ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your...

15
Sands Convention Center Las Vegas, NV APRIL 1–3, 2014 Security Industry Association (SIA) 8405 Colesville Road, Suite 500 Silver Spring, MD 20910 301-804-4700 securityindustry.org/education CONFERENCE PROGRAM PLATINUM SPONSOR

Transcript of ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your...

Page 1: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

Sands Convention Center Las Vegas, NV

APRIL 1–3, 2014

Security Industry Association (SIA) • 8405 Colesville Road, Suite 500 • Silver Spring, MD 20910 • 301-804-4700 • securityindustry.org/education

ConferenCe Program

PLaTInUm SPonSor

Page 2: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

SIA EDUCATION@ISC WEST

2 3

Wednesday, april 2

SeSSIonS are CoLor Coded by TraCk:End User • Learning Labs • Workshops • Dealer, Installer, Integrator • IAPSC Seminars

School Security & Safety • Central Station / Monitoring • Access & ID ManagementVideo Surveillance • Next Generation Security • Physical Security • Signature Series

Sessions-at-a-glance

Time Title Track Room

7:30 – 8:30 am Is your Company a High-Value enterprise? Central Station / monitoring 310

7:30 – 8:30 am Security Industry Lead generation and Telemarketing Compliance Challenges and risks—now and in the future

dealer, Installer, Integrator - business development

309

7:30 – 8:30 am Tapping into new markets with Cloud Technology dealer, Installer, Integrator - Technology 307

7:30 – 8:30 am The byod of Tomorrow: Security Challenges in enterprise mobility management end User - IT related Issues 201

7:30 – 8:30 am The Winning Prescription for a Collaborative City-Wide Public Safety Surveillance System end User - Public Safety 302

7:30 – 8:30 am School Security: elevating Safety Through event Prevention School Security & Safety Series

304

8:45 – 9:45 am The great debate 2014: Use It or Lose It! Signature Series 502/503

10:00 – 11:00 am Central Station automation: from Technology to Sales Central Station / monitoring 310

10:00 – 11:00 am Structural Challenges in Converting Product Companies and Product offerings into rmr dealer, Installer, Integrator - business development

309

10:00 – 11:00 am How IP audio Surveillance enhances Security management Systems dealer, Installer, Integrator - Technology 307

10:00 – 11:00 am advanced Situational awareness: Concepts, Technologies and best Practices end User - IT related Issues 201

10:00 – 11:00 am CSI Live in action: Cracking the Code to forensic Video end User - Public Safety 302

10:00 – 11:00 am What We need is a Plan: School Security gets Smarter School Security & Safety Series

304

11:15 am – 12:15 Pm The Industry Trends Behind Verified Video Surveillance Central Station / monitoring 310

11:15 am – 12:15 Pm Surviving the Cyber Tsunami: Cybersecurity Worries and opportunities for Security Contractors

dealer, Installer, Integrator - business development

309

11:15 am – 12:15 Pm Retrofit and Migration Strategies for Video and Access Control Systems dealer, Installer, Integrator - Technology 307

11:15 am – 12:15 Pm Practical Uses for Cloud applications: How to Leverage the Cloud for your organization end User - IT related Issues 201

11:15 am – 12:15 Pm Advances in Mobile and Wearable Sensor Technology Redefine Aging in Place end User - Public Safety 302

11:15 am – 12:15 Pm beyond School Shootings: everyday Violence in k-12 Schools and methods for Prevention School Security & Safety Series

304

12:30 – 1:30 Pm The Changing fire alarm Communication Landscape Central Station / monitoring 310

12:30 – 1:30 Pm Cloud-based Security Platforms: Critical Questions from dealers dealer, Installer, Integrator - business development

309

12:30 – 1:30 Pm How to Plan, design, and Implement an affordable Common operating Platform Using Commerical off-the-Shelf Software (CoTS)

dealer, Installer, Integrator - Technology 307

12:30 – 1:30 Pm managed or Hosted Services: Which one’s right for you? end User - IT related Issues 201

12:30 – 1:30 Pm Prevention Tips and response to an active Shooter in a Hospital Setting end User - Public Safety 302

12:30 – 1:30 Pm a University’s Case Study approach to the Integration of Security Services, Systems and devices

School Security & Safety Series

304

SeSSIonS are CoLor Coded by TraCk:End User • Learning Labs • Workshops • Dealer, Installer, Integrator • IAPSC Seminars

School Security & Safety • Central Station / Monitoring • Access & ID ManagementVideo Surveillance • Next Generation Security • Physical Security • Signature Series

Sessions-at-a-glancebaCk by

PoPULar demand SeSSIonS!

baCk by PoPULar demand SeSSIonS!

Time Title Track Room

8:30 am – 5:00 Pm IaPSC Successful Security Consulting Seminar (Offered as a comprehensive program. Sessions cannot be taken individually.) • Successful Security Consulting: Introduction and Overview• The Business of Security Consulting: From Consulting 101 to Becoming a Certified Security ConsultantSm

• The Financial and Administrative Aspects of Security Consulting• Proposing Security Consulting Services and Hiring a Security Consultant• Executing and Completing the Consulting Assignment• Preparing a Responsive, High-impact Consultant’s Report• Extended Consulting Services: Designing and Implementing Integrated Management and Technical Solutions

• Offering and Delivering Convergence Consulting Services: A Holistic Security Approach to Logical and Physical Security Integration

• Summary and Seminar Wrap-up

IaPSC Seminar 307

8:30 – 10:00 am The Top 10 Lessons Learned Implementing IP Centric Solutions dealer, Installer, Integrator PSa-TeC @ ISC

304

8:30 – 10:00 am risk assessment and Security master Planning end User - Strategic management 309

8:30 – 10:00 am Is your Sales Psyche Pschying you out? optimize your ’Vitals’ for Sales Success Workshops (Sales-focused) 302

8:30 am – 12:30 Pm building Information modeling: Creating a Paradigm Shift in the building Industry Learning Labs 201/202

10:15 – 11:15 am dealing with the gC dilemma dealer, Installer, Integrator PSa-TeC @ ISC

304

10:15 – 11:15 am Unconventional Crisis Planning and the readiness factor end User - Strategic management 309

10:30 am – 12:00 Pm Increasing Sales and Customer Satisfaction: Using Technicians as your Second Sales force Workshops (Sales-focused) 302

11:30 am – 12:30 Pm open for business: new opportunities in recurring revenue dealer, Installer, Integrator PSa-TeC @ ISC

304

11:30 am – 12:30 Pm Collaborative Security: What’s in It for you? end User - Strategic management 309

1:30 – 2:30 Pm Understanding the Core elements of PSIm dealer, Installer, Integrator PSa-TeC @ ISC

304

1:30 – 2:30 Pm business Strategies for Success in the C-Suite end User - Strategic management 309

1:30 – 3:00 Pm How To design, Price and Sell Service agreements Workshops (Sales-focused) 302

1:30 – 5:00 Pm The essential basics of networking for Video Surveillance Learning Labs 201/202

2:45 – 4:15 Pm How to Identify and Cultivate PSIm opportunities dealer, Installer, Integrator PSa-TeC @ ISC

304

2:45 – 3:45 Pm driving business Success: Leadership at all Levels end User - Strategic management 309

4:00 – 5:00 Pm forum for Creative Security Solutions end User - Strategic management 309

Tuesday, april 1

SIA Education@ISC West offers various registration packages. See page 29 for more information or visit http://www.iscwest.com/Education/Pricing/

SPECIALPRICING

SeSSIon SPonSor:

SPeCIaL THankS To oUr generoUS SPonSorS:

PlAtInuM COnFEREnCE SPOnSOR tRACK SPOnSOR tRACK SPOnSOR SESSIOn SPOnSOR

Page 3: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

SIA EDUCATION@ISC WEST

4 5

Tuesday, april 1

End User - Strategic Management

Tuesday, April 1 • 8:30 – 10:00 AM

(Sm01) risk assessment and Security master Planning

a high-quality all hazards risk, threat and vulnerability assessment is the entry point for value-based business decisions related to the security function. ensuring the appropriate equipment, policies, procedures and personnel requires identifying what is being protected, what it is being protected against, and defining the loss or consequence for the enterprise. The risk assessment forms the basis for the value proposition and leads to a quality Security master Plan. These two documents combined support the organization in delineating the organization’s security philosophies, strategies, goals, programs and processes, and align the organization’s security plan with its overall business plan. This approach results in high levels of collaboration, meaningful contribution by Security to the business function, buy-in to the security program, and the necessary budget to support the program through key performance indicators and metrics.

Learning Objectives:

1. delineate the steps in the Security master Planning process.

2. Employ a five-step Security Master Planning process that includes concept definition, planning, deployment, implementation and assessment.

3. align your organization’s security plan with its overall business plan.

Presenter(s): Jeffrey a. Slotnick, CPP, PSP, Chief Security Officer, OR3M

Tuesday, April 1 • 10:15 – 11:15 AM

(Sm02) Unconventional Crisis Planning and the readiness factor

get ready for the “Unconventional Crisis,” an event so rare or severe that it overwhelms traditional mechanisms for crisis planning, management and response. Learn how unconventional crises are so different from events for which we’ve planned, and how they drive leadership and learning. Examine the differences between “preparedness” and “readiness,” and the possibility that nothing leaders have ever been taught or experienced

Thursday, april 3Time Title Track Room

7:30 – 8:30 am biometric Security: no Longer Just for Hollywood access & Id management 310

7:30 – 8:30 am ‘Locking In’ Smarter Home Technology: meeting Homeowners’ needs for Safety, Convenience and Control

Next Generation Security 304

7:30 – 8:30 am Path to Public Space Security: from Surveillance and Lighting to CPTed fundamentals Physical Security 307

7:30 – 8:30 am getting the most from your CCTV System at night Video Surveillance 309

8:45 – 9:45 am Usability: A Streamlined Experience access & Id management 310

8:45 – 9:45 am big data & Surveillance: applications across Verticals Next Generation Security 304

8:45 – 9:45 am Perimeter Security—What are yoU doing about It? Physical Security 307

8:45 – 9:45 am Troubleshooting network Video Video Surveillance 309

10:00 – 11:00 am The Power of mobile: Leveraging Smartphones for new Levels of authentication and access Control

access & Id management 310

10:00 – 11:00 am Security applications and the Internet of Things Next Generation Security 304

10:00 – 11:00 am you own the door, So don’t Leave dollars at the Threshold! Physical Security 307

10:00 – 11:00 am Storage matters: best Practices for end to end Storage Solutions for network Video Video Surveillance 309

11:15 am – 12:15 Pm The future of nfC: Lessons Learned from the first full-access Control Installations access & Id management 310

11:15 am – 12:15 Pm Leveraging Situational awareness and Intelligence from Twitter—new Techniques for analysis and Visualization

Next Generation Security 304

11:15 am – 12:15 Pm fire alarm Installations: a review of applicable Codes and Standards Physical Security 307

11:15 am – 12:15 Pm IP Video in the Connected Home—Integrating Security, Video and Lifestyle Video Surveillance 309

12:30 – 1:30 Pm What the Upcoming Sixth Edition of UL 294 Means to the Security Industry access & Id management 310

12:30 – 1:30 Pm Unmanned aerial Vehicles for air Photo mapping and event response Next Generation Security 304

12:30 – 1:30 Pm 2014: The year of the robot Physical Security 307

12:30 – 1:30 Pm Persistent Situational awareness with 360 degree Surveillance Systems Video Surveillance 309

1:45 – 2:45 Pm The Command Center Experience: From Design to PSIM Signature Series 502/503

SeSSIonS are CoLor Coded by TraCk:End User • Learning Labs • Workshops • Dealer, Installer, Integrator • IAPSC Seminars

School Security & Safety • Central Station / Monitoring • Access & ID ManagementVideo Surveillance • Next Generation Security • Physical Security • Signature Series

Sessions-at-a-glancebaCk by

PoPULar demand SeSSIonS!

