. "As society becomes more and more complex, security opportunities will continue to grow. This potential cannot be realized passively. To be successful, you must remain actively engaged in the global security community—the ASIS community."</p>
https://sm.asisonline.org/Pages/Book-Review---Emergency-Planning-for-Nuclear-Power-Plants-.aspxBook Review: Emergency Planning for Nuclear Power Plants GP0|#21788f65-8908-49e8-9957-45375db8bd4f;L0|#021788f65-8908-49e8-9957-45375db8bd4f|National Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​Published by Routledge; crcpress.com; 362 pages; $105.</p><p>Starting with a sound historical platform, <em>Emergency Planning for Nuclear Power Plants </em>prepares the reader to understand the complex nature and evolution of emergency preparedness requirements for nuclear power plants. The author focuses on the technical basis for nuclear emergency planning and provides the reader with a good understanding of issues and risks from a radiological dose perspective. He also leaves room to apply emergency management principles, such as fire and security, that also play a role in response planning. </p><p>The book explains how certain directions taken by the U.S. Nuclear Regulatory Commission have helped shape the industry abroad. A key example is a discussion on reactor consequence analysis and the probabilistic risk assessment that is used widely across the industry. The author's focus is on U.S. regulations, although one could argue that difference in regulation today across countries is not significant, thus increasing the relevance of the book to industry emergency managers around the world. </p><p>The discussion centers on emergency planning considerations that address the issues associated with two reactor types—pressurized water reactors and boiling water reactors—that are prevalent in the United States. Some risks attributed to other reactor types are not fully addressed in the book.</p><p>By effectively deploying mitigation strategies developed since the Fukushima nuclear accident in 2011, the expected radiological dose from large-scale nuclear accidents can be significantly reduced. The author provides good explanations of all aspects of emergency planning. However, too much detail in some sections might confuse the reader. Still, this book is a must-read for all nuclear industry emergency planning managers.</p><p><em>Reviewer: Dan McArthur has more than 30 years of experience in the nuclear industry and now serves as senior strategist at Bruce Power, where he focuses on regulatory and government affairs pertaining to emergency management policy. He is a member of the Canadian Standards Association providing technical input and guidance on emergency preparedness requirements for nuclear power plants in Canada.</em></p>
https://sm.asisonline.org/Pages/May-2018-ASIS-News.aspxMay 2018 ASIS NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​Big Event Coming to the Big Apple</h4><p>More than 2,200 security and law enforcement professionals will convene in New York City for the ASIS International 28th New York City Security Conference and Expo May 16-17 at the Jacob K. Javits Convention Center.</p><p>The conference will open Wednesday at 8:00 a.m. with a keynote address from Scott Morrison, head of global crisis management and command centers for JPMorgan Chase & Co. He will share his thoughts on emerging trends from terror attacks to kidnapping, and from cybersecurity to intellectual theft.</p><p>Two days of peer-developed education will address some of today's most pressing security challenges, including a full day of learning focused on active assailant prevention and response. Conference sessions include:​</p><p><strong>Drone Technology</strong></p><p>Take a closer look at the current state of drone technology and explore industry trends from all angles.</p><p><strong>Get Your Seat at the Table</strong></p><p>Through the lens of enterprise security risk management (ESRM), security becomes an organization's roadmap for meaningful, effective risk management.</p><p><strong>Securing an Open Office</strong> </p><p>Facebook Chief Global Security Officer Nick Lovrien will explain how Facebook developed a collaborative open office environment while attempting to mitigate risk. </p><p><strong>Active Threat and Culture</strong></p><p>This session examines the cultural differences between an organization that values the "spend" vs. those that look at security as an expense that needs to be slashed.</p><p><strong>Vehicle Attacks</strong></p><p>No community is immune from vehicular terrorist attacks, which have recently caused 204 deaths and 861 injuries in the U.S. and abroad. How can they be deterred?