Quick Search

You can use the search box below to locate specific speakers or sessions.



View Date: Wednesday, March 28, 2012

Wednesday, March 28, 2012
Central Station
CS01: NFPA 72: Are You Ready for the Changes?
10:15 am - 11:15 am (Wednesday, March 28, 2012) ~ Introductory
In the most extensive Code revision since 1993, the 2010 NFPA 72''s scope and organization have expanded beyond the core focus on fire alarm systems to also include requirements for mass notification systems used for weather emergencies, terrorist events, biological, chemical, and nuclear emergencies along with other threats. This wider coverage is reflected in a new Code titled National Fire Alarm and Signaling Code. In addition to updated rules for in-building fire emergency voice/alarm communications systems, the revisions include first-time provisions for risk analysis requirements for the design of mass notification systems, as well as revised installation and testing provisions related to voice intelligibility. This session will outline the various code changes and updates, while providing concrete strategies for meeting the new requirements. While there are no prerequisites for this session, overall familiarity with codes and code structure would help attendees maximize their learning.

Learning Objectives:
1. Define NFPA 72 as a standard installation code
2. Discuss the restructuring of the chapters
3. Outline the major changes to the code
Moderator:
Thomas Parrish - Vice President, Integration Leader, Telgian Corporation
Speaker:
Morgan Hertel - VP and General Manager, Mace CS
Larry Mann - Project Manager, Central Station, Inc.
CS02: The Automated Secure Alarm Protocol: An Alarms Notification Revolution
11:30 am - 12:30 pm (Wednesday, March 28, 2012) ~ Introductory
Ten years of effort has culminated in a new process that streamlines the delivery of alarm notifications between alarm monitoring companies, also known as central stations, and 9-1-1 Public Safety Answering Points (PSAPs).Trials have been underway and show exceptional results, including significant reductions to 9-1-1 processing and response times, and fewer miscommunications and mistakes made during the verbal handoff of alarm notification information between an alarm company operation and 9-1-1 calltakers. An expert panel of presenters will outline the benefits seen for PSAPs, which are measured in millions of dollars, and guide attendees on how best to work with local jurisdictions to join this revolution in alarm notifications.

Learning Objectives:
1. Discuss the new ASAP standard, created by the CSAA & APCO, for automated dispatch to PSAPs
2. Outline the challenges faced by alarm monitoring companies for connectivity and creating valid addresses
3. Develop strategies for effectively working with your local jurisdictions
Moderator:
Ed Bonifas - CSAA Immediate Past President, Alarm Detection Systems, Inc.
Speaker:
Hank Goldberg - Vice President, Secure Global Solutions, LLC
Bill Hobgood - Project Manager, Public Safety Team Department of Information Technology City of Richmond, Virginia
Mary Jensby - Director Central Station, Monitronics Security
CS03: PERS & Two Way Voice Monitoring: Applications Beyond Healthcare
2:45 pm - 3:45 pm (Wednesday, March 28, 2012) ~ Intermediate
New two way voice systems are being developed for the next generation PERS emergency center. But, these audio technologies are no longer limited to the traditional “I’ve fallen and I can’t get up” situation. See how two-way audio technologies can provide greater monitoring abilities for hospitals, healthcare providers, schools, hotels and PERS alarm centers. The use of audio remote monitoring is growing rapidly and the task of integrating audio voice and alarm data in today''s modern alarm centers is now a technical task. In this dynamic panel, you''ll learn how PERS products of today are being monitored and what new technologies are to come.

Learning Objectives:

1. Identify the two way technologies, which are becoming standard in the industry and how they are being used outside of the traditional healthcare application.
2. Examine the inner workings of these technologies
3. Forecast the collaboration of PERS and other technologies, and the direction their future potential
Moderator:
Clifford V. Dice - CEO and President, DICE Corporation
Speaker:
Elias Janetis, MobileHelp
Tim LeBlanc - Owner, General Monitoring Services
CS04: Virtualization and Cloud RMR: Opportunities and Risks
4:00 pm - 5:00 pm (Wednesday, March 28, 2012) ~ 1
Increasingly, service providers are augmenting their monitoring services and building additional revenue streams by offering basic video, access control and intrusion, event storage and retrieval, and other security-related applications through the cloud. Many are finding that outsourcing video services and central monitoring not only reduces the total cost of managing physical security, it also frees them to focus their energies on security issues rather than technology maintenance and support, creating a true value-add for the customer.

However, before deploying hosted services to their customers, operators should carefully consider issues related to moving to the cloud. In this session, attendees explore issues ranging from technical considerations, such as bandwidth utilization, to potential privacy and security risks, and how to define the scope of services and allocation of risk among all involved. Expert panelists will help attendees evaluate how to select the right technology partners and guide them in the development of security policies that effectively meet company and regulatory needs.