SeSSIon SPonSor:

SIA Education@ISC West offers various registration packages. See page 29 for more information or visit http://www.iscwest.com/Education/Pricing/

SPECIALPRICING

will be sufficient to resolve the problem at hand. Is your organization prepared to operate at an accelerated decision-making tempo? What key concepts and models can you employ to make quick, effective decisions when faced with complex situations? Join us to explore various decision-making options, such as the recognition-primed decision model, employed in time-sensitive situations, where key information is limited and goals may not be clearly defined.

Learning Objectives:

1. Identity how the “unconventional crisis” differs from events for which you’ve planned.

2. develop a team of leaders and a decision-making structure for dealing with an unconventional crisis.

Presenter(s): ed beakley, Senior research fellow for Project White Horse, Haines Security Solutions

Tuesday, April 1 • 11:30 AM – 12:30 PM

(Sm03) Collaborative Security: What’s in It for you?

no security organization is an island. Time and time again, experience shows that results are best achieved through collaboration, between public and private sectors, among agencies and across city departments. Threats can be identified and mitigated faster, investigations can be resolved quicker and money can be saved. So, what is collaborative security? Why is it a growing trend? and why should you care? In this session, representatives from the City of San diego and Harris County, Texas (encompassing security for the Houston Ship Channel), join the former top FBI Executive over criminal investigations, operational technology and crisis management to put the pieces together. They’ll share their experiences and examine the role of public/private partnerships in collaborative security; funding implications; how to create a collaborative security ecosystem by efficiently linking cameras, sensors and other security assets; how to address privacy concerns and other challenges; the impact of collaborative security on real-time situational awareness, response and post-event forensics; how to use collaborative security to extend existing security investments within a city, county or region; and other incentives.

Learning Objectives:

1. Explain the key concepts and forms of collaborative security.

2. Identify which forms of collaborative security apply to your organization.

Page 4: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

6 7

SIA EDUCATION@ISC WEST

3. Apply the concept and examples provided by the panelists to build a case for collaborative security in your organization, city, county or region.

Moderator: bob banerjee, Phd, Sr. director of Training and development, nICe Systems

Panelists: Christopher Swecker, attorney/fbI asst. director (retired) and Ceo, Chris Swecker enterprises

John Chaney, mobility architect, Harris County Information Technology Center

Tony Ruiz, III., c.o.s.s. (Certified Occupational Safety Specialist), Security & emergency management Coordinator, City of San diego Public Utilities department

Tuesday, April 1 • 1:30 – 2:30 PM

(Sm04) business Strategies for Success in the C-Suite

Join Microsoft’s Chief Security Officer to learn how to cultivate successful relationships with the C-Suite and gain status as a trusted advisor by thoughtfully developing strategies to manage critical risk disciplines, including Compliance, Hr, Legal and engineering. mike Howard shares microsoft global Security’s response to serve the expanding business needs of Microsoft in its ongoing transformation to a devices and services enterprise and the impacts on Security.

Learning Objectives:

1. build and measure effective C-Suite relationships.2. Use your understanding of business objectives to better

develop and deliver business-centric security services and solutions.

3. deliver strategies that improve resource structure to meet C-Suite needs.

Presenter(s): Mike Howard, Chief Security Officer, Microsoft

Tuesday, April 1 • 2:45 – 3:45 PM

(Sm05) driving business Success: Leadership at all Levels

“Best class of the day...useful information, kept me interested”

Leadership is not an exact science. In fact, there is no shortage of leadership-themed books, courses and philosophies. one thing remains constant: your organization must operate at peak levels of efficiency and effectiveness for your business to remain profitable. This kind of efficiency and effectiveness requires leadership at all levels. In this session, learn from a

Learning Labs

Tuesday, April 1 • 8:30 AM – 12:30 PM

(LL01) building Information modeling: Creating a Paradigm Shift in the building Industry

In this introductory workshop, participants learn how building Information modeling (bIm) is creating a paradigm shift in building design, construction and management. bIm generates a visual model of a building and manages data about it, from the design stage through the construction phase and during its working life. Typically bIm uses real-time, dynamic building modeling software working in 3D, 4D (workflow) and, increasingly, 5d (quantity surveying) to increase productivity and efficiency, save costs in the design and construction stages, achieve greater accuracy in estimation, and reduce running costs after construction. Through this workshop, security integrators, consultants, end-users and others will benefit from learning how bIm is helping achieve shortened design and construction phases, higher quality without rework, higher trade subcontractor productivity, safer construction, and more. Participants will gain hands-on experience using BIM software, and uncover the real-world advantages of using integrated project delivery concepts to achieve more successful and rewarding projects.

Learning Objectives:

1. Sharpen visualization of the bIm building design model structure.

2. enhance productivity due to easy retrieval of information.3. Increase coordination of construction documents

between stakeholders.4. enhance embedding and linking of vital information, such

as vendors for specific materials, location of details and quantities required for estimation and tendering.

5. effectuate the speed of project delivery.6. Recognize the potential benefit of reduced costs for your

organization.

Presenter(s): brent bauman, associate, Information & Communication Technology, Stantec

Tuesday, April 1 • 1:30 – 5:00 PM

(LL02) The essential basics of networking for Video Surveillance

In this interactive Learning Lab, participants learn to build and troubleshoot an IP network capable of transporting IP Video Surveillance securely and reliably, obtain hands-on experiences

panel of integrators how effective leadership at all levels of your organization will drive success for your company as a whole. Whether you are an owner, senior manager, project manager, sales rep, engineer or technician, you can be called to lead at any time. are you prepared? are your people prepared? among the highest-rated sessions in 2013, this session is back by popular demand. Join us for this fresh focus on leadership.

Learning Objectives:

1. Identify leadership opportunities in everyday operational situations.

2. adopt new leadership practices to foster more effective teamwork.

3. develop skills to conduct yourself as a leader in your organization.

Presenter(s): Paul boucherle, CPP, CSC, Principal, matterhorn Consulting, LLC

Tuesday, April 1 • 4:00 – 5:00 PM

(Sm06) forum for Creative Security Solutions

This session features a series of customer case studies where innovative and unconventional solutions were developed to solve uncommon problems. Starting with a statement of a unique customer situation that defied a conventional approach, a panel of industry experts and session attendees will be invited to offer their potential solutions. The final resolution will then be revealed along with the supporting rationale and what was needed from the manufacturer or integrator to make it happen. Cases will be drawn from across the industry.

Learning Objectives:

1. Develop creative solutions by employing “out of the box” thinking.

2. Identify ways manufacturers and integrators respond to unusual customer challenges.

3. Compile a list of creative solution ideas with potential application to difficult problems.

4. Explain what may be involved in truly meeting a customer need.

Moderator: Ray Coulombe, Principal, SecuritySpecifiers.com

Presenter(s): Jon d. Victorine, associate director/Systems analyst, University of massachusetts–Lowell

emil marone, Head of Technical Solutions, kratos Public Safety & Security

Rob Nix, Director of Technology & Integration, Security 101

dave Porter, general manager, alphaCorp Security

for building on network architectures, and determine how to scale these for both small and large deployments. additionally, participants gain an introduction to basic networking terms.

Security integrators, consultants, end-users and specifiers learn about deploying networks, how they affect the end-user experience, recognize how to ask the correct questions when dealing with the IT/networking team as it relates to deployment for surveillance installations, and gain confidence deploying a basic network capable of transporting IP video surveillance traffic.

Learning Objectives:

1. Define basic networking terms and review networking basics of a Local area network (Lan) and Wide area network (Wan).

2. Examine elements of Enterprise vs Small/Medium Business networking.

3. review networking architectures for video surveillance.4. Explain Quality of Service (QoS) and how it provides

guarantees on the ability of a network to deliver predictable results.

5. Inspect network setup and configuration before deployment of a video surveillance system.

6. review troubleshooting basics to determine what to look for and what to ask if problems arise.

Presenter(s): Lionel Hunt, Technical marketing engineer, Physical Security Business Unit, Cisco

Jason Lee, Systems Engineer | IoT Connected Safety & Security, Cisco

Workshops (Sales-Focused)

Tuesday, April 1 • 8:30 – 10:00 AM

(WS01) Is your Sales Psyche Pschying you out? optimize your ’Vitals’ for Sales Success

Create a strategic plan for your sales team that covers all aspects of the sales process. This session is specially designed for business owners, executives and sales staff who want create hard-hitting, real-time vital plans for the sales process—from prospecting and estimating through winning contracts. determine how to evaluate where your current process needs help, set improvement goals, and implement strategies for your sales team’s overall benefit. Use effective sales reporting, intelligence and best practices to maximize your team’s efforts; create a goal-based, time-driven plan for your top 3 priorities; and embark on a method for making your sales process truly achievable.

Page 5: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

8 9

SIA EDUCATION@ISC WEST

Learning Objectives:

1. Identify key elements of successful sales processes and rate your personal success in each area.

2. Prioritize the behaviors, attitudes or techniques on which you need to work to achieve goals.

3. establish a strategy for meeting professional goals and creating a 90-day plan for improving on personal priorities.

Presenter(s): Tracy Larson, President, WeSuite, LLC

Tuesday, April 1 • 10:30 AM – 12:00 PM

(WS02) Increasing Sales and Customer Satisfaction: Using Technicians as your Second Sales force

Expand your organization’s sales effectiveness and profitability by turning your technicians into sales assets, using them as a complement to your existing sales force or in place of it. Utilizing technicians as sales people has always existed, and most small businesses have people in that role wearing two hats—one for the service being performed, the other for sales. In this session, discover methods for creating the organizational support and communication channels to make the sales/technician beneficial and profitable. Establish ways to properly train, support and incentivize your technicians so that they become potent sales assets. Case study examples will illustrate how security installation companies have combined sales with engineering and installation to create a self-sufficient workforce, and increased the roI of available labor dollars, while increasing customer satisfaction.

Learning Objectives:

1. establish process to discover if training technicians to sell is right for your organization.

2. Create a basic support system to enable your technicians to sell.

3. develop an action plan to increase sales and customer satisfaction through efficient use of labor.

Presenter(s): John r. Wood, Phd, organizational behavior, CTo, Train a Tech

Tuesday, April 1 • 1:30 – 3:00 PM

(WS03) How To design, Price and Sell Service agreements

“Interesting session…my company has been thinking about implementing service agreements and I believe we now will.”

Tuesday, April 1 • 10:15 – 11:15 AM

(PSa02) dealing with the gC dilemma

It is not uncommon for a security project to be well-conceived, competently designed and properly specified. Manufacturers, specifiers and integrators of choice may well be on the same page, only to have the project fail in its goal of providing the level of security envisioned. Why? often, it’s because the owner has delegated oversight responsibility to a third party representative or general contractor (gC) who cares more about profit maximization and time schedules than the owner’s true security needs. In this session, participants hear actual examples of this disconnect and learn potential remedies and approaches for the “gC dilemma.”

Learning Objectives:

1. discuss the relationship between the consultant, integrator, manufacturer and general contractor in security project implementation.

2. Identify how the GC’s profit motivation could be a hindrance to the provisioning of adequate security systems.

3. Explain how an owner’s awareness and participation can lead to better security.

4. Identify possible approaches to facilitating a successful security project in a gC-managed project.

Moderator: John degeorge, bSee, CPP, Principal Consultant, Jdg Security management & Consulting, Inc.