</p><p>Besides paid conference registration, attendees can choose a free expo-only pass that includes access to the exhibit hall on both days, daily receptions and coffee breaks on the exhibit floor, and career coaching services.</p><p>The ASIS New York City Chapter will honor His Eminence Timothy Cardinal Dolan, Archbishop of New York, as the NYC Chapter Person of the Year. Dolan, whose career in the Catholic Church spans more than 40 years, will be honored for his dedication to the people of New York. Always a popular event, the Person of the Year Luncheon will be held at noon on Thursday, May 17. Tickets to this event are included with conference registration. To learn more, go to asisonline.org/nyc2018.​</p><h4>Globalization Update</h4><p>In April, ASIS International members received an update about the work underway in support of the Society's globalization initiative and the impact of this work on 2018 Board elections. President Richard E. Chase, CPP, PCI, PSP, sent the following letter to members last month.</p><p>Fellow members,</p><p>I am pleased to provide an update on the progress made to fully globalize ASIS International. Our 2017-2021 strategic plan identified improving the ASIS Global Network as one of five key priorities. It's understood that the future success of ASIS is dependent on our ability to be relevant to members around the globe, across all markets, and at every step of the career ladder. This can only be done by employing innovative solutions that foster collaboration and easy sharing of information locally, regionally, and worldwide.</p><p>In 2017,  the Globalization Task Force, composed of a diverse cross section of volunteer leaders, was established to evaluate common practices of other global nonprofit organization management models and identify changes we could make to our organizational structure. Led by 2018 Board Treasurer Godfried Hendriks, CPP, this important work, which included reviewing and redefining roles and responsibilities for our chapter and regions, council, and regional advisory council leaders with an aim to "flatten" our leadership structure, will allow the Society to be more deliberate and nimble in how we deliver our products and services. And most importantly, to create an inclusive volunteer leadership structure that truly reflects the diversity of our membership.</p><p>Through this undertaking, it became clear that we needed to not only rethink our volunteer structure, but also how we select our governing leadership positions—specifically, the ASIS International Board of Directors. </p><p>In March, a Presidential Governance Task Force was established to reevaluate the ASIS board nominations process and overall board governance with an eye towards global diversity, inclusion, and selection criteria, which targets a proportionate representation of the association's members and the overall depth of experience of directors' backgrounds. </p><p>Co-chaired by President-Elect Christina Duffey, CPP, and 2018 Board Secretary John Petruzzi, CPP, this task force is working under an expedited timeline, with a goal of delivering recommendations—including director job descriptions and creation of a governance committee—by January 2019. As such, the Board passed a motion to forgo Board elections in 2018. This will provide an opportunity for the task force to complete its work and to ensure the Board of Directors reflects the global membership it represents in 2019 and beyond. </p><p>Later this summer, we will be providing more details on the Globalization Task Force recommendations. This is an exciting time for the Society as we continue to implement our member-driven strategic objectives. As always, we encourage you to email asisfuture@asisonline.org to share your feedback.</p><p> </p><h4>ASIS Brings Top Business Education to Spain</h4><p><em>Effective Management for Security Professionals 2-5 July, 2018 Madrid, Spain</em></p><p> Looking to take the next step in developing your business acumen? Security executives are invited to attend a four-day executive education program in Madrid, Spain. The theme is Establishing the Security Role as an Enabler for Business Success.</p><p>Presented by IE Business School in collaboration with ASIS International, this course provides an opportunity for mid-career to senior security managers to take a deep dive into the central areas of management, enhancing their effectiveness in the corporate environment and enabling them to align their expertise with the organization's security requirements. It focuses on:</p><p>•             Leading in Uncertainty</p><p>•             Creating a Strategic Mindset</p><p>•             Applying Financial Information</p><p>•             Negotiation</p><p> Prior to the program, registrants will be granted access to the IE Online Campus to prepare classwork and readings and facilitate their campus learning experience. Once on site, the class will participate in interactive lectures, debates, group work, case studies, and role play.