Security, Professional, and Business Services ASIS 2017 Exhibit Hall: An Interactive Learning LabGP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a43444652017-09-26T04:00:00ZShow Daily staff<p>​ASIS renewed its commitment to making the 63rd Annual Seminar and Exhibits (ASIS 2017) the industry's flagship event of the year. The Society listened to its members, attendees, exhibitors, and sponsors—and that feedback is reflected in the modernized exhibit floor in Dallas.</p><p>This year the exhibit hall has been transformed into a learning lab environment featuring dozens of education sessions, product demonstrations, and career development opportunities. These features will allow attendees to experience a wide variety of integrated solutions in person while getting up-close and hands-on with the latest technology applications.</p><p>New this year, the Impact Learning Theaters (booths 1253 and 3795) will feature a series of 25-minute presentations by leading technology practitioners, end users, researchers, and thought leaders on a wide array of critical security issues and hot topics. These sessions are free to all attendees and provide an opportunity to investigate innovative ideas and solutions in a more intimate setting. A complete list of expo floor education can be found in the ASIS mobile app. </p><p>Also new this year is the ASIS Collaboration & Networking Zone (3509), presented by Anixter, which provides security integrators, end users, and suppliers a place to network and collaborate. Attendees can speak with Anixter's Technology Support Services, navigate through a virtual tour of a secured building, win prizes at each of the interactive stations, and relax in the lounge area.</p><p>For those looking to recharge and refuel, several lounges will be available on the exhibit floor. The Connection Lounge (booth 3447) is open to all attendees and will provide a place relax and network with peers. The Certification Lounge (booth 4499B) is open to all ASIS board certification holders, and the CSO Lounge (booth 1453) is available to members of the CSO Center. </p><p>The International Lounge (booth 4399) is open to all attendees from around the world.  </p><p>In addition, the International Trade Center (booth 4199) will serve as the focal point for security buyer delegations. All attendees and exhibitors are welcome to stop by to connect with trade experts, learn more about the Department of Commerce B2B matchmaking services, and build relationships with colleagues from all corners of the globe.</p><p>A complete list of activities and sessions taking place in the exhibit hall is available in the show guide and in the mobile app.</p>

Security, Professional, and Business Services ASIS 2017 Exhibit Hall: An Interactive Learning Lab 2017 Product Showcase is More: A KISS Approach to ESRM Professional Path Executives at Home Security: Worse Than Hyperbole 2017 Product Showcase Crimes in 2015 2017 Industry News Model 101 News October 2016 To Host First Security Week 2016 Product Showcase Security Triumvirate in Orlando Online January 2016 2015 Product Showcase to Manage a Merger Seminar Product Showcase Persuasion Review: The Handbook of Security

 You May Also Like... Protection Trends<p></p><p>If you fail to upgrade your Internet technologies, you’ll find yourself stuck in 1997. But if you fail to upgrade your infrastructure, you’ll find yourself stuck in 1897. It’s a well-worn joke, but it illustrates the importance of secure, well-functioning infrastructure to modern society.</p><p>Moreover, the rise of sophisticated cyberattacks on infrastructure make it an area of increasing vulnerability, experts say. As a result, the global market for critical infrastructure protection is growing, and it is projected to reach $94 billion by 2020, according to Global Industry Analysts, Inc. This demand is being driven by the increasing need to protect critical assets and prevent disruptions to normalcy due to threats, the company reports. And because critical infrastructure assets and systems are vital to the economy, disruptions or breaches can be catastrophic.</p><p>Given the stakes in play, Yves Duguay, CEO and founder of HCIWorld, sees a clear trend in infrastructure protection—a greater focus on resilience, on being prepared before an incident occurs, and on maintaining operating continuity before and after an incident. HCIWorld’s clients include airports, transportation systems, and other key infrastructure facilities.</p><p>“Resilient organizations have moved from the ‘if’ to the ‘when,’” he says. “It’s not a question of whether or not a given scenario will materialize, it’s when and how often it will be repeated, as exemplified by the viral number of cyberattacks recorded by security agencies.”</p><p>This is an important issue in the business community, because while governments do oversee and protect some critical infrastructure, much infrastructure is in the hands of the private sector. For example, in Canada, where HCIWorld is based, a recent survey found that 80 percent of the infrastructure in the energy and water sectors is privately held. The situation is similar in the United States. “Generally speaking, there is a lot more private sector involvement, on both sides of the border,” Duguay says.