Presenter(s): Jim Henry, Executive Vice President, Kratos Public Safety and Security Solutions

Chad Parris, CSC, President, Security risk management Consultants

Phil aronson, President and Ceo, aronson Security group

minu youngkin, marketing manager, allegion

Tuesday, April 1 • 11:30 AM – 12:30 PM

(PSa03) open for business: new opportunities in recurring revenue

Cloud and Internet-based products open a world of new possibilities for recurring monthly revenue for technology service providers, who can now think beyond meager margins on hardware and instead concentrate on substantive service fees. Imagine opening a whole new door to additional recurring revenue streams for your business. Think digital signage, multi-room audio, managed IT services and networking, retail surveillance/business intelligence analytics, energy management and much more.

Back by popular demand! This highly charged, financially rewarding and entertaining session on how to design, price and sell service agreements is for clients with security systems. Specifically, learn how to design the right service agreement to minimize your exposure and maximize profit, motivate your sales force to sell them to both new and existing clients, and package your contracts to minimize risk. Ideas discussed in this presentation are based on the actual experiences of one of the most profitable security firms in the United States. These real-world applications will generate a significant profit for all attendees.

Learning Objectives:

1. evaluate the need to sell service agreements.2. design the right service agreement to minimize your

exposure and maximize profit.3. Effectively price your services to maximize profit.

Presenter(s): alan kruglak, Senior Vice President, genesis Security Systems, LLC

Dealer, Installer, Integrator PSA-TEC @ ISC

Tuesday, April 1 • 8:30 – 10:00 AM

(PSa01) The Top 10 Lessons Learned Implementing IP-Centric Solutions

Implementing IP-centric solutions can involve multiple system types and opportunities for all kinds of custom options. This session focuses on the top 10 lessons learned by integrators and other solutions providers for implementing IP-centric solutions. Join us to educate yourself on the most common pitfalls in IP implementations, learn how to remedy mistakes and prevent your team from repeating the mistakes others have made before it’s too late.

Learning Objectives:

1. Identify and avoid the most common pitfalls in IP implementations.

2. get back on course after a mistake or determine how to “return to the highlighted route” you started on.

3. develop prevention strategies to help your team avoid common pitfalls when integrating solutions.

Presenter(s): Paul boucherle, CPP, CSC, Principal, matterhorn Consulting, LLC

How do these offerings differ from your current product mix in pricing strategy, and sales and support requirements? How do you gain the technical proficiency to adequately install and service these new products? What are acceptable creation costs for these new rmr accounts? do you need to modify your sales compensation plans? Is your existing monitoring center equipped to support these new services? These questions and more will be answered in this session as you learn from your peers how they are approaching this new world of rmr opportunity.

Learning Objectives:

1. Identify new ways to pursue rmr and grasp how to transform your business from a hardware-oriented, time and material billing entity to a company focused on high-end services that customers love and pay for.

2. Identify new potential business in adjacent contracting spaces and strategies in pricing and contractual agreements.

Moderator: deborah o’mara, director of Content development, recurring revenue network

Presenter(s):

brent franklin, President, Unlimited Technology Inc.

Wayne Smith, Vice President of Sales & Professional Services, Tech Systems, Inc.

eric yunag, Ceo, dakota Security Systems, Inc.

Tuesday, April 1 • 1:30 – 2:30 PM

(PSa04) Understanding the Core elements of PSIm

Physical Security Information management (PSIm) systems are becoming a fixture in command and control centers, enabling organizations to be more situationally aware, to manage incidents better and adapt for the future. This session introduces the core elements of PSIm and how they are being used in real organizations, and serves as the foundation for the PSIm 201 workshop session immediately following in which attendees put the lessons learned in PSIm 101 into practice.

Learning Objectives:

1. Identify the three PSIm core elements: Situational awareness, Situation management and Situation reconstruction.

2. Consider how PSIM-based migration strategies maximize existing assets and favor smaller multi-year budgets over a one-time intense capital expenditure.

3. evaluate how PSIm impacts training, compliance and consistency across multi-location facilities.

Page 6: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

10 11

SIA EDUCATION@ISC WEST

4. discuss the broader applications of PSIm, beyond physical security and encompassing operations.

5. discuss the future of PSIm and its relationship to big data.

Presenter(s): bob banerjee, Phd, Sr. director of Training and development, nICe Systems

Tuesday, April 1 • 2:45 – 3:45 PM

(PSa05) How to Identify and Cultivate PSIm opportunities

“Helped me in determining whether PSIM is a good next step for my organization. Dr. Bob is very engaging…he made a long session very entertaining!”

If you’re like most System Integrators, you probably have to work 30% harder these days just to maintain profit levels. Declining margins on commoditized products and expanding competition are encroaching on your bottom line. adding PSIm to your portfolio can be an effective strategy to put your profits on an upward trajectory. As a mid-range integrator, you may be under the impression that PSIm is too pricey or too complex. You may not even know how to identify PSIM opportunities or dialogue with prospects about it. In this workshop, PSIM expert Dr. Bob Banerjee dispels the myth that PSIm is only for large integrators and multi-million dollar projects and shows you why it’s relevant to your business. Join us to learn how to identify and cultivate PSIm opportunities. during this workshop, you will receive a workbook containing all of the above information that will be yours to take home.

Learning Objectives:

1. Increase your PSIm literacy to understand what PSIm is, articulate the different levels of PSIm, and identify the level appropriate for your customer base and mid-range business.

2. Identify the key criteria for identifying and qualifying PSIm prospects.

3. Identify which vertical markets are best to target and why.4. articulate real-world PSIm business cases and effectively

dialogue with your prospects about PSIm.5. Stave off competition by learning about the competitive

alternatives to PSIm and effective strategies for winning competitive deals.

6. build long-lasting customer relationships by using PSIm to create a 3-5 year trajectory for your customers’ security program.

Presenter(s): bob banerjee, Phd, Sr. director of Training and development, nICe Systems

and how to develop and hone specialized marketing and communications skills for a successful consulting engagement. Specific challenges and tips for dealing with services marketing or sales implementation problems will be shared. Those include the best ways to position your business and services, deal with competition, and target a specific industry.

IAPSC SESSION 3: The financial and administrative aspects of Security Consulting 10:15 – 11:00 AM

Learn the essential administrative and accounting aspects of the consultant’s practice and how to administer the practice as a business on a daily basis. This session addresses the financial aspects of starting and operating as an individual consulting entity, including business financial planning; setting up the legal corporate entity; documenting your specific consulting services; meeting insurance requirements; setting up your office, including its accounting, budgeting and human resource functions; performing the scope of work within budget; invoicing and collecting payment; and establishing performance metrics. additionally, participants learn how to set a reasonable bill rate and cost basis hourly rate, including your own and any subcontractor compensation, expenses and billable hours.

IAPSC SESSION 4: Proposing Security Consulting Services and Hiring a Security Consultant 11:00 AM – 12:00 PM

Identifying consulting opportunities, developing winning proposals and beating out the competition are the primary focus of this session. Additionally, participants explore the critical elements of hiring a security consultant to address the short- or long-term security needs of an organization based on whether limited or complex security requirements and expertise are necessary. Particular emphasis is placed on how to develop and land sole source vs. competitive opportunities; how and when to prepare competitive written proposals; types of bid packages; proposals and the nature of the responses one might encounter (rfP, rfQ, rfI & Sources Sought); how to cost estimate a job; the various types of contractual relationships; and how to fully and completely respond to a bid.

IAPSC SESSION 5: Executing and Completing the Consulting assignment 1:00 – 2:00 PM

In this session, participants learn how to successfully complete the consulting assignment and further the trust relationship, such that the client or end-user is sold on and re-uses the consultant’s value services repeatedly. The types of essential consulting skills (technical, interpersonal and consulting) are addressed in the four key phases of consulting: contracting, discovery, feedback and decision. The goals and objectives of the consultant in an engagement are taught in terms of identifying

IAPSC (International Association of Professional Security Consultants)

Tuesday, April 1 • 8:30 AM – 5:00 PM

IaPSC Successful Security Consulting Seminar

IAPSC SESSION 1: Successful Security Consulting: Introduction and overview 8:30 – 8:45 AM

Seminar Presenter(s): richard P. grassie, CPP, Principal Consultant, PrISm Security, Inc.

david aggleton, CPP, President & Principal Consultant, aggleton & associates, Inc.

alan W. Zajic, CPP, CSP, ICPS, aWZ Consulting

ken Wheatley, ma, CPP, Senior Vice President, Sony electronics, Inc.

alan brockbank, CPP, CSC, Principal Consultant, b-Secure Consulting, LLC

frank Pisciotta, CSC, President, business Protection Specialists, Inc.

The course introduction summarizes course offerings, introduces key faculty and explains how each element of the course applies to a variety of security consulting engagements. Participants will be asked to summarize their own course objectives and describe what they expect to learn and achieve. Lastly, the introduction will emphasize practical, hands-on information on the business aspects and execution of security consulting that can save you time, money and confusion when completing a security consulting assignment or starting a new practice.

IAPSC SESSION 2: The business of Security Consulting: From Consulting 101 to Becoming a Certified Security ConsultantSm 8:45 – 10:00 AM

In The Business of Security Consulting, participants learn the essential traits for success as a security consultant; how to build a practice; and how to add value to a clients’ operation through key consulting specialties, like Technical and management Consulting, forensics and IT Security Consulting. Learn how to develop and implement a realistic business plan that focuses on building a trust relationship with service recipients, the security consultant’s role in an organization, and implementing each of the five key consulting phases.

Special emphasis is put on the marketing aspects of building a successful security consulting practice, how to make your business “fit” the desired marketplace in which your expert services will be sold, how to use your professional network,

problems and solutions, and engaging in actions that result in people or organizations managing themselves or doing things differently. Special emphasis is placed on how to develop and build influence over an individual, group or organization when the consultant typically has no direct power or resources to make changes or implement programs internal to that organization.

Participants learn how to survey existing security programs or systems and conduct security audits in which operations are measured against specific documentation, such as standards, guidelines and regulations. Various phased aspects of the security assessment are explored, including how to conduct asset, threat, vulnerability, risk and requirements analyses. Participants are introduced to frequently-used automated assessment tools and how the results of these assessments should be included in the consulting assignment.

IAPSC SESSION 6: Preparing a responsive, High-Impact Consultant’s report 2:00 – 3:00 PM

In this practical session, participants learn about and receive examples of the types of written reports and report formats typically prepared and submitted by security consultants: Security assessment report, design Concept report, System design and assessment Phase report, architectural Project Phase Reports, Design Specifications and Drawings, and Forensic Reports. Specific content, outlines and examples of each are discussed and presented.

IAPSC SESSION 7: Extended Consulting Services: designing and Implementing Integrated management and Technical Solutions 3:15 – 4:15 PM

Technical security consultants assist clients in determining how to accurately identify technical solutions and integrate them into overall technical security systems culminating in a comprehensive, integrated security program for cost effectiveness and risk reduction. In this session, participants delve into the security system design and implementation process by first identifying the four major phases of design: Schematic design, Preliminary design, detailed design, and Construction Documents. Experienced designers guide participants through the technical pitfalls of design and construction, emphasizing the design process “safety nets” that are in place as the process moves from one gate to the next. Participants learn how to solicit owner and other stakeholder input; determine design requirements and constraints; avoid costly change orders; enhance their technical reputation; and deliver value to the client by implementing a proven process by acting as a change agent, security expert, systems engineer or architect, all in one technical consulting assignment.