</p><p>"Today, companies and organizations are looking for professionals who are highly trained not only in enterprise security risk management, but also in business," says program director Juan Muñoz, CPP, ASIS Spain Chapter chair. "For years now, the role of chief security officer has been progressively evolving. It is precisely in this context where the Effective Management for Security Professionals course reaches its main added value as a business executive education tool."</p><p>ASIS members save significantly on their registration fees. Additionally, registrants will receive 40 CPEs for their participation. New this year: Members of the CSO Center receive an additional 5 percent discount off the member fee. See details at https://www.asisonline.org/ie.  ​</p><h4>International Buyer Program Delivers Global to GSX</h4><p>Security professionals outside North America who are looking to participate in the most anticipated security event of the year can start planning their travel now.</p><p>Global Security Exchange (GSX), formerly the ASIS International Annual Seminar and Exhibits, is proud to once again participate in the U.S. Department of Commerce's International Buyer Program (IBP). </p><p>The IBP is a government–industry partnership that brings global buyers to the United States for business-to-business opportunities with U.S. firms at major industry trade shows. GSX's participation in this event demonstrates the importance of the event to the security industry worldwide. </p><p>According to the department's website, "every year, the IBP results in approximately a billion dollars in new business for U.S. companies, and increased international attendance for participating U.S. trade show organizers."</p><p>International attendees are encouraged to join an IBP delegation and take advantage of special registration rates and benefits—available only to participants. To register with an official IBP delegation, contact the commercial service specialist at your local U.S. Embassy or Consulate to discuss attending GSX 2018 and receive a special registration code. To learn more about the International Buyer Program, visit <a href="http://www.gsx.org/IBP">www.gsx.org/IBP</a>.​</p><h4>Executive Protection Council Spotlight</h4><p>Launched in 2015, the Executive Protection Council is one of the newest ASIS councils. In the years since its creation, the council has more than doubled in size, with 40 members representing organizations as diverse as Northrop Grumman, Facebook, McDonald's, Time Warner Cable, and PayPal, to name a few. Each member is driven to share expertise and affirm executive protection's place in the security profession. </p><p>Executive protection (EP) is a specialized field of security that Council Chair Bob Oatman, CPP, says has grown dramatically in recent years: "The profession itself has existed in government since the days of Lincoln—Secret Service, security details for mayors and governors, and the like. The private sector is where big change is taking place. Hollywood A-listers, corporate executives, and their families—they're recognizing the need for what we do. We wouldn't have a standing council if companies weren't engaged in having EP as part of their security program. We're business enablers. We protect the brand. We help people in the C-suite get where they need to go."</p><p>Oatman has been conducting a two-day EP classroom training with ASIS since 1998. When the Society launched a certificate for the program in 2013, the council's founding members saw it as a significant validation that EP has a place in the broader security community. They approached ASIS about forming a council, and now enjoy an increased reach to share EP best practices.</p><p>The council will sponsor an education session this September at Global Security Exchange (GSX), formerly the ASIS International Annual Seminar and Exhibits, where it has sponsored sessions each of the last three years. At this year's session, in a simulation titled "The Trilogy of Executive Protection—Making the Case," council members will present attendees with an EP problem. In groups, attendees will workshop and develop a pitch to sell their EP solution to mock executives.