Learning Objectives:
1. Determine how to select a cloud provider based on existing infrastructure
2. Promote opportunities in cloud utilization
3. Interpret the privacy and security challenges and impact on security compliance
4. Ensure sufficient data protection and resiliency for on- and off-premise providers
5. Identify some of the legal issues of moving to the cloud and how to protect your company against the risk of catastrophic loss
Speaker:
Joseph McDonald, CPP, PSP, CMAS - Chief Security Officer, Switch Communications Group
Edward Meltzer - Industry Advisor, Cloud Computing Initiatives
Eric Pritchard, Esquire , Kleinbard Bell & Brecker LLP
Dealer, Installer, Integrator - Business
DB01: Security + IT: Selling New Technologies in Traditional IT Infrastructures
10:15 am - 11:15 am (Wednesday, March 28, 2012) ~ Intermediate
Customers demand high-resolution video, but when megapixel cameras are deployed and more usable information is captured, users soon become aware that half the cost of the project is tied up in storage. Storage costs can easily represent 50% of the cost of a video surveillance project. Investments in video surveillance storage can quickly deplete IT and security budgets with traditional IT systems. Today, innovations in technology have enabled the development of storage platforms designed specifically for use in the video surveillance market, and these technologies provide immediate and long-term cost savings to your customers.

In this panel, speakers will discuss how high-capacity storage can become a core competency for installation firms to win projects, increase profitability and reduce support costs. This session serves as an introduction to virtualization and new storage technologies, and is appropriate for industry stakeholders looking for new and cost-efficient ways to capture critical information for their customers.

Learning Objectives:
1. Compare the differences and benefits of storage systems built for video surveillance applications
2. Detail the benefits of leveraging open systems and virtualization to save immediate and long-term costs
3. Discuss the value of a scalable storage platform to enable customers to capture and store the data necessary to make video usable in investigations
Speaker:
David Barber - Senior Business Development Manager, GEUTEBRUCK Security
Lee Caswell - Chief Strategic Officer, Pivot3
Rob Hile - Sr. Director, Enterprise Security Solutions, Siemens, Building Technologies Division
Wayne Hunken - A/National Headquarters Project Leader, Correctional Service Canada
DB02: Getting the Most from Your Sales Efforts: Increasing Profit by Excellence in Estimating
11:30 am - 1:00 pm (Wednesday, March 28, 2012) ~ Intermediate
One of the most difficult and important daily activities facing business owners and sales people is ensuring sales estimates include the right products, services and labor at profitable gross profit margins and the right sales price. This session will review critical job estimating elements for profitable pricing of projects “go, no go” decision making for taking on new projects, ideas for facing today’s competitive environment, and statistics you need to know to be in control of your sales destiny.

Learning Objectives:
1. Increase accuracy and efficiency during the estimating, proposal and contract process
2. Create an ROI statement analyzing areas of inefficiencies, inaccuracies and loss equal to dollar value targets for improvement
3. Identify key performance measures and types of reporting to increase your and your sales team’s profitability
4. Establish best practices for increasing estimating and proposal/contract production
Moderator:
Tracy Larson - President, WeSuite, LLC
Speaker:
Lauren Fleetwood - Manager of I.T. Operations, ASG Security
Gloria Lubben, CPP - Executive Vice President, SecurAlarm System Inc.
John Nemerofsky - Vice President, Market Solutions Stanley Convergent Security Solutions, Stanley Convergent Security Solutions
Steven E. Paley - President, Rapid Security Security Solutions, LLC
John Palumbo - Vice President of Sales & Partner, Unlimited Technology, Inc
DB03: Creative Sales and Marketing: Delivering a Championship Performance
1:30 pm - 2:30 pm (Wednesday, March 28, 2012) ~ Introductory
Nothing is more powerful than engaging your customers as an active part of your sales team. Get an inside look on how to take people with zero sales experience and develop them into extraordinary sales people. This session will illustrate how practice, preparation, scouting, creativity, talent, planning, leadership and the all important “playbook” are the key components to a successful team.

Attendees will review samples of sales and marketing budgets, sales and marketing plans, helpful business websites, tips for trade shows and open houses, as well as examine the results these concepts have generated in real life case studies.