Page 7: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

12 13

SIA EDUCATION@ISC WEST

IAPSC SESSION 8: offering and delivering Convergence Consulting Services: a Holistic Security approach to Logical and Physical Security Integration 4:15 – 4:45 PM

This session explores Convergence Consulting, a holistic view of delivering physical and logical security consulting services, and how it is fast becoming the preferred approach for more progressive organizations with a Chief Security Officer (CSO) who handles both physical and logical requirements. Learn how the emergence of networks and technology integration has resulted in quantum shifts in the security industry and how security services are delivered within a particular organization.

The session covers how security consulting is now split between physical and logical security, and how the issue of organizational convergence of security (physical & logical) is more an organizational than a technical phenomenon. Learn how certain types of organizations can benefit from convergence consulting services and how the key aspects of risk management and control are addressed in the paradigm. Participants receive a model for Convergence Consulting that outlines the benefits of assuming a holistic view of an organization’s risks and security elements under one set of requirements.

IAPSC SESSION 9: Summary & Course Wrap-up 4:45 – 5:00 PM

Wednesday, april 2

Dealer, Installer, Integrator - Business Development

Wednesday, April 2 • 7:30 – 8:30 AM

(db01) Security Industry Lead generation and Telemarketing Compliance Challenges and risks—now and in the future

recently, the federal Communications Commission issued a final rule under the Telephone Consumer Protection act. This new regulation mandates the highest level of Prior Express Written Consent in history. This consent may be required for any sales/service calls going to a consumer’s mobile telephone, including current customers. Security providers must ensure that the data they purchase from lead generators include a consumer’s consent to be called by their specific company, not just a general consent to be called by any security provider. during this session, attendees will focus on the new rules and how they impact lead generators as well as the security

Wednesday, April 2 • 11:15 AM – 12:15 PM

(db03) Surviving the Cyber Tsunami: Cybersecurity Worries and opportunities for Security Contractors

This presentation explores basic and advanced cybersecurity issues for security vendors. Session attendees gain knowledge on the scope of a threat, how it could affect security vendors and end users and public/private partnership opportunities. The panel team will review developing issues such as the incorporation of cybersecurity requirements in federal procurements from acquisition management through contract administration. additional points addressed include why such requirements are being implemented, what measures public sector resources companies can use to increase their cybersecurity preparedness when a breach or attack occurs, and possible liability concerns should a successful attack happen. attendees will leave with answers to why they have to consider cybersecurity in all of their transactions (public and private), how they can strengthen their cybersecurity and its consequences from both a legal and a market competitiveness perspective.

Learning Objectives:

1. recognize what constitutes material cyber threats, which defensive measures are effective and how cyberthreats may impact future procurement opportunities.

2. adopt methods to identify public/private partnership opportunities and how to take advantage of them to better enable cyber defenses.

3. Discern the legal and financial consequences of failing to take adequate cybersecurity measures.

Presenter(s): brian finch, adjunct Professor, george Washington University Law School and Partner, dickstein Shapiro, LLP

kirstjen nielsen, Senior fellow, george Washington University Homeland Security Policy Institute

Wednesday, April 2 • 12:30 – 1:30 PM

(db04) Cloud-based Security Platforms: Critical Questions from dealers

Explore the challenges security dealers face in integrating cloud-based security platforms. Learn how manufacturers and dealers can create interoperability in the cloud, and review the business opportunities that cloud-based access, intrusion and video surveillance systems provide dealers. In this session, experts address the most pressing questions about cloud-based security platforms and guide participants in how to move the relationship with end-users from transactional ones to long-

industry directly. Hear details on the consent disclosure requirements as well as how to collect consent under the e-Sign act rules for obtaining electronic “written” consent. Identify and discriminate examples of consent collection through the web, inbound/outbound calls, email, SmS, regular mail and paper contracts. Participants will receive a structured guide on how the new rules affect security companies and what others in industry are doing to comply with the rules.

Learning Objectives:

1. acquire knowledge regarding customer marketing regulations and their impact on current and future operations based on recent fCC guidelines.

2. develop strategies for compliance based on case study information on what other industries are doing that applies to the security industry.

Presenter(s): ken Sponsler, Vice President and general manager, CompliancePoint, Inc.

Wednesday, April 2 • 10:00 – 11:00 AM

(db02) Structural Challenges in Converting Product Companies and Product offerings into rmr

The concept of receiving predictable monthly payments from customers (rmr) is desirable, but challenging to achieve. The successful conversion (or even partial conversion) of an integration company into an rmr-based service organization requires a cultural overhaul from executive management and the financial structure all the way down to the salesforce, installers and office management. This session outlines the challenges at each level of the organization and techniques and strategies for overcoming them. The panel team has seen many companies both succeed and fail in rmr initiatives, and will present a comprehensive set of case studies that will feature the framework for obtaining rmr for your organization.

Learning Objectives:

1. Develop a financial model conducive to generating high-margin recurring monthly revenue for your organization.

2. Implement a sales training program to focus the sales team on selling services to customers.

3. apply effective cultural change techniques for rmr within your organization.

Presenter(s): brian Lohse, Vice President, Secure-i, Inc.

bob ryan, Senior Vice President of Sales and marketing, aSg Security

term relationships showing value of service. Learn why small and medium-sized businesses are often seen as the ideal fit for cloud services and how enterprise customers with on-premise servers and systems can benefit from cloud-based offerings.

Learning Objectives:

1. Assess the opportunities and benefits of cloud-based security platforms.

2. Identify the differences in building an rmr business using a public vs private cloud.

3. design a more service-oriented business model, by completing more installations in less time and offering more managed services with cloud solutions.

4. determine how hybrid cloud and server-based solutions can meet larger enterprise customers’ needs.

5. Identify and address greater market opportunity with easy-to-install, cloud-based security systems within new segments or with existing customers.

Moderator: John Szczygiel, Executive Vice President & COO, brivo Systems, LLC

Panelists: Christian morin, director of Stratocast Product group, genetec

bill bozeman, CPP, President & Ceo, PSa Security network

Tim Plankenhorn, Service operations manager, rfI

Tom Catagnus, President, Integrated Security & Communications

Dealer, Installer, Integrator - Technology

Wednesday, April 2 • 7:30 – 8:30 AM

(dT01) Tapping into new markets with Cloud Technology

Today, the biggest untapped market for security dealers, installers and integrators is actually small—small business, that is. In aggregate, security installations with fewer than 16 cameras actually represent the largest segment of the security market. In addition, these installations are still predominately analog, up to 95 percent by some estimates.

Cloud-based video surveillance is allowing the security industry to service smaller businesses in ways that were not possible before. In this session, two security and IT experts will demonstrate how dealers, installers and integrators can use cloud technology to sidestep previous access and bandwidth limitations to deliver affordable, scalable services to businesses with smaller security needs and budgets.

Page 8: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

14 15

SIA EDUCATION@ISC WEST

Learning Objectives:

1. effectively sell cloud-based security solutions and increase revenues through services, such as mobile access and video storage.

2. Fix issues, such as bandwidth and security, which have traditionally been seen as roadblocks to implementation.

3. Automatically configure IP cameras at customer sites to connect to the cloud.

Presenter(s): martin renkis, Ceo, Smartvue Corporation

Wednesday, April 2 • 10:00 – 11:00 AM

(dT02) How IP audio Surveillance enhances Security management Systems

The use of audio surveillance over an IP network can improve a system’s ability to detect and interpret events. In fact, audio can be used in addition to video surveillance to extend security outside the range of the camera and provide authorities with additional intelligence on an incident.

Despite these benefits, audio remains a chronically under-utilized technology. This panel will discuss the key attributes of audio monitoring, providing real world examples of successful audio implementation. The panel will also teach participants how to leverage an IP audio backbone for use in announcements, intercom and emergency response/surveillance.

Learning Objectives:

1. Identify the benefits of audio monitoring.2. design an IP audio system and backbone for performing

paging, intercom and emergency response/surveillance applications.

3. evaluate and avoid the common pitfalls and single point of failure scenarios for any network.

4. Identify best practices and training procedures to implement IP audio technology for their building or customer.

Presenter(s): brad ehlert, Vice President of Product development, audio enhancement

Andrew Stadheim, PE, Vice President, Barix Technology

Wednesday, April 2 • 11:15 AM – 12:15 PM

(DT03) Retrofit and Migration Strategies for Video and access Control Systems

The acceleration of technical innovation, increasing stakeholder expectations and changing threat vectors are all feeding physical

3. evaluate the core components of a CoTS platform, and assess how and why a CoTS platform can dramatically reduce implementation time and cost of ownership.

Moderator: ron Worman, founder and managing Partner, The Sage group

Presenter(s): dr. Indu b. Singh, Vice President, Los alamos Technical associates, Inc.

nigel Waterton, Sr. Vice President of Corporate Strategy and development, aronson Security group

Jeffrey A. Slotnick, CPP, PSP, Chief Security Officer, OR3M

School Security & Safety Series

Wednesday, April 2 • 7:30 – 8:30 AM

(SC01) School Security: elevating Safety through event Prevention

In recent years, a rash of deadly violence in our nations’ schools has thrust educational security into the daily conversation, both inside and outside the professional security industry. opinions on the subject range from a hands-off approach to tactical preparation and response. Is there a balance to be struck? How can we work to generate pragmatic and meaningful standards and best practices? for new schools that are being designed with security in mind, what is the latest thinking on how to create a secure learning environment without impacting the educational mission? This session focuses on preventing a malicious event from ever happening—not responding to one that already has.

Learning Objectives:

1. Identify school security stakeholders and the importance of their role in ensuring that the educational mission is not compromised.

2. outline various constraints related to educational security, including tight budgets, limited manpower, and opinionated stakeholders.

3. discuss what is being done on national and local levels to develop standards documentation and guidelines for school security.

4. discuss and debate architectural design parameters for new schools—i.e., bullet/force resistant materials and construction, visitor processing, etc.

5. discuss the role of technology in securing schools, particularly given the most common levels of dedicated school security staffing and budget.

security frenzy. but making physical security changes requires tough behind-the-scenes decisions. Is it better to adapt what you have or rip and replace everything? This session examines the factors that influence these important decisions, highlighting actual case study examples to illustrate. While this session focuses primarily on video and access control as examples, you’ll be able to apply what you take away from this session to other aspects of physical security.

Learning Objectives:

1. discuss the individual system-level technological migration options for video and access control systems.

2. evaluate how PSIm systems can be used to enable multiple brands of physical security system to coexist while migrating.

3. Consider the business issues and technical factors that drove one company to the decision to progressively migrate.

4. Consider the business issues and technical factors that drove another company to the decision to rip and replace.

Moderator: rob Hile, director, Strategic accounts, SureView Systems

Presenter(s): Howard belfor, CPP, President, belfor and associates, LLC

Thomas W. komola, mPa, manager, Security and emergency Management Office, MIT

Wednesday, April 2 • 12:30 – 1:30 PM

(dT04) How to Plan, design and Implement an affordable Common operating Platform Using Commerical off-the-Shelf Software (CoTS)

There are new choices in developing a common operating picture and platform for such things as emergency management, guard force management, Compliance/document Management, Executive Protection, Employee Travel, Security operations Centers and Command and Control. In this session, distinguished panelists bring industry proof points, lessons learned and strategic insights into how to leverage information in new and powerful ways using software most organizations already own. Learn the key characteristics of a CoTS-based implementation and how it will reduce the time, money and resources needed to achieve a common operating picture.