</p><p>In addition to its classroom program, the council has also produced a webinar, contributed an article to Security Management, and developed a proposal for the potential development of an ASIS standard or guideline around executive protection.</p><p>The council also engages in outreach to keep ASIS members up to date on its initiatives. Its biannual newsletter, which shares council updates and touches upon important EP themes, is available in both English and Spanish. The latest issue, available within ASIS Connects, includes articles on the unique rewards and challenges of working in EP and the council's proposed standard or guideline. The council has also appointed liaisons to the Young Professionals, Women in Security, Transitions Ad Hoc Council, and Critical Infrastructure Working Group. </p><p>To learn more about executive protection or to engage with council members or find their latest newsletter, visit ASIS Connects and search for Executive Protection.​</p><h4>Life Members</h4><p>Raymond L. Dean, Sultan H. Alzahrani, and Herbert M. Kaltz, CPP, have been granted lifetime membership to ASIS. </p><p>Dean has been a member of the New York City Chapter since 1981, and he served as the chapter's chair, vice chair, and secretary. In 2011, Dean was awarded the Presidential Award of Merit by ASIS. He is a two-time recipient of the Eugene Casey Award for dedicated service to the NYC Chapter, plus he won the chapter's Joseph Spillane Lifetime Achievement Award in 2017. </p><p>Alzahrani joined ASIS more than 30 years ago and has been an active member of the Dhahran, Saudi Arabia Chapter, serving as its chair multiple times. He has also been a regional vice president and assistant regional vice president for many years. </p><p>Kaltz has been a dedicated member of ASIS for more than 32 years. He provided service to the ASIS Detroit Chapter as a chapter chair, vice chair, secretary, and communications chair. ​</p><p> </p><h4>ESRM in Action</h4><p>In 2016, ASIS made enterprise security risk management (ESRM) an organizational priority and has begun infusing this management philosophy into all the Society's programs and services. In the months ahead, we will provide updates, as well as showcase how members are implementing ESRM in their organizations.</p><p><em>By Jon Harris, CPP, PSP</em></p><p>Our "aha" moment came during the ESRM tabletop exercise at the ASIS conference in Dallas last year. My colleague and I realized we were omitting critical components from our risk evaluation process, and therefore missing an opportunity to add significant value to our company. We had a business continuity program, emergency response processes, workplace violence prevention program, and facility risk assessments—the miss was that they were not connected and were too focused on the security aspects of our organization.</p><p>By taking a step back and reframing our entire program within the structure of ESRM, we were able to focus our efforts towards the areas of greatest operational risk, using the existing programs we had in place and providing valuable intelligence to the business. Additionally, we broadened the purview of our assessment to the entire organization—from the supply chain, to operating facilities, and through our service organizations.</p><p>Here are our recommendations:</p><p><strong>Get started</strong>. Taking too much time to analyze and come up with the perfect approach will stall your efforts. The process is organic and will evolve over time; continuous improvement is a critical facet of the program and must be embraced. </p><p><strong>Invite everyone to the party.</strong> The greatest value will come with the broadest inclusion and participation. </p><p><strong>Make it simple. </strong>We distilled our mission down to four words: Keep the doors open. At the end of the day, that was our focus and being successful in all the components of our program would deliver that output. The simplicity of the message allowed for an easy delivery to all levels of the organization.</p><p>While the program is still in its infancy, we are excited about our progress to date and the long-term prospects. ESRM has been transformative for how we proactively approach our security program and visibly increase its value to the organization.</p><h4>Member Book Review</h4><p><em>Can I See Your Hands: A Guide to Situational Awareness, Personal Risk Management, Resilience and Security.</em> By Gav Schneider, CPP. Universal Publishers; universal-publishers.com; 226 pages; $27.95. </p><p>Dr. Gav Schneider is a South African martial artist who teaches security workshops. His new book <em>Can I See Your Hands </em>stands on the shoulders of well-known legends in the violence prevention and threat assessment arenas, including police response trainer Dave Grossman (who wrote the Foreword) and Hollywood security guru Gavin de Becker.