</p><p>By focusing on resilience and risk management in infrastructure security, companies can dem­onstrate proper due diligence in managing the range of risks they face. “This not only offers a protection of the company’s reputation, but it also reduces its legal liabilities, and possibly its insurance costs,” Duguay says. </p><p>Some forward-thinking firms have adopted infrastructure resilience strategies that include contingency and emergency plans, which are practiced and reviewed with their employees. “Resilience must become part of everyone’s job description, not only of the security department,” Duguay says. When employees understand why certain measures are taken and their own role in contingency and emergency planning, they become much more involved and committed, Duguay explains.</p><p>When a crisis does happen, communication is crucial, he adds. “The key to the success of protecting infrastructure also lies in the ability of companies, especially large ones, to involve their employees by communicating with them in real time, and providing them with accurate information and guidance during an emergency,” he explains. </p><p>Resilience can also have bottom-line financial benefits. “Activating a contingency plan quickly to resume business activities will translate into a competitive advantage for these companies,” Duguay says.  </p><p>In addition to the move toward greater resilience, another clear trend in infrastructure security is greater interconnectedness, says Jeffrey Slotnick, CPP, PSP, CSO of OR3M and president of Setracon. Slotnick has been an architect in the U.S. homeland security enterprise, including stints writing standards and managing assessments for critical infrastructure protection. </p><p>He offers the example of a computer, which may be connected to a printer, a scanner, and other hardware. It works under the “plug-and-play” concept: all equipment is integrated, and can be operated by simply turning on one switch. Right now, infrastructure protection tools are not interconnected to the level where an access camera, a door controller, and other systems are fully integrated to the plug-and-play level. “We haven’t got there yet in the security industry,” he says. </p><p>But that’s the direction that infrastructure security will be moving in the next five years, Slotnick says. The next logical step is a common operating platform, on which disparate systems will be integrated and can talk to one another. This is already happening in some smart cities, where integrated systems are becoming more common, he explains.  </p><p>There’s also a demographic driver to this trend, as the number of technology-savvy millennials increases in the workplace. “Millennials manipulate technology differently,” Slotnick says, and they will demand more integration. </p><p>However, Slotnick also cites one negative trend that continues: the fact that infrastructure facilities are often guarded by officers who are inadequately compensated and insufficiently trained. “We take a minimum wage security officer and place that officer in front of multimillion dollar infrastructure facility, and then we wonder why situations arise that may not necessarily be to our liking,” he says. </p><p>Europe has a better model, he explains. There, security officers are in a “guild profession” with a more equitable pay scale that correlates to different position levels, such as site supervisor or area manager, for example. In contrast, the modest wages in the American system means that turnover is often a problem because officers will switch companies for a 25-cent-per-hour increase.</p><p>“If I could change one thing in the security industry,” Slotnick says, “it would be that.”</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 for the Safe City <p>​​Today's cities often use video management systems or other platforms to view camera footage, protect citizens and property, analyze incidents, evaluate security, and determine appropriate responses to events like natural disasters, disruptions to public transit and other municipal services, and other threats to public safety. <br><br>Cities implementing this connected security approach are typically referred to as safe or smart cities. Most safe cities share a common infrastructure and operate using sensors and cameras over a shared municipal network. Synthesizing information from these sensors and the data from other devices through one interface, government officials and law enforcement are afforded a comprehensive view of a city's security.<strong> </strong></p><p><strong>Integrating the Many Parts of a Safe City</strong></p><p>There are operational challenges that accompany the many systems that are included in a safe city deployment. Interoperability continues to present one of the greatest challenges, particularly with video management systems, video recording devices, and cameras. The most common scenario is that municipalities have several management systems for city operations that were created by different manufacturers, each with proprietary interfaces for integration.