Learning Objectives:

1. Identify the cost of noT managing information and intelligence.

2. determine the cost of proprietary platforms and why they exist in the security market.

Moderator: brian Coulombe, Pe, Principal, dVS Security Consulting & engineering

Presenter(s): mark Pompano, director of Security, newtown (CT) Public Schools

Phil Santore, Senior Principal, dVS Security Consulting & engineering

Julia mcfadden, associate Principal, Svigals + Partners

John L. moss, Ceo, S2 Security,

Wednesday, April 2 • 10:00 – 11:00 AM

(SC02) What We need Is a Plan: School Security gets Smarter

from program management to application and deployment, schools, corporations and government agencies are asking the same question: do we have enough security? In this session, learn the top five steps for developing a sound, scalable security master plan—beginning with threat assessment—and how to link your plan to the most useful systems available. discover how to manage and use the safety and security technology available and make them work for you, not the other way around. Systems integrators gain perspectives that lead to successful end-user partnerships. While this session focuses on school security, it will include a look at trending technologies in three markets: industrial security, cyber security and consumer electronics/commercial technologies.

Learning Objectives:

1. develop a scalable security master plan.2. Identify needed human and technological resources and

training.3. assess available technologies and how to link them to

your plan.

Moderator: James marcella, director of Technical Services, Axis Communications

Presenter(s): raymond osborne, CHPa, director of Security, Parking & Patient Transportation, University of California, San diego

Chris Russo, Founder and Executive Vice-President, ELERTS

Wednesday, April 2 •11:15 AM – 12:15 PM

(SC03) beyond School Shootings: everyday Violence in k-12 Schools and methods for Prevention

When most people think of k-12 school violence they think of school shootings, but administrators and children face a host of everyday violent incidents that can lead to catastrophic

Page 9: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

16 17

SIA EDUCATION@ISC WEST

events if unchecked. This session provides attendees with the latest information about everyday violence and the bullying our children and teachers face in education institutions, and discuss the consequences, including school shootings, youth suicide and teacher attrition. Panelists will detail key measures that go beyond lockdowns and alarms to enterprise mobile duress systems (i.e., people protection systems) and other effective methods and technologies that can be implemented to increase our children’s safety in school. The discussion will provide dealers, installers and integrators a comprehensive overview of school violence, allowing them to better serve k-12 schools. Perspectives will be offered from a variety of perspectives including a best-selling author of books about school violence and bullying; an award-winning school security director; and a security expert. The executive editor of a national campus security magazine will serve as moderator.

Learning Objectives:

1. analyze the latest information about everyday school violence.

2. Examine the consequences of everyday school violence on students and teachers.

3. Compare and evaluate methodologies for keeping k-12 school children safe from violence from a variety of real-world perspectives.

Moderator: Robin Hattersley Gray, Executive Editor, Campus Safety magazine

Panelist(s): barbara Coloroso, Consultant/author, kids are worth it! inc.

guy grace, director of Security and emergency Planning, Littleton Public Schools (Co)

John Carson, President, douglas County Schools board of education, (Co)

Wednesday, April 2 • 12:30 – 1:30 PM

(SC04) a University’s Case Study approach to the Integration of Security Services, Systems and devices

many colleges and universities maintain a hodgepodge of security systems and services—resulting in wasted financial resources, duplication of services, and turf wars. Hear how brigham young University, with a student population of 33,000, designed and implemented the integration of law enforcement services, security guard services, a 911 communications center, an electronic intrusion and card access system, an IP video management system, an emergency telephone system, a mass notification system, a license plate recognition surveillance and parking enforcement system, and a guard tour system. given current economic and campus violence trends, colleges

Wednesday, April 2 • 10:00 – 11:00 AM

(CS02) Central Station automation: from Technology to Sales

Central Station automation was born out of necessity back in the late 1970s and early 1980s because monitoring intrusion and fire alarms required that too much be done manually. The days of central offices full of employees watching ticker tape machines are long gone. Today, Central Station automation platforms are quickly becoming platforms used to connect everything to everything; the world of connected things is being orchestrated by these robust and flexible systems.

This moderated panel discussion opens your eyes to all the things these platforms are monitoring, the convergence of voice and data, and their ability to quickly scale and adapt to ever-changing landscapes. as the world goes mobile, automation systems are working on both sending information to mobile devices and monitoring different types of assets in the field, including “the connected car” of the present and future. This session presents anyone involved in the security business new rmr models and other opportunities to grow.

Learning Objectives

1. Identify what can be monitored today—everything from network infrastructure to social media threat levels.

2. Identify how automation systems are integrating with other systems from aSaP to PSaP to Salesforce and making sense of the chaos to help you react effectively.

3. Consider the connection between network security and automation platforms.

4. Learn what’s coming down the pipe and prepare both in terms of technology and sales.

Moderator: morgan Hertel, Vice President of operations, rapid response monitoring

Presenter(s): Hank goldberg, Vice President, Secure global Solutions, LLC

rod Coles, President & Ceo, bold Technologies

Clifford dice, President & Ceo, dICe Corporation

Wednesday, April 2 • 11:15 AM – 12:15 PM

(CS03) The Industry Trends Behind Verified Video Surveillance

When video is able to verify an issue, research shows that first responders reply faster when an alarm has been confirmed. Video also allows first responders to arrive at the scene better prepared and more able to identify where the issue is

and universities can no longer afford to spend money in a helter-skelter fashion and compromise the safety of a campus community. review how the partnership between systems integrator and end-user can save lives and money.

Learning Objectives:

1. Integrate cutting-edge security systems in a non-obtrusive manner for a large campus environment.

2. form a security shareholder working team that motivates multiple departments and entities to fund and build comprehensive security systems.

3. determine cost-effective solutions for protecting a large campus community.

Moderator: Steve goodman, Police Communications & Security Systems manager, brigham young University

Panelist(s): Hans douma, director PerSS, brigham young University

ron keller, electrical assistant Supervisor, brigham young University electrical Systems Shop

david barrett, Systems engineer, brigham young University Office of Information Technology

Central Station / Monitoring

Wednesday, April 2 • 7:30 – 8:30 AM

(CS01) Is your Company a High-Value enterprise?

Whether your goal is to sell your company and make a complete exit, obtain much-needed capital, or secure a trusted and experienced business partner to help you focus on growing your business, you’ll want to get the most value for your company and your accounts. This session will show you how to establish your business as a high-value enterprise—the kind that industry-leading acquisition partners are looking for—and to realize the best return on the equity in your company.

Learning Objectives:

1. Identify the steps to establishing your business as a high-value operation.

2. determine the process to prepare your company and accounts for sale.

3. Influence factors of the business on a day-to-day basis in order to attract the best acquisition partners.

Presenter(s): amy kothari, President & Ceo, alarm Capital alliance

raymond Lynn, owner, raymond Lynn & associates, LLC

Marc Katz, Member, Law Offices of Marc P. Katz, LLC

happening, which can help save time, resources and ultimately lives. Video alarm systems are an integral part of the security industry because they prevent response to a high percentage of false alarms. This technology is also becoming increasingly important as many emergency departments have limited resources and must prioritize the calls they receive before responding.

As a leading global third party testing and certification company, Intertek realizes that video surveillance is quickly becoming the future. as a result, Intertek has aligned with the Partnership for Priority Video alarm response (PPVar), insurers and law enforcement to educate people about the value of video to verify alarm activity during the dispatch process. during this presentation, Intertek’s global director of life safety and security, Tom Connaughton, will discuss emerging technologies in the verified video surveillance industry and new industry trends behind the equipment.

Learning Objectives:

1. describe emerging technologies in the video surveillance equipment industry.

2. Explain the benefits provided manufacturers and security industry professionals.

3. Identify new industry trends behind verified video surveillance.

Presenter(s): Tom Connaughton, global director of Life Safety and Security Services and middle east Liaison for electrical/Commercial Services, Intertek

Wednesday, April 2 • 12:30 – 1:30 PM

(CS04) The Changing fire alarm Communication Landscape

fire alarm communication technologies are undergoing great changes. What does the code landscape look like in regards to these technologies (IP, gSm, radio, etc)? What changes are coming to the codes in regards to these technologies? How can you use these technologies when your jurisdiction is governed by an outdated code book? This session answers these questions and offers details on how these technologies work. Understanding how the technologies work and the codes that surround them allows installers, integrators and end-users alike to make better informed decisions and enhance their understanding of their systems.

Learning Objectives:

1. discuss the relevant codes and the potential changes to them related to fire alarm central station communication.

Page 10: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

18 19

SIA EDUCATION@ISC WEST

Wednesday, April 2 • 12:30 – 1:30 PM (IT04) managed or Hosted Services: Which one’s right for you?

addressing questions of ownership, equipment, implementation, upgrades and more, this session explores the central question of “what is a managed service and how is it different from hosted?” Do you know which is right for you or will a mix offer you the greatest advantage? Let experts guide you in considering your options and exploring the various factors to consider in your decisionmaking, including costs, in-house staff and expertise, reliability and risk.

Learning Objectives

1. enumerate the distinctions between managed and hosted services.

2. Identify the requirements for each in terms of staffing, expertise and other factors.

3. assess your readiness for either managed services, hosted services or both.

Moderator: Sharon Shaw, Client development manager, Tech Systems, Inc.

Speaker(s): Chris brown, director of Central Station accounts, SureView Systems

guido diPilla, business development manager, S2 Security

Wayne Smith, Vice President of Client development, Tech Systems, Inc.

End User - Public Safety

Wednesday, April 2 • 7:30 – 8:30 AM

(Pb01) The Winning Prescription for a Collaborative City-Wide Public Safety Surveillance System

“Excellent session…presenters were knowledgeable and discussed real-life situations”

City-Wide IP Surveillance Systems can be a force multiplier providing workflow improvements while improving citizen quality of life. Properly architected and deployed it will have virtually unlimited scalability, while garnering acceptance by citizens and business alike. establishing the foundation requires a collaborative effort involving agency needs, business input, citizen expectations and technological considerations. This session delves into the attributes of both successful and unsuccessful City-Wide IP Surveillance Systems. In the process, participants develop a fundamental knowledge base for the

2. assess the technologies and related codes, including gSm, radio and IP.

3. Compare the advantages and disadvantages of the different communication technologies.

4. effectuate better decisions about your communication needs.

Presenter(s): amy Liedman, national Training manager, Potter electric Signal

End User - IT Related Issues

Wednesday, April 2 • 7:30 – 8:30 AM

(IT01) The byod of Tomorrow: Security Challenges in enterprise mobility management

as we move into the byod of tomorrow, we can already see that users are growing increasingly frustrated with systems that do not operate on mobile. The more apps we have, the greater our dependency on mobile (and in turn less dependency on the PC). Thus, all new IT projects will have to include mobile, and if they don’t they will most probably be removed and replaced by something that will. Since a significant portion of employees store sensitive company data on their mobile devices, some of the largest worries are lost or stolen devices, employee misuse of devices and mobile malware, all affecting the preservation and safekeeping of this data. This paints a scary picture, but the growth of byod does not have to be a bad thing. It does entail more operating systems and devices that are accessing secure company networks, but instead of avoiding byod, a strategy and solution are possible. This session covers the must-haves of a mobile device management (mdm) solution, including real-time chat with the end-user, remote viewing the device of the user, lockdown mode and antivirus protection.

Learning Objectives:

1. Identify the primary security concerns related to byod.2. discuss the core motivators around employee acceptance

and allowing users to access core data on a personal device

3. Identify the various elements of a mobile device management solution, including IT support interface, remote control and malware protection.