</p><p>Schneider starts with the familiar concept that there are three groups in the world: sheep, wolves, and shepherds. This book is definitely for the latter. Creating awareness of violent situations and developing personal risk management skills are his overarching themes. He uses models and acronyms to remind readers to avoid denial and to create and train for survival strategies.</p><p>He goes back in time to reference Jeff Cooper's color codes: Conditions White, Yellow, Orange, and Red (and Black in actual war-time combat). He has created his own model, the "Three Point Check System" (3PC-S), which focuses on scanning the Place, the People in the area, and Planned incident actions and Contingency plans. </p><p>The author espouses the use of the Run. Hide. Fight. concept for active assailants as a doable contingency plan. But during a violent attack, you must be able to activate what he calls "Adrenal Response Management." This means controlling stress through repetitive physical and mental training for protection, awareness, and to manage the stress response that can paralyze people in life-threatening situations.</p><p>While most content is familiar, the final chapter, which gives new information on the consequences of having to use physical or deadly force against someone, is the most valuable part of the book. The mental fallout of using force is not often discussed, and it's a vital part of surviving the encounter.</p><p>The slim book is easy to understand, with a useful summary at the end of each chapter. The appendix offers information for protection at home, away from home, and in cyberspace. An index would have been helpful, and adding workplace protection concepts would have been useful. All in all, readers who want to ramp up their pre-attack awareness will learn how to do it. </p><p>Reviewer: ASIS member Dr. Steve Albrecht, CPP, is a Colorado Springs-based author, trainer, and threat management consultant.</p>
https://sm.asisonline.org/Pages/May-2018-Industry-News.aspxMay 2018 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<h4>​OUTDOOR SURVEILLANCE</h4><p>The Musical Instrument Museum (MIM) in Phoenix, Arizona, displays instruments collected from around the world and offers concerts and performances in addition to its conventional and interactive installations.</p><p>To enhance the security of its exterior spaces, the museum recently worked with integrator IES Communications to upgrade its outdoor surveillance system. MIM implemented a variety of Bosch cameras to provide high-quality images of the museum's outdoor areas, which include two parking lots, a courtyard at the main entrance, an additional courtyard at the student entry, an outdoor café, and a seating area. The video system also monitors outdoor special events. Supported by new exterior LED lights, cameras produce full-color images throughout the night. Built-in video analytics alert the museum's security operators to possible risks, such as objects left behind or the gathering of large crowds that may create congestion in an area.</p><p>The museum selected Altronix Pace Ethernet solutions for video transmission over existing cabling and Security Center from Genetec for management and monitoring.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>Ted's Pawn in Norwood, Ohio, is using video verification technology from 3xLOGIC, Inc., to reduce false alarms and catch intruders.</p><p>Auth0 was selected by Coinsource to provide authentication for its ATMs.</p><p>Dallmeier security technology is protecting drivers and goods at premium parking areas of Euro Rastpark to combat the theft of vehicles, cargo, and fuel.</p><p>Delta Scientific barriers have been installed at Atlanta's new stadium, home to the Atlanta Falcons. The barriers were installed by Tusco.</p><p>Detection Technology announced that its x-ray detectors helped provide security at the Olympics in Pyeong­chang, South Korea. </p><p>NASCAR named Digital Ally Inc. a Preferred Technology Provider. With this new designation, Digital Ally will provide cameras to enhance security, safety, and the officiating process.</p><p>The ScotRail Alliance purchased Edesix body-worn cameras for frontline staff.</p><p>Honeywell announced that its Xtralis VCA suite of security software is integrated into the Axis Camera Application Platform from Axis Communications Inc.</p><p>Australian law firm Clayton Utz selected the Intapp business acceptance solution as part of its risk management and compliance programs.