<br><br>To connect their different systems together, cities often end up employing a single-vendor "build once and maintain forever" approach, in which the continuing cost for integration of systems becomes prohibitively expensive. In a world where technology and features change quickly, this approach is not practical because it severely limits an end user's ability to try new technology and different vendors' products and requires a substantial financial commitment to specific manufacturers and proprietary interfaces.<br></p><p><strong>Standards in Safe Cities </strong></p><p>ONVIF was founded in 2008 by Axis, Sony, and Bosch to create a global standard for the interface of IP-based physical security products. The organization was developed to provide increased flexibility and greater freedom of choice, so installers and end users can select interoperable products from a variety of different vendors. </p><p>Product interoperability is a driving force behind ONVIF. Interoperability is a simple concept: it is the ability of a product or system to work with another product or system, often from different brands made by different manufacturers. </p><p>ONVIF profiles are subsets of the overall ONVIF specification. They group together sets of related features to make product selection easier for end users, consultants, and systems integrators. Products must be conformant with one (or more) of ONVIF's specific profiles. </p><p><strong><em>ONVIF's current profiles are:</em></strong></p><p><strong></strong></p><p><strong>Profile S</strong> for IP-based video and audio streaming, including:​<br></p><ul><li>Video and audio streaming<br></li><li>Pan-tilt-zoom control and relay output<br></li><li>Video configuration and multicast<br> </li></ul><p><strong>Profile G</strong> for edge storage and retrieval, including:</p><ul><li>Configure, request, and control recording from conformant devices<br></li><li>Receive audio and metadata stream<br></li></ul><p><strong><br>Profile C</strong> for IP-based access control, including:</p><ul><li>Site information and configuration<br></li><li>Event and alarm management<br></li><li>Door access control<br></li></ul><p><strong><br>Profile Q</strong> for easy configuration and advanced security, including:</p><ul><li>Out-of-box functionality<br></li><li>Easy, secure configuration<br></li><li>Secure client/device communications using transport layer security (TLS)<br></li></ul><p><strong><br>Profile A</strong> for Broader Access Control Configuration</p><ul><li>Granting/revoking credentials, creating schedules, changing privileges<br></li><li>Enables integration between access control and IP video management system<br> <br></li></ul><p><strong>Profile T</strong> for Advanced Video Streaming is currently in draft form and is scheduled for initial release in 2018. </p><p>Standards, such as those from ONVIF, provide the common link between disparate components of safe city systems. Designed specifically to overcome the challenges in multi-vendor environments, ONVIF's common interfaces facilitate communication between technologies from different manufacturers and foster an interoperable system environment where system components can be used interchangeably, provided they conform to the ONVIF specification. </p><p>In 2014, ONVIF member company Meyertech helped the city of York, United Kingdom, deploy a safe city solution for the city's public spaces and transportation system. Using Meyertech video management software (VMS) and information management software, the city integrated IP cameras with the many legacy systems for its York Travel and Control Centre command center. </p><p>The city's control room monitors more than 150 cameras from different manufacturers in York, and city representatives reported an immediate impact on crime rates. The integration of legacy and new IP cameras with the new VMS, which interfaced with the information management software, was made possible through ONVIF's video specification. </p><p>A standardized approach for both file format and associated players, which is often a challenge in multi-vendor environments, is also provided by ONVIF, increasing the efficiency of the process and also adding the potential of including metadata—for example, data from an analytic, indicating number of objects, speed of objects, or even colors—in exported materials and reports. Standardized file formats include MPEG4, H.264, and, with Profile T, H.265, which are readable by many standard video players on the market, including Windows Media Player, VLC, DVD players, and many more. </p><p>ONVIF has also released an export file format specification that outlines a defined format for effective export of recorded material and forensics. These specifications together make it possible not only to integrate devices in multi-vendor video security system deployments in safe city environments, but also to offer a common export file format that can streamline post-event investigations where authorities are trying to react as quickly as possible to apprehend suspects or to defuse an ongoing situation.