Learning Objectives:
1. Learn step by step through creating memory and educational events how to introduce prospects to customers in a non-threatening manner
2. Discover the process for developing new business
3. Identify creative techniques to drive sales and to be able to fund them
Speaker:
Joseph Clouatre - President and CEO, Innovative Business Partners, Inc.
DB04: The Anatomy of a Transaction
2:45 pm - 3:45 pm (Wednesday, March 28, 2012) ~ Intermediate
This presentation focuses on the owners of security companies who are curious about the process of buying or selling a company. Our panel of experts includes an attorney, who will detail what he prioritizes as a representative of the buyer or seller; an accountant, who will discuss the specific financial information he requires to do proper due diligence; a buyer, who will describe the process of completing a transaction with a seller; and a seller, who will explain how he prepared his company for sale and the ""agonies and the ecstasies"" of selling.

Learning Objectives:
1. Outline the steps and process for buying or selling a company
2. Prepare a company for sale
3. Identify the questions to ask of a seller, if you are a buyer
Moderator:
Ron Davis - Managing Director, Davis Mergers & Acquisitions Group
Speaker:
Patrick M. Egan - President, Select Security
Marc P. Katz, Law Offices of Marc P. Katz, LLC
John Lombardi - President, CIA
Raymond Lynn, Raymond Lynn & Associates, LLC
DB05: How To Design, Price and Sell Service Agreements
4:00 pm - 5:30 pm (Wednesday, March 28, 2012) ~ Introductory
Back by popular demand! This highly charged, financially rewarding and entertaining session on how to design, price and sell service agreements is for clients with security systems. Specifically, learn how to design the right service agreement to minimize your exposure and maximize profit, motivate your sales force to sell them to both new and existing clients, and package your contracts to minimize risk. Ideas discussed in this presentation are based on the actual experiences of one of the most profitable security firms in the United States. These real-world applications will generate a significant profit for all attendees.

Learning Objectives:
1. Evaluate the need to sell service agreements
2. Design the right service agreement to minimize your exposure and maximize profit
3. Effectively price your services to maximize profit
Speaker:
Alan Kruglak - SVP, Genesis Security Systems LLC
Dealer, Installer, Integrator - Technology
DT01: Standards Roundup: Physical Security, Safety Design and Video Quality
10:15 am - 11:15 am (Wednesday, March 28, 2012) ~ Advanced
From FICAM to Video Quality standards, the physical security and safety design process has evolved and is greatly affected by advancement components and transport systems. This exciting and interactive session delivers a roundup of the latest standards providing a framework for standardized design. Attendees will receive each standard and learn of specific use cases illustrating their application in design specifications, lifecycle management and capital projects. Through interaction with the session leaders, attendees gain insights for driving the design process home. Finally, roadmaps will be distributed for professional project planning, audience feedback and the enhancement of these standards.

Learning Objectives:
1. Gain a technical overview of physical security design standards
2. Discuss relevant case studies, including video quality and public safety use cases
3. Achieve seamless and compliant design through the effective use of the latest design standards- Video Quality Standards: A First Responders Handbook, Electronic Security and Safety Design Standards, along with the Physical Security Interoperability Standards
Moderator:
Steve Surfaro - Channel Manager and Security Industry Liaison, Axis Communications
Speaker:
Carol Everett Oliver, RCDD, ESS - Marketing Analyst, Berk-Tek, A Nexans Company
Jonathan Lewin - Managing Deputy Director, City of Chicago
Steve Van Till - President & CEO, Brivo Systems LLC
DT02: Existing Technology to Future Platform: Developing the Right Roadmap
11:30 am - 1:00 pm (Wednesday, March 28, 2012) ~ Intermediate
With the evolution of security technology, many companies are grappling with how to their security system to a future state in a security-effective and cost-effective way that establishes maximum compatibility with emerging technology. With the significant, in many cases multi-million dollar, investments some companies have made in their security systems, to wholesale “rip and replace” legacy technology is simply not an option.

In this session, attendees will discuss key topics, including risk prioritization, the role of standards, quality assurance, physical security/IT convergence, moving from site-based to enterprise-wide technology, migration planning, and timelines. They’ll also have the opportunity to rate the capabilities of their existing technology deployments and receive evalution tools and informative handbooks on collaborating with security technology and corporate networks.

Learning Objectives:
1. Discuss and distinguish the concept of an "evolvable infrastructure" from a traditional technology deployment
2. Use the concept of an evolvable infrastrure as the basis for future technology planning
3. Develop a technology needs picture for assessing the state of the existing security technology and defining a "future state" for security technology capabilities
4. Create a technology roadmap that identifies the progressive states of technology migration to the ultimate future state
Speaker:
Ray Bernard - President, Ray Bernard Consulting Services
Karl Perman - Director of Security, North American Transmission Forum
DT03: Networks: Supersize the Value of This Key Technology
1:30 pm - 2:30 pm (Wednesday, March 28, 2012) ~ Intermediate
By 2015, there will be one trillion connected devices on the smarter planet. Networks from home to business to government are being loaded and overloaded. Proper use of network bandwidth starts with good design, but the device explosion means new items are added by the day creating new challenges and risks. And, if networks fail, life safety is impacted. In this “ask the experts” session, a panel of manufacturers and end-users identify and use the tools available to analyze and secure networks and supplement good network design with sound security practices.