</p><p>Integrated Biometrics announced that Grupo Neoyama will serve as its primary distributor for Brazil.</p><p>Florida Atlantic University selected the Software House C•CURE 9000 security and event management platform from Johnson Controls. The platform will be used to secure the university's Charles E. Schmidt College of Medicine.</p><p>OnSSI appointed Warren Associates as its manufacturer's representative for northern California and northern and central Nevada.</p><p>Pelco by Schneider Electric and Ipsotek integrated their products to create a solution for managing video and analytics.</p><p>ProSource added two vendors, ICE Cable Systems and MantelMount; the company added Centricity as a group exclusive service partner.</p><p>Guardian Protection Services selected the Qolsys IQ Panel 2 as its next-generation platform following a one-year evaluation period.</p><p>Rackspace collaborated with Cisco to provide advanced protection against evolving threats in the multicloud environment.</p><p>A new partnership between SALTO Systems and Phunware will provide integrated mobile access control platforms with applications for multifamily residential properties.</p><p>Rubicon Labs joined the open source EdgeX Foundry project to unify the IoT market.</p><p>SmartMetric, Inc., appointed Hogier Gartner CIA S.A. as distributor for its biometric security cards within South America.</p><p>Speco Technologies integrated its IP cameras into Synology's Surveillance Station.</p><p>TagMaster North America, Inc., installed readers and hang tags in conjunction with ATS Traffic parking barriers and equipment for the VIP parking at Grey Eagle Casino in Calgary, Alberta, Canada.</p><p>Tangent Academy announced a Pro Partnership with 5.11 Tactical, in which 5.11 Tactical will become the official apparel of Tangent Academy.</p><p>Tech Electronics is partnering with Blue Line Technology to provide threat detection, access control, and concierge applications.</p><p>Transition Networks, Inc., partnered with Milestone Systems to integrate its switches with software into the Milestone Systems XProtect VMS.</p><p>Xtera completed interoperability testing with Infinera, a provider of Intelligent Transport Networks.​</p><h4>GOVERNMENT CONTRACTS</h4><p>Axon Public Safety Australia sold 11,000 Axon Body 2 cameras to the Victoria Police in Australia. </p><p>Drone Aviation Holding Corp. delivered its multi-mission capable tactical Winch Aerostat Small Platform to the U.S. Army.</p><p>The U.S. Coast Guard has conducted approximately 100,000 search-and-rescue operations since 2006 with support from the Rescue 21 Coastal system built by General Dynamics Mission Systems.  </p><p>IndraSoft, Inc., was awarded a multiyear task order by the U.S. Census Bureau to conduct end-to-end fingerprinting and identity proofing of selectees.</p><p>InstantEye Robotics received an order from PMA-263, the U.S. Navy and Marine Corps Small Tactical Unmanned Aircraft Systems Program Office, for additional systems to support deployed Marine infantry squads.</p><p>Mt. Vernon School District in Indiana is deploying the Security Alert Messaging system from iSIGN Media Solutions Inc.</p><p>J&S Franklin's DefenCell products were installed in two separate areas in South Australia for environmental applications including ground stabilization, flood protection, and erosion control.</p><p>Gallant Technologies Inc. successfully transitioned the technology for a non-detonable explosives training aid developed and licensed from the Johns Hopkins University Applied Physics Laboratory under funding from the U.S. Department of Homeland Security Science and Technology Directorate.</p><p>Vicente López, one of the 135 districts that make up the Buenos Aires province, is using cameras made by Pelco, Bosch, and Axis Communications, as well as Milestone XProtect Professional video management software, as part of its surveillance system, which was integrated by Exanet S.A.</p><p>NAPCO Security Technologies, Inc., announced that its Continental Access division products are being used in a project for the Albany County Schools in Wyoming.</p><p>Optim LLC was awarded a five-year, sole-source contract to supply its FreedomView Videoscope to U.S. Customs and Border Patrol to search for illegal contraband hidden in vehicles, containers, and other conveyances. </p><p>Canada granted funds from its Community Resilience Fund to support a Ryerson University research initiative working to evaluate approaches to countering radicalization to violence in Canada.</p><p>The Republic of Kosovo is rolling out a nationwide mobile driver's license solution based on the VeriGO DriveID platform from Veridos.