Presenter(s): Cesar Picasso, MBA, Executive Director, marketing & Strategy, SoTI, Inc.

Moderator: rob Hile, director of Strategic accounts, SureView Systems, Inc.

Presenter(s): Jeff Hearne, Security director, dell, Inc.

bhavesh Patel, Senior director, Security Services and Technology, Sanofi/Genzyme

brian Tuskan, Senior director, Technology, microsoft Corporation

Wednesday, April 2 • 11:15 AM – 12:15 PM

(IT03) Practical Uses for Cloud applications: How to Leverage the Cloud for your organization

Cloud applications have been around for years and while solutions for end-users have seen success in other industries, physical access cloud-based security systems are just starting to gain attention. factors like the availability of faster and more affordable internet connectivity, the expansion of global state-of-the-art public datacenters, and the growing demand for mobile connectivity are contributing to wider interest for end-users.

In this session, participants learn what the cloud means to the security industry and explore how cloud offerings are lowering the barrier of purchasing IP systems by reducing upfront costs and complexities for end-users. An expert panel will define cloud types, detail the advantages of cloud adoption, cite specific use cases, and describe the differences between cloud-based and server-based security installations. This must-attend session is designed for anyone interested in understanding and adopting a comprehensive cloud strategy.

Learning Objectives:

1. analyze various cloud technology acronyms into a realistic understanding of what the cloud is in context of physical access.

2. Consider and discuss various cloud approaches to physical access and their proposed value to your organization.

3. determine how to use best practices in assessing vendor offerings for security, and how to mitigate risk in considering deployment of technology in physical access.

Moderator: John Szczygiel, Executive Vice President and Coo, brivo Systems, LLCPanelists: Terry gold, founder, Identity and Security & Privacy, idanalyst, LLCLarry russell, Vice President for Corporate global Security, Salesforce.comdeon Chatterton, Sr. manager, Integrated risk Technology, Cisco Systemsdoug Pelton, Vice President, Wells fargo

Wednesday, April 2 • 10:00 – 11:00 AM

(IT02) advanced Situational awareness: Concepts, Technologies and best Practices

Everywhere you look—office buildings, college campuses, airports, seaports and even cities—you find some type of situational awareness program that has been deployed. In most cases, you see completed basic integration of video surveillance and access control systems. In more advanced programs, security leaders have extended integration to other sub-systems, such as perimeter detection, alarm systems, and license plate and facial recognition platforms.

This is fantastic news when considering basic situational awareness requirements but, in most cases, this still leaves large gaps in providing comprehensive situational awareness. When corporate assets are priceless or loss due to interruption of the supply chain or the normal flow of business can add up to millions of dollars, maintaining the highest level of security awareness is critical.

This session steps outside the traditional PSIm discussion and focuses on topics like asset tracking, incident management and post-incident reporting. during this interactive session, participants learn about comprehensive facility management, automated response tactics, data visualization, enterprise risk management, executive and supply chain tracking and protection, resiliency and full disaster recovery. These functions—all key parts of a complete security program used in conjunction with situational awareness software—increase operational efficiency, enhance business resiliency and ultimately deliver the highest level of risk mitigation for enterprise-caliber businesses and critical infrastructure customers.

Learning Objectives:

1. Discuss the benefits of expanding your situational awareness program outside of the traditional applications of video surveillance and access control.

2. Explore some of the new, yet proven, technologies that can enhance your organization’s level of situational awareness.

3. Outline the challenges associated with expanding the role of security throughout your organization and communicate your value to the C-suite.

4. Learn ways to highlight the return on investment and business case justifications for expanding your security program to include new areas of business and responsibility.

5. Identify current best practices and future trends that will help you position your organization for success and gain higher levels of situational awareness.

Page 11: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

20 21

SIA EDUCATION@ISC WEST

successful deployment of a shared resource, City-Wide IP Surveillance System that will impact city government, business and citizens.

Learning Objectives:

1. Outline the benefits of a collaborative city-wide IP surveillance system for your city’s agencies, local businesses and citizens.

2. Develop a process specific to your organization to define the operational and technical requirements for a city-wide IP surveillance system.

3. Identify the elements and steps required to design, deploy and sustain a city-wide IP surveillance system.

Presenter(s): ray Leblond, IP Surveillance Practice manager, Leverage Information Systems

Cmdr. Jonathan H. Lewin, managing deputy director, Public Safety Information Technology, Chicago Police/oemC

Steve Wolff, detective, Technical Investigative Support, San bernardino Sheriff ’s department

Timothy fisk, aSaP deputy, Century Station, Los angeles County Sheriff ’s Office

Wednesday, April 2 • 10:00 – 11:00 AM

(Pb02) CSI Live in action: Cracking the Code to forensic Video

“This session could be a full-day program and be sold out. Very well presented!”

TV crime shows and the nightly news set unrealistic expectations for forensic evidence by broadcasting grainy images. In reality, video surveillance cameras should be the ultimate objective observers, and advancements in technology are moving ever closer to viewing an ideal crime scene. Time wasted searching video is a thing of the past. Today’s technologies can provide clear pictures even in crime areas with difficult lighting through color-at-night video and license plate capture. Understand how these systems work and how they enhance investigative techniques.

Learning Objectives:

1. distinguish the capabilities and role of video surveillance for forensic use.

2. Explain the requirements surrounding the usability of surveillance video.

3. Leverage the benefits of IP video and their surveillance system to provide the right coverage for forensic video.

to prepare a response plan including training staff, responding to law enforcement and ultimately managing the damages.

Learning Objectives:

1. Identify the profile and warning signs of an active shooter.2. review prevention strategies for an active shooter

situation and a potential training program for employees.3. discuss the consequences of an active shooter situation

and post-incident response.

Presenter(s): marilyn Hollier, CHPa, CPP, director of Hospitals and Health Centers Security Services, University of michigan divison of Public Safety and Security

david Larose, CHPa, CPP, director Safety/Security & em management, Lakeland regional medical Center

Thursday, april 3

Access & ID Management

Thursday, April 3 • 7:30 – 8:30 AM

(aC01) biometric Security: no Longer Just for Hollywood

Securing facilities using biometric applications is not a new idea, but the types of biometrics being used for physical and logical access have changed dramatically over the past 10 years. What is the best biometric to use for high security areas within a university security structure—iris, hand geometry, finger vein, palm vein, fingerprint, or facial recognition? Learn how universities employ biometric signatures as a definitive form of identification. In this session, biometric experts guide you in determining when and where campuses are integrating biometrics into their current systems to enhance security.

Learning Objectives:

1. Outline the differences and benefits of biometric technologies and signatures.

2. enhance security using biometrics for unique applications.3. Integrate biometric technology with an existing security

system.

Moderator: david f. Stallsmith, director of Product management, ColorId

Presenter(s): James Hammond, associate Vice President for Information Technology, Winthrop University

antony afonso, CISSP, Senior Security engineer, datapipe managed IT Services

Presenter(s): blaine davison, President, Law enforcement Video association

James marcella, director of Technical Services, Axis Communications

Wednesday, April 2 • 11:15 AM – 12:15 PM

(Pb03) advances in mobile and Wearable Sensor Technology Redefine Aging in Place

Current technology used by many seniors to reach help when they fall and cannot reach a telephone is severely limited in range of use. To contact help using that type of alert button, seniors have to be inside their homes. advances in sensor and mobile gPS technology are creating new solutions to keep seniors safer and more independent. mobile emergency alert buttons and bandage-like sensors can detect falls, heart attacks, strokes and other emergencies. These technologies also automatically call caregivers, family, call centers or emergency personnel for help. monitoring companies can offer these technologies as add-on services for families and the elderly that provide cutting-edge solutions for safety and peace of mind.

Learning Objectives:

1. Determine how mobile technology can extend the safety net beyond the home and promote independence while offering improved safety.

2. distinguish how wearable sensors can identify end-user wellness and automatically alert response teams if there are falls or other adverse events.

3. recognize the advances offered in the way of increased market appeal and application.

Presenter(s): Chris Holbert, Ceo, SecuraTrac

Wednesday, April 2 • 12:30 – 1:30 PM

(Pb04) Prevention Tips and response to an active Shooter in a Hospital Setting

active shooter catastrophes continue to make headlines across the country. The sad reality is, these situations are happening in retail establishments, schools, movie theaters, malls, etc. If this violence erupts in a healthcare facility, the consequences can be unimaginable.

This session, hosted by the International association of Healthcare Security & Safety (IaHSS) will walk through multifaceted approaches to minimizing workplace violence and stopping the shooter before he/she gets through the door. In the event that prevention isn’t successful, the audience will learn how

Thursday, April 3 • 8:45 – 9:45 AM(AC02) Usability: A Streamlined Experience

Many users have experienced the pain of being locked into proprietary systems. now, more than ever, end-users seek technology platforms built on open standards to ensure flexibility, scalability and interoperability. Users can no longer be tied to security platforms, and product vendors are developing solutions that can easily integrate with other systems, while maintaining the original system’s integrity. For example, customers who plan to migrate to newer badge technologies, such as smart cards, have a migration path through their access control platform’s integration with multi-technology card readers. Join session presenters to determine how you might realize the benefits of integrated, open platforms to increase system usability.

Learning Objectives:

1. Identify the issues involved with proprietary technology platforms from a customer and installation perspective.

2. Assess the benefits of integrated, open platforms to increase system usability.

3. discuss how manufacturers work to make technologies interoperable and how the ability to communicate between systems enhances the user experience.

Presenter(s): Jeremy krinitt, Senior director of Product Management, Matrix Systems.

Frank Gasztonyi, Chief Technology Officer, Mercury Security

Thursday, April 3 • 10:00 – 11:00 AM

(aC03) The Power of mobile: Leveraging Smartphones for new Levels of authentication and access Control

as the corporate identity badge moves onto mobile devices, their usage will not be a straight simulation of the photo Id badge. already, we know that the basic architecture of physical access control will change, with mobile devices becoming the rule-engine decision machines and the ‘Id badges’ being on the door. This paradigm reversal—duality—will change the way the access control industry offers solutions. gone will be the capital-intensive installation of readers on a wall, expensive back-end servers and physical cabling. Instead, organizations can simply have electronic locks that recognize an encrypted ‘open’ command from their employees’ mobile devices, operating under the organization’s access rules. Among the many benefits this provides, organizations will be able to start securing doors that were previously cost-prohibitive to secure.

Page 12: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

22 23

SIA EDUCATION@ISC WEST

In addition, adding gesture to a mobile device enhances the user experience, provides genuine user privacy and acts as another authentication factor to the existing access control rule set. This gesture-based access control will enable new forms and additional factors of authentication for increased security of a user’s identity in a world where security threats continue to grow and privacy assurances are increasingly critical.

Learning Objectives:

1. discuss how mobile devices, nfC/bluetooth, and a powerful computing platform can combine to create an innovative access control solution.

2. enable more doors to be secured at a lower cost.3. Identify how future technologies will add more levels of

authentication via the use of gPS, biometrics, and 3d hand motions (gesture-based access control) to increase security.

Presenter(s): michael davis, director of Intellectual Property, HId global

Thursday, April 3 • 11:15 AM – 12:15 PM

(aC04) The future of nfC: Lessons Learned from the first full-access Control Installations

Learn how the early adopters in the commercial and higher education markets have installed and used near field Communication (nfC) for access control, visual identity, point of sale, etc. Hear first-hand insights from a panel of users regarding the installation, usability and process implementation within their own offices and schools. Find out what lessons have resulted from these and other recent nfC activities, and how you can apply that learning to your own implementation, as the popularity and demand for NFC explodes in the coming months.