Learning Objectives:
1. Identify key elements of proper network design and infrastructure to support security installations
2. Identify tools needed for network and cloud services delivery
3. Describe effective strategies for supplementing good network design with good security practices
Speaker:
Kevin Brooks - Director Busines Development Physical Security, Siemens (Enterasys Secure Networks)
Bill Brousseau - Vice President, Secure Global Solution, LLC
Hank Goldberg - Vice President, Secure Global Solutions, LLC
Justin Hadler, Hewlett Packard
DT04: Leveraging Technologies to Extend Connected Home Security Services
2:45 pm - 3:45 pm (Wednesday, March 28, 2012) ~ Introductory
The connected home represents a burgeoning market for security services and products. Consumer demand and influence from service providers is driving the proliferation of connected home services like home security and home monitoring beyond propriety security offerings and custom installer solutions. This presentation covers the new connected home services market and reviews opportunities for providing hardware manufacturers, retailers and other vendors with the knowledge to apply this information to their own strategy for domestic penetration. In this session, attendees examine what the future of communication paths holds for modern security integrated with web and mobile technology; gain valuable information on how to leverage security technologies to capitalize on interactive services; analyze consumer trends to better understand the market shift towards mobile, interactive, video and web-based services; and assess where the security industry needs to go to meet today’s demanding consumers with high expectations of technology services.

Learning Objectives
1. Analyze opportunities for embracing new communication technologies.
2. Assess the potential, or lack thereof, for the technology currently being used
3. Evaluate how to innovate your security offering based on the changing technological landscape
4. Apply at least one best practice
Speaker:
Leon Hounshell - Division General Manager, Motorola Mobility
Dan Ramos - Senior Vice President, Alarm.com
DT05: PSIM vs. Unified Video & Access Platforms: Making the Right Choice
4:00 pm - 6:00 pm (Wednesday, March 28, 2012) ~ Advanced
One of the most critical decisions security practitioners face today is determining how to align security with other business systems. Combining and centralizing corporate operations, including security, requires fully understanding your options. Do you go with a Unified Video Management System (VMS) and Access Control System (ACS) or seek a Physical Security Information Management (PSIM) solution? Is there a difference between the two? In this session, experts guide attendees through the key attributes and limitations of each, and outline a decision- making process for finding the “right” solution that delivers increased business performance and bottom line value for your company or customer. Attendees’ most critical questions about aligning security with other business systems, interoperability and vendor neutrality, and the costs of migrating to a new platform and technology, among others, will be addressed.

Learning Objectives
1. Identify the unique features, strengths and limitations of each solution
2. Assess the value of each solution against overall business needs
3. Develop a roadmap for the implementation of a PSIM or Unified Platform solution
Speaker:
James Chong - Founder & CTO, VidSys, Inc.
Jeremy Howard - Director of Sales, Strategic Accounts, Critical Infrastructure Protection, Verint
Erin Phelps - Director of Business Development, Homeland Security, Kratos Defense Public Safety & Security
End-User - IT Related Issues
IT01: Social Media Investigations in Threat Assessments
10:15 am - 11:15 am (Wednesday, March 28, 2012) ~ Intermediate
A growing and revealing source of information about any subject can be found in their online, social media activity. Threat assessment professionals can learn the intentions, violence capability and mental status of a subject through their online postings and social media messages, then use that information to determine the liklihood and severity of a potential threat. In this session, attendees review significant threat assessment cases in which social media was used, illustrate the factors and elements to investigate online, and demonstrate the tools and manner of researching potential threats on the web.

Learning Objectives:
1. Recognize opportunity for data collection on potential threats through online activity
2. Identify means of searching and gaining access to a subject''s online activity
3. Develop the ability to monitor a subject''s state of mind and intentions through their online activity
Speaker:
Bruce Anderson - Director of Investigations, Cyber Investigation Services LLC
Paul Parlon - Detective, UMASS Boston
IT02: Part I Why Hackers are Attacking: Staying Ahead of the Threat with Logical Security and Credentialing
11:30 am - 1:00 pm (Wednesday, March 28, 2012) ~ Advanced
How vulnerable is your network? Do physical security devices introduce unwanted risk? Risk assessment of your network infrastructure to attacks from within or outside of your organization are notable highlights of this session, which examines the implications and uses of today’s social networking sites and how they may increase your company’s exposure to malware and attacks.