</p><p>VSTEP delivered NAUTIS simulators to the Royal Bahamas Defense Force in cooperation with DAMEN and Alphatron.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>AFL received patent awards for developing products and technologies within the accessories, optical connectivity, and fusion splicing divisions.</p><p>Akoustis Technologies, Inc., announced that its headquarters facility received ISO 9001:2015 certification, completing certification for all company facilities.</p><p>Allot Communications Ltd. was awarded Best Mobile Security Solution in the 2018 Cybersecurity Excellence Awards. </p><p>CNH Industrial's Ulm plant in Germany has achieved Bronze level certification in the World Class Manufacturing program.</p><p>Crestwood Technology Group earned the Counterfeit Avoidance Accreditation Program accreditation AC7402 for supply chain management.</p><p>At Mobile World Congress 2018, Evolved Intelligence was named best supplier of mobile network security solutions.</p><p>G4S announced that its North America Training Institute won three Training and Leadership Awards from HR.com and Leadership Excellence and Development.</p><p>Genetec Inc. was named one of the top employers in Montreal, Canada, by the editors of Mediacorp Canada Inc., for the eleventh consecutive year.</p><p>Just Add Power earned a Top New Technology Award for Video Wall Solutions at ISE 2018 in Amsterdam. </p><p>Jumio announced that its Netverify solution was named the gold winner in the Best Fraud Protection category by the 2018 Cybersecurity Excellence Awards. </p><p>MacAulay-Brown, Inc., renewed and updated its Quality Management System certification for ISO 9001:2015.</p><p>Oncam completed the retesting and documentation of its 360-degree solutions with Milestone XProtect open-platform IP video management software.</p><p>Securonix won multiple awards in multiple categories at this year's Cybersecurity Excellent Awards, including Most Innovative Cybersecurity Company and Best UEBA Product.</p><p>Sielox LLC recognized MCM Integrated Systems as National Business Partner of the Year.​</p><h4>ANNOUNCEMENTS</h4><p>Anixter Inc. is expanding the footprint of its North American flagship distribution Center in Illinois with 30 to 40 percent more storage capacity and new automation technology.</p><p>ASSA ABLOY acquired Phoniro to further develop verticals and scale solutions internationally.</p><p>A group of leading companies launched the Better Identity Coalition to develop policy initiatives that promote the adoption of better solutions for identity verification and authentication. Founding members include Aetna, Bank of America, IDEMIA, JPMorgan Chase, Kabbage, Mastercard, Onfido, PNC Bank, Symantec, US Bank, and Visa.</p><p>BGN Technologies announced that researchers at Ben-Gurion University of the Negev developed a new Light Invariant Video Imaging software technology that can significantly improve picture clarity of cameras in sub-optimal lighting.</p><p>Bosch Security Systems changed its name to Bosch Building Technologies to reflect greater portfolio breadth.</p><p>Bravatek Solutions, Inc., acquired HelpComm, Inc.</p><p>Broco Rankin acquired long-time client Chamberlain Security.</p><p>Camden Door Controls celebrates its 30th anniversary in 2018 with a new rebranding look, spanning a new logo, website, and design of product guides and other collaterals.</p><p>The Cloud Security Alliance released Using Blockchain Technology to Secure Internet of Things, a white paper that explores the capabilities of blockchain technology in facilitating and improving the security of the Internet of Things. </p><p>In support of the #MeToo movement, Continuum GRC is allowing organizations to create a free custom anti-­harassment policy using its IT Audit Machine GRC software.</p><p>Erin Harrington Communications launched a new website at erinharringtoncommunications.com. </p><p>The Florida Center for Cybersecurity (FC2), launched the Florida CyberHub, a virtual environment and shared cybersecurity resource center to support cybersecurity education, workforce development, information sharing, and research across the state.</p><p>Galaxy Integrated Technologies announced that it will provide complimentary, no-charge security assessments for all schools in its service area in New England, New York, and New Jersey. </p><p>The Gaming Standards Association and Gaming Standards Association Europe created a new Technical Committee dedicated to blockchain use. </p><p>Idesco Corp. is celebrating the 75th anniversary of the company. </p><p>IDSecurityOnline.com launched a new STEM Scholarship Program in 2018 to help shape the leaders of tomorrow.