Learning Objectives:

1. Discuss how the first NFC installations were executed in university and corporate business settings, the full breadth of usage and the lessons learned from these early installs.

2. Identify the benefits and lessons learned for students, employees, and administrators by introducing nfC alongside a card population.

3. assess opportunities nfC technology might hold for the future of access control.

Presenter(s): Jeremy earles, Portfolio manager, readers & Credentials, Ingersoll rand Security Technologies

fred emery, Vice President and general manager, Heartland Payment Systems

protects assets. What should CCTV integrators and users consider in terms of lighting when designing and installing a surveillance system? What makes good lighting design? This session answers these questions and more.

The content developed for this presentation is for CCTV professionals ready to make informed decisions on the best lighting to suit their specific design and implementation needs for top-level security and safety at night. Session participants review the main types of lighting technologies in today’s security market; compare the pros and cons of each; and review how they affect CCTV systems’ image quality, reliability and longevity, energy and cost efficiency, and capital outlay. discover how to achieve the correct relationship between the camera, lens and illumination, and the best techniques for designing, setting up and installing lighting to meet specific site requirements.

Learning Objectives:

1. Specify the best lighting configuration for specific site and CCTV requirements for top level night-time security with appreciation of its environmental and economic impact.

2. Design and set-up a lighting system to maximize CCTV image quality and security.

3. Implement smart operational lighting techniques for the most efficient and effective security system.

Presenter(s): Tony Whiting, Managing Director (Joint), Raytec

Thursday, April 3 • 8:45 – 9:45 AM

(VS02) Troubleshooting network Video

This session features an extensive step-by-step, four-dimensional view of all the components for a digital video surveillance system, including power (electrical), software (video management systems, PSIm, networking), hardware (cameras network switches, radios), and communications (oSI layers, wireless, fiber). Session participants gain insights into real-world video surveillance case studies and explore details of how to utilize troubleshooting charts to save time and money, and observe details on the complexity of the IP solutions currently being implemented by traditional CCTV hardware-driven integrators and architects.

Learning Objectives:

1. discuss network hardware and software issues and restate the multidimensional view of troubleshooting complex digital video surveillance systems.

Thursday, April 3 • 12:30 – 1:30 PM

(AC05) What the Upcoming Sixth Edition of UL 294 means to the Security Industry

The Sixth Edition of UL 294, the Standard for Access Control System Units, will become effective in december 2015. The new edition brings the standard more in line with those in Canada and europe, and will include several new requirements that could significantly impact how manufacturers design their products. Compared to the fifth edition, the new one will significantly expand the scope of the products that fall under the requirement and add additional performance and safety testing requirements that must be met.

With all the changes being implemented in the Sixth Edition of UL 294, it is important that manufacturers, installers and integrators work with an organization that has a thorough understanding of the new requirements to help them through the compliance process. The sooner manufacturers begin thinking about the new requirements, the more time and resources can be saved in the long run. This session addresses the driving force behind the changes in UL 294, the new requirements outlined in the Sixth Edition and their impact on manufacturers, installers and integrators.

Learning Objectives:

1. describe the driving force behind the changes in the standard.

2. Explain the new requirements of the Sixth Edition of UL 294.

3. Identify how the new changes will affect manufacturers, installers and integrators.

Presenter(s): Tom Connaughton. global director of Life Safety and Security Services and middle east Liaison for electrical/Commercial Service, Intertek

Video Surveillance

Thursday, April 3 • 7:30 – 8:30 AM

(VS01) getting the most from your CCTV System at night

“The most in-depth presentation of all the presentations I attended…Presenter inspired me to do additional research on this subject.”

Correctly designed lighting drastically improves the performance of a surveillance system, delivers usable CCTV images, deters crime, maximizes security and safety, and

2. distinguish components of camera, networking and wireless issues.

3. Interpret signals and clearances for antennas, fresnel zones, cabling and polarization.

4. recognize best practices for design and implementation.

Presenter(s): anthony Caputo, PmP, CCna, CWna, fmne, Physical Security architect–director of Pre-Sales engineering, avrio rmS group

Thursday, April 3 • 10:00 – 11:00 AM

(VS03) Storage matters: best Practices for end to end Storage Solutions for network Video

network video offers end-users better image quality, scalability and increased functionality. but with that comes concerns about storage and bandwidth. as physical security networked video becomes more prevalent on already tasked existing IT infrastructures, storage becomes an even more important factor.

This interactive session will discuss the importance of sound storage strategies and the role they play in bandwidth mitigation. borrowing from health and medical imaging IT strategies, session presenters will look at short-term, mid-term and long-term video archiving from a practical application and architecture perspective.

other session activities include a discussion on the power of today’s network cameras, the associated benefits of the current capabilities, and how this relates to current network infrastructure and storage’s role. Topics will include network architecture and storage strategies from edge to Cloud retention based on retention needs.

Learning Objectives:

1. Recognize the effect of network video on existing IT infrastructure.

2. Leverage best practice information from various industries to meet the needs of your organization.

3. develop storage strategies from edge to Cloud retention based on retention needs.

Presenter(s): duke duong, Chief Solution architect, Storage division for media, entertainment and Video Surveillance, Hewlett-Packard Company

Page 13: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

24 25

SIA EDUCATION@ISC WEST

Thursday, April 3 • 11:15 AM – 12:15 PM

(VS04) IP Video in the Connected Home—Integrating Security, Video and Lifestyle

The adoption of interactive systems in the past several years has created a significant and rapidly growing market for residential IP cameras and solutions that allow homeowners to monitor their homes from anywhere in the world. many of these systems loosely integrate IP cameras recording snapshots or video clips based on events triggered in the home and record them to a cloud-based storage solution. These solutions also provide homeowners with remote “look-in” capability.

In this presentation, attendees will review how residential IP cameras can be more tightly integrated with interactive services to provide compelling benefits to homeowners.

Learning Objectives:

1. Explain how integrated camera solutions work and what value they provide to homeowners.

2. describe the applications for integrated video solutions within an interactive services solution.

3. List 5 use cases for integrated interactive services solutions.

Presenter(s): Jeffrey V. Wilson, mba, director of Product management, netgear

kelly Jackson, Video Product manager, alarm.com

Thursday, April 3 • 12:30 – 1:30 PM

(VS05) Persistent Situational awareness with 360 degree Surveillance Systems

although technologies and imaging systems that enable 360 degree surveillance have been in the market for many years, there is still a great deal of confusion regarding their proper and effective use in real-life security systems. The key enabler for single camera systems is the optical front-end such as fisheye and panomorph lens systems and systems that utilize a combination of mirrors and lenses. There are also multiple narrow field of view camera systems packaged together with the imagery from cameras “stitched” together to provide a full 360 degree video stream. These systems have their own advantages and disadvantages, price points, reliability factors and surveillance management system interface requirements.

This session will provide end-users and system integrators with a better understanding of how to incorporate a persistent situational awareness feature into their security system

2. evaluate your organization’s capability to ensure a uniform experience in which customers have easy access to all the information about which they care.

3. analyze the potential for your offerings to provide value for homeowners in four specific areas: safety, efficiency, convenience and control.

Presenter(s): Jeremy Warren, Vice President of Innovation, Vivint, Inc.

keith brandon, director, residential access Solutions, kwikset Corporation

Thursday, April 3 • 8:45 – 9:45 AM

(ng02) big data & Surveillance: applications across Verticals

The surveillance world has gotten more complex, especially since the advent of big data. In this session, participants explore a new world in which data is effectively managed. In this session, participants delve into the world of analysis without tedious spreadsheets and endless reports, gain insights on examining high-level information, and learn how to drill into it to make informed business decisions.

Whether you operate an airport, casino, travel plaza or stadium, this practical session will help you understand how data moves through your facility and why its capture is relevant to today’s fast-paced world of analytics.

Learning Objectives:

1. Define which sources of data are the most important to review in your business organization.

2. Conduct better analysis of data and make better business decisions.

3. discover new techniques for harvesting data and associating it to video analytics management.

Presenter(s): Malcolm Rutherford, Director of Asia Pacific operations, eConnect

gail grigsby, gaming Intelligence & fraud manager, The Cosmopolitan of Las Vegas

John Peterson, Western region, Loss Prevention area manager, HmSHost mcCarran International airport

infrastructure through the effective use of 360 degree imaging systems. key issues addressed include optical resolution, image quality, lighting conditions, data storage requirements and de-warping techniques.

Learning Objectives:

1. determine if persistent 360 degree awareness is a necessary requirement for your security infrastructure.

2. review the basic technology that helps to establish 360 degree surveillance systems.

3. establish the most effective 360 degree surveillance system for your security infrastructure.

Presenter(s): James Ionson, Phd, Ceo, JdC, Inc.

Next Generation Security

Thursday, April 3 • 7:30 – 8:30 AM

(ng01) ‘Locking In’ Smarter Home Technology: meeting Homeowners’ needs for Safety, Convenience and Control

Home security has always provided peace of mind inside the home, but its convergence with technology—mobile devices, in particular—is giving consumers anytime, anywhere access to the components of their home, from automatic front door locks to video surveillance. In this presentation, participants learn of advances in home automation and technology that are connecting homeowners to the things that matter most to them—their families, their homes, their health and their businesses. additionally, participants take a “future of the smart home” virtual tour demonstrating a complete home network that connects every piece of technology in the home, of which the front door lock is of singular importance.

As the first entry point into the home, the front door lock is one of the most important elements in the home automation scenario. Using new electronic smart locks, all of the home systems can be controlled by the lock. as a result, home automation has been extended from inside the house to all the way out the front door, allowing consumers to protect their families, save money and simplify their lives.

Learning Objectives:

1. assess the role of mobile devices and door locks in your organization and discover how they can become the key connectors that allow people to observe and program their home’s happenings from anywhere.

Thursday, April 3 • 10:00 – 11:00 AM

(ng03) Security applications and the Internet of Things

machine-to-machine (m2m) technology is transforming the way we communicate and the way security professionals keep people and valuables safe. To understand how the security industry will be affected by the coming “Internet of Things” revolution, it’s important to know how m2m technology evolved and the conditions that are required to allow it to flourish now and in the future. It’s also vital to know how M2M products such as personal tracking units and emergency alert devices are changing the security industry and appreciate how technology advances enable the industry to deliver smaller, faster and cheaper devices in the future to serve users at every stage of their lives. This session provides an overview of m2m, covering the evolution of the technology, the current direction of the industry and real-world applications.

Learning Objectives:

1. evaluate the potential of m2m applications to improve safety and security.

2. Review examples of real-world applications in business, education and law enforcement.

3. discuss implications of technology advances and interconnected smart devices for future security and safety practices.

Presenter(s): bill gerhardt, director/gm, Service Provider Vertical, Cisco

Thursday, April 3 • 11:15 AM – 12:15 PM

(ng04) Leveraging Situational awareness and Intelligence from Twitter—new Techniques for analysis and Visualization

Twitter has risen in prominence as an important source of real-time, “on-the-ground” situational intelligence as demonstrated in events such as the Colorado wildfires, Boston Marathon bombings, oklahoma tornadoes, and others. The disclosure that the national Security agency uses Twitter data for homeland security and defense has heightened interest in how companies and local public safety agencies can benefit from not only what people are saying, but also the metadata contained in every tweet: who, when, where and more.

Page 14: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

26 27

SIA EDUCATION@ISC WEST

A panel of social media experts will dissect a tweet into its content and technological metadata components. They will explore visualizations—and analysis and visualization tools—that transform and leverage raw tweets into security and situational awareness intelligence. Learn how different incidents and events—from the boston marathon bombings to natural disasters—manifest on Twitter and how they can be used in day-to-day operations and emergency response.