<strong> </strong></p><p>Another ONVIF member, Huawei, is considered a leader in smart city solutions. Huawei's video management system was used in Shanghai, China, as part of the Chinese Ministry of Public Security's safe cities construction initiative. One of the key challenges of the project was to integrate old and new technology. Huawei's VMS uses ONVIF to integrate cameras from manufacturers Dahua, Haikang, Axis, Sony, and others.<strong> </strong></p><p><strong>Multi-Discipline Standards</strong></p><p>A multi-discipline physical security standard that specifies parameters for video surveillance, access control, and other essential operations of a safe city command center would likely increase the prevalence of safe cities even further.</p><p>Many in the broader technology industry see standards as an important component in both safe cities and the Internet of things (IoT). The Institute of Electrical and Electronics Engineers and other standards groups are already working on IoT standards for technology-based industries, and some experts that global IoT standards will be introduced by the end of this year. </p><p>As standards and industries collaborate even further and establish minimum interoperability standards together, the need for a multi-discipline physical security standard will become more urgent. ONVIF envisions that all physical security systems will eventually have the same interfaces for interoperability, and the organization is dedicated to facilitating the work of its members in developing such a multi-discipline standard. </p><p><em>Jonathan Lewit is chairman of the ONVIF Communication Committee.</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Century Security and CPTED: Designing for Critical Infrastructure Protection and Crime Prevention, Second Edition.<div class="body"> <p> <em> <span style="font-size:small;"> <span style="font-family:arial;">CRC Press. Available from ASIS, item #2078; 954 pages; $120 (ASIS member), $132 (nonmember). Also available as e-book.</span> </span> </em> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">As good as the first edition of 21st Century Security and CPTED was, this second edition surpasses it. Atlas, known in security circles as a consummate professional, has done an outstanding job in creating this second edition, which has twice as much material as the original edition. It also includes voluminous references and hundreds of outstanding clarifying photos in both color and black-and-white. Using humor and candid insight he incorporates all the concepts of CPTED, including design, construction, security countermeasures, and risk management strategies, and merges them into a highly informative reference manual for security practitioners at every level.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">There is a logical flow to the book. It lays a solid foundation by discussing architecture and its intent, as well as environmental crime control theories and premises liability. There is something here for everyone as it also discusses terrorism and critical infrastructure from differing perspectives. Several chapters on problem solving provide guidance on conducting threat, risk, and vulnerability assessments.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Throughout, Atlas provides a roadmap for merging security and CPTED into management principles and practices in a wide variety of facility settings, including healthcare facilities, critical infrastructure, ATMs, office buildings, parking lots and structures, and parks and green spaces. The latter portion of the book is reserved for concepts including lighting, LEED and GREEN certification, workplace violence, signage, data capture and analysis, and conducting CPTED surveys.</span> </span> </p> <p> <span style="font-size:small;"> <span style="font-family:arial;">Atlas has created the definitive book on CPTED and security. Despite the magnitude and complexity of the science and art of security management, he has done an outstanding job of merging these and other disciplines and concepts together into a cogent display of information that the reader should be able to apply in a wide variety of locations and situations. If you are only going to buy one book this year, it is strongly suggested you purchase this one. </span> </span> </p> <hr /> <p> <span style="color:#800000;"> <strong> <span style="font-size:small;"> <span style="font-family:arial;">Reviewer:</span> </span> </strong> </span> <span style="font-size:small;"> <span style="font-family:arial;"> Glen Kitteringham, CPP, has worked in the security industry since 1990. He holds a master’s degree in security and crime risk management. He is president of Kitteringham Security Group Inc., which consults with companies around the globe. </span> </span> </p> </div>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465