</p><p>IEC Electronics will open a new state-of-the-art manufacturing facility in Newark, New York.</p><p>Iron Mountain Incorporated opened a secure, state-of-the-art federal records center in Suitland, Maryland.</p><p>Konica Minolta Business Solutions U.S.A., Inc., acquired VioPoint, Inc., a company specializing in intelligent cybersecurity. </p><p>In 2017, Legrand employees volunteered more than 2,000 hours of their time, as part of the company's Better Communities program.</p><p>Miami-Dade Aviation Department and U.S. Customs and Border Protection hosted a ceremony to celebrate Miami International Airport's newly renovated Concourse E federal inspection facility for international arrivals. The facility provides expedited passport screening via facial recognition. </p><p>Nortek Security & Control introduced a Technician Certification Training Program for dealers, technicians, and integrators.</p><p>The Charter of Trust calls for binding rules and standards to build trust in cybersecurity and further advance digitalization. Initial signers of the charter are NXP, Siemens, the Munich Security Conference, Airbus, Allianz, Daimler Group, IBM, SGS, and Deutsche Telekom.</p><p>Speco Technologies added new videos to its website regarding its Digital Deterrent.</p><p>TEAM Software, Inc., launched a new Volunteer Time Off program to encourage its employee owners to give back to the community.</p><p>Viakoo joined Spiceworks and is sponsoring the Physical Security Group. </p><p>Vigilant Solutions, announced that a law enforcement agency used its facial recognition and license plate recognition technology in a kidnapping case that helped to locate the missing person and get her to safety. ​</p>
https://sm.asisonline.org/Pages/Risk-Rising.aspxRisk RisingGP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465<p>​Incidents of security breaches of various types continue to increase around the world, according to the 10th annual edition of Kroll's <em>Global Fraud and Risk Report.<img src="/ASIS%20SM%20Callout%20Images/0518%20NT%20Chart.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;" /></em></p><p>The report includes commissioned research by Forrester Consulting, which conducted a worldwide online survey of 540 senior executives across multiple industries. The report divides incidents into three categories: fraud, cyber (theft, loss, or attack involving information or data), and security (physical security breach at the company). For all three categories, the report breaks down the responses by country and by industry sector.</p><p>Overall, 86 percent of respondents said they experienced a cybersecurity incident in the previous 12 months, up 1 percent from the 2016 report. For fraud, 84 percent of respondents said they experienced an incident in the previous 12 months, up 2 percent from the last report. And 70 percent of respondents said they experienced a physical security incident in the previous 12 months, up 2 percent from the previous report.</p><p>Although these percentages varied from country to country, the percentage of those experiencing incidents was higher than 50 percent in every category. For example, in the United Kingdom, 94 percent of respondents said that they experienced a cybersecurity incident in the previous 12 months, but only 61 percent in Colombia said the same.</p><p>In addition, incidents of fraud could be especially costly. About 54 percent of respondents said that incidents of fraud cost their business at least 4 percent of its revenue in 2017—that is, 5 percent said the cost of fraud exceeded 10 percent of revenue, 18 percent said the cost was 7 to 10 percent of revenue, and 31 percent said the cost was 4 to 6 percent of revenue.  </p><p>In looking to the future, Kroll CEO David R. Fontaine says that at some point it may not be viable for the report to continue breaking down incidents and risks into three separate categories. In fact, that seems to be one of the report's key findings—"risks are increasingly starting to cut across areas, due to factors like economic globalization and increasing digital connections," Fontaine writes in the report's introduction. </p><p>"Organizations must adopt a holistic approach to enterprise risk management and develop integrated risk mitigation strategies to address this new threat environment," he says.  </p>

 UPCOMING EVENTS AND EDUCATION

07 - 08 May 2018
Violence Assessment and Intervention ​(Rhode Island)

​16 - 17 May 2018
ASIS NYC 2018 (New York)

13 June 2018
Harnessing Culture and Technology for Prevention (Webinar)

2 - 5 July 2018
ASIS / IE Business School​​ (Madrid)

9 - 10 July 2018
Executive Protection​ (Chicago)​

​More Events>>​​​
​​​​