Learning Objectives:

1. analyze Twitter metadata and content and its role in security intelligence and increased situational awareness for organizations and law enforcement.

2. apply new techniques in geolocation, visualization, and “sentiment quorums” of Twitter users to detect and alert on emerging events and incidents.

3. Examine the intelligence role of Twitter in the Boston marathon bombings, oklahoma tornadoes, and other incidents.

Presenter(s): George F. Siegle, Certified New Product development Professional (nPdP), director of marketing, IdV Solutions

John Nelson, Masters, GeoScience, User Experience and mapping manager, IdV Solutions

Thursday, April 3 • 12:30 – 1:30:00 PM

(ng05) Unmanned aerial Vehicles for air Photo mapping and event response

This session provides an overview of unmanned aerial vehicles (UaV) and their restrictions for use by the federal aviation administration. The use of UaVs with a variety of sensors and digital cameras, coupled with advances in computing power allow a high level of automation for planning and event response. These advancements have resulted in exciting new developments in the application of photogrammetric data capture and viewing. Imagery from digital cameras can generate highly detailed 3d data sets for multiple applications. as this technology continues to evolve, an increasing number of applications will be developed, ranging from survey accuracy feature extraction to general 3D visualization. Examples of external compass (Air Photo Mapping) for infrastructure assessments, event planning and response will also be presented.

Thursday, April 3 • 8:45 – 9:45 AM

(PS02) Perimeter Security—What are yoU doing about it?

Attendees will benefit from the vast experience and thought leadership of two professionals as they describe the risks in their respective environments associated with high vehicle and vendor traffic onto or into their property. The risks they will discuss include, but are not limited to, Improvised Explosive devices (Ieds), and theft and property damage caused by uninsured vendors and/or vehicles.

Two very different commercial environments will be the basis for these case study narratives, as these end users describe their unique challenges and the strategies they have established to mitigate risk. They will discuss corporate culture, as they describe their processes, inclusive of manpower requirements and innovative technologies, employed to effectively implement their policies.

Learning Objectives:

1. evaluate the environment and identify perimeter security challenges in terms of resource planning and technology usage.

2. assess processes used to automate security operations.3. Identify areas of security operations that can mitigate

financial risk to the owners and possibly become a revenue stream.

Moderator: Laurie Aaron, Executive Vice President & Chief Marketing Officer, Building Intelligence, Inc.

Presenter(s): Lizabeth fuchs, Senior general manager, related management

James Champion, Security director, Time Warner Center

edward Levy, Vice President of global Workplace Security, metLife

Thursday, April 3 • 10:00 – 11:00 AM

(PS03) you own the door, So don’t Leave dollars at the Threshold!

anytime you add a door position switch or multiple access control components to an opening, you become the owner of that door opening. Since you own the door, you shouldn’t be leaving money at the threshold for others! owners are ready and willing to purchase new innovative solutions and aesthetically appealing products. are you ready to provide these options?

With more and more security technology being deployed “on-the-door” as opposed to “around-the-door,” it’s imperative that managers and owners of security systems integration

Learning Objectives:

1. review the current faa restrictions for the use of unmanned aerial vehicles.

2. Consider sensors and systems tailored for specific applications that reduce technical barriers by automating flight and data processing.

3. Target the best-use cases of UaV sensor and platforms for these applications and solutions for various events.

Presenter(s): bill Timmins, President, gITa arizona, director Public Safety Solutions, gIS Services

Physical Security

Thursday, April 3 • 7:30 – 8:30 AM

(PS01) Path to Public Space Security: from Surveillance and Lighting to CPTed fundamentals

go back to the basics on how to enhance public spaces with improved waiting areas, best design practices and the latest trends in lighting systems to protect property and people. from schools to healthcare facilities, the design of public spaces surrounding these areas represents both opportunity and liability. Crime prevention through environmental design (CPTed) provides a sound method of enhancing safety and security by asking basic questions at the start of the design process. This session explores how critical metrics, including lighting efficiency (lumens/watt) and lighting power density (watt/ft2), contribute to actual lighting for given area values and energy consumption goals. Participant designers and practitioners gain insight into some of the most significant security design fundamentals.

Learning Objectives:

1. Unify Crime Prevention Through environmental design (CPTed), video surveillance and the latest in lighting technologies.

2. Identify video surveillance tools for perimeter protection, wide-area and low-light imaging.

3. Conduct a vulnerability assessment to highlight areas of risk requiring immediate attention and protection.

Presenter(s): Steven oplinger, Systems designer, Integrated fire and Security Solutions, Inc.

James Marcella, Director of Technical Services, Axis Communications

businesses understand the value in making this technology an integral part of their bid and service work. This session reviews the basic door components, identifies what gets modified by systems integrators and their sub-contractors, identifies the codes and standards that apply to electrified openings, outlines how green codes and sustainability will affect your future business, and explores the current and future state of integrated technology. Participants receive a workbook with reference links.

Presenters: John Hunepohl, PSP, director, aSSa abLoy americas University, aSSa abLoy

bob Cullum, aHC, Vice President, dugmore & duncan

Thursday, April 3 • 11:15 AM – 12:15 PM

(PS04) fire alarm Installations: a review of applicable Codes and Standards

This session reviews the standards that cover some of the requirements present in the adopted building codes and installation standards that apply to all construction, highlights proper installation methods, and identifies the codes and standards to be followed for proper fire alarm installation. This information will not only help ensure that the installation is code compliant but will provide information that is required to allow all of the costs associated with this activity to be properly estimated. This session addresses the inter-relationship and application of both the national electrical Code and The national fire alarm Code.

Learning Objectives:

1. determine the applicable sections of the electrical code as they apply to fire alarm installations.

2. demonstrate the fundamentals of how the national electrical Code (neC) works.

3. Properly prepare documents for installations that comply with both the electrical and fire alarm codes.

Presenter(s): Tom Parrish, PSP, SeT, CfPS, Vice President of Integrated Systems and Safety, Telgian Corporation

Thursday, April 3 • 12:30 – 1:30 PM

(PS05) 2014: The year of the robot

from vacuum cleaning robots to the mars rover, robots are becoming more prevalent in our lives. How will robots affect the security business? Will they make your job easier or harder? How can a robot serve you? and how do you select the right robot for the job? In this session, experts explain the state of the art in robotics, outline the specific tasks that can

Page 15: ConferenCe Program - ISC West · 2014-03-17 · implementation and assessment. 3. align your organization’s security plan with its overall business plan. Presenter(s): Jeffrey a.

28 29

SIA EDUCATION@ISC WEST

be accomplished using robots, and discuss the benefits and limitations of various robotic solutions. Join us to get answers to your questions about using robots for specific applications. Participants will receive A Field Guide to Robots, a practical tool outlining the various types and characteristics of robots and how they are used.

Learning Objectives:

1. distinguish between the four basic types of robots.2. Identify situations where robots could be used to improve

security and/or to reduce cost.3. Evaluate the usefulness of a specific robot for your

customers’ applications.

Presenter(s): dr. Louise gunderson, Chief Technology Officer, Gamma 2 Robotics

Signature Series

Wednesday, April 2 • 8:45 – 9:45 AM

(SS01) The great debate 2014: Use It or Lose It!

In the fast-paced security industry, there’s a new technology buzzword almost every day. new technologies can be an asset to your security system, but can become a huge liability if deployed improperly. So how do you know which technologies you should use and which ones you should lose? Join these veteran industry leaders for a lively debate on how the latest technologies driven by the consumer and IT worlds can positively or negatively influence your organization’s security initiatives. Session panelists will utilize a classic debate format, complete with referee, issues, refuting arguments and rebuttal to look at the options available to today’s security professional. The discussion will include some of the biggest buzzwords you’ll see this year, from access control to HDTV, gigapixel, cloud services, video analytics and edge storage. Come for the debate. Stay for the information.

Learning Objectives:

1. determine which technologies are assets or liabilities to your organization’s security initiatives.

2. Identify the latest and greatest products/technologies driving consumer purchases.

Presenter(s): fredrik nilsson, general manager, north America, Axis Communications

SteveVan Till, President & Ceo, brivo Systems, LLC

don Zoufal, University of Chicago, System development.Integration, LLC

Jay Hauhn, Chief Technology Officer, Tyco Integrated Security

Thursday, April 3 • 1:45 – 2:45 PM

(SS02) The Command Center Experience: From design to PSIm

from the development and design of an emergency operations center (eoC) to the deployment of supporting man-machine interfaces and agency interoperability, the process of Command Center design is critical to the success of industry and public safety alike. This Signature Series session features three segments, each with an engaging multimedia delivery. The content is also synchronized with a potential event on the exhibit show floor called “The Command Center Experience,” where system integrators and end users can actively try out PSIm, central station automation and tactical solutions. during the discussion of each segment, attendees will hear information on real-time operations and multimedia used to teach, in lieu of “flat file” information slides. Concepts presented combine elements of visual activity used by real-life operators at several emergency operation centers around the country.

Learning Objectives:

1. review conditions needed to design a compelling command center.

2. recognize how aspects of PSIm, central station automation and video management software technology can work together to successfully deploy a command center.

3. gain insights on how to leverage cloud technology and cultivating relationships with service providers to unify existing emergency operating centers.

Moderator: Steve Surfaro, Security Industry Liaison, Axis Communications

Presenter(s): Jeffrey a. Slotnick, CPP, PSP, Chief Security Officer, OR3M

Larry folsom, President, I-VIeW noW

don Zoufal, University of Chicago, System development Integration, LLC

education Session Pricing options

Full Three Day PackageIncludes:• Access to the ISC West Exhibit Floor• Access to the SIA Education@ISC West sessions on all three days of the

event (Tuesday, april 1–Thursday, april 3, 2014)• Boxed lunch on Tuesday, April 1, 2014• Access to the State of the Industry Address on Wednesday, April 2, 2014• Access to Conference Attendee Lounge• Continental Breakfast in Conference Attendee Lounge• Certificate of attendance (subject to attendance verification) after the show,

to submit to relevant industry bodies that award continuing education and professional development credit

Two Day PackageIncludes:• Access to the ISC West Exhibit Floor• Access to the SIA Education@ISC West sessions on days purchased• Access to the State of the Industry Address on Wednesday, April 2, 2014• Access to Conference Attendee Lounge• Continental Breakfast for days purchased in Conference Attendee Lounge• Certificate of attendance (subject to attendance verification) after the show,

to submit to relevant industry bodies that award continuing education and professional development credit

One Day PackageIncludes:• Access to the ISC West Exhibit Floor• Access to the SIA Education@ISC West sessions on day purchased• Access to the State of the Industry Address on Wednesday, April 2, 2014• Access to Conference Attendee Lounge• Continental Breakfast for day purchased in Conference Attendee Lounge• Certificate of attendance (subject to attendance verification) after the show,

to submit to relevant industry bodies that award continuing education and professional development credit

$825 $925

EARLy BIRD(Valid through 2/24/2014)

REGULAR(Valid after 2/24/2014)

$625 $725

$425 $525

If you have questions on education pricing or need further assistance, please contact Sherida Sessa at 203-840-5831.

SIa education@ISC West offers various pricing packages, so you can always stay within your budget.

For more about SIA Education@ISC West, visit us at http://www.iscwest.com/Education/

Security Industry Association (SIA) • 8405 Colesville Road, Suite 500 • Silver Spring, MD 20910 • 301-804-4700 • securityindustry.org/education