This session covers and introduces current standards and best practices for logical security, intrusion detection and certificate handling, including applications of Federal Identity Credential and Access Management (FICAM), Open System Integration and Performance Standards (OSIPS), and managed services (Cloud). The panel will also explore business cases for the emerging standard: Digital Media Content (DMC) Interoperability Standards with FICAM, and where to apply the standard. To maximize this learning opportunity, attendees should have an average to advanced working knowledge of network devices and baseline logical security techniques.

Learning Objectives:
1. Provide an advanced technical overview of hacking and discuss several relevant case studies of exploits
2 .Identify the four relevant standards; which sections to use in a performance specification, capital improvement plan or security assessment, and how to communicate these to your management
3. Apply a proactive strategy for protecting information assets
Moderator:
Steve Surfaro - Channel Manager and Security Industry Liaison, Axis Communications
Speaker:
Kent Browne - Principal Security Architect, Worldwide, IBM Internet Security Systems
Ron Martin, CPP - Executive Director, Open Security Exchange
Darnell Washington - President/CEO, Company SecureXperts, Incorporated
IT03: Part II Why Hackers are Attacking: Staying Ahead of the Threat with Logical Security and Credentialing
1:30 pm - 2:30 pm (Wednesday, March 28, 2012) ~ Intermediate
How vulnerable is your network? Do physical security devices introduce unwanted risk? Risk assessment of your network infrastructure to attacks from within or outside of your organization are notable highlights of this session, which examines the implications and uses of today’s social networking sites and how they may increase your company’s exposure to malware and attacks.

This session covers and introduces current standards and best practices for logical security, intrusion detection and certificate handling, including applications of Federal Identity Credential and Access Management (FICAM), Open System Integration and Performance Standards (OSIPS), and managed services (Cloud). The panel will also explore business cases for the emerging standard: Digital Media Content (DMC) Interoperability Standards with FICAM, and where to apply the standard. To maximize this learning opportunity, attendees should have an average to advanced working knowledge of network devices and baseline logical security techniques.

Learning Objectives:
1. Provide an advanced technical overview of hacking and discuss several relevant case studies of exploits
2 .Identify the four relevant standards; which sections to use in a performance specification, capital improvement plan or security assessment, and how to communicate these to your management
3. Apply a proactive strategy for protecting information assets
Moderator:
Steve Surfaro - Channel Manager and Security Industry Liaison, Axis Communications
Speaker:
Kevin Kjosa - Assistant Director, University of Texas-San Antonio
Andrew Klein - Product Manager, Narus, Inc
IT04: Critical Elements of a Technical Investigation
2:45 pm - 3:45 pm (Wednesday, March 28, 2012) ~ Introductory
Intelligence theft can cause irrevocable damage to an organization, far more in many cases than property loss. A technical security mindset and an awareness of electronic surveillance threats are vital to overall organizational security. This session outlines the components of a technical security investigation to identify and combat eavesdropping and intelligence theft. Learn how different devices and technologies are used to compromise airwaves, phones, and wiring to steal information. Find out what offensive and defensive countermeasures are needed to overcome these threats.

Learning Objectives:
1. Discuss the level of risk espionage poses and why there is a need for technical security
2. Identify various techniques and technologies used to extract information
3. Develop the mindset necessary to execute an effective technical investigation
Speaker:
Mark Uker - Director of Training, Research Electronics International
IT05: The Converged Campus
4:00 pm - 5:00 pm (Wednesday, March 28, 2012) ~ Introductory
With the rapid growth in demand for comprehensive campus security, organizations are learning the benefits of an integrated, campus-wide strategy. An integrated systems approach to strategic security investments yields greater protection, response capability, ease of management and efficiency in investment dollars. This systems approach integrates all aspects of a physical security solution including campus card programs, biometrics, access control, video surveillance systems, and incident response and notification systems. In this session, participants learn how to maximize their security investments to increase situational awareness across systems, departments and facilities. Participants will be encouraged to share their ideas for security-enhancing technology partnerships that benefit their organizations.
Learning Objectives
1. Realize greater situational awareness
2. Identify the advantages and best practices for assessing, planning and deploying various campus security solutions within your safety and security plans
3. Plan partnerships and processes that maximize benefits and investment dollars
Speaker:
Mat Birnbaum - Director of Integrated Security Solutions, The CBORD Group, Inc
John Convy - Senior Vice President, Strategic Alliances, BRS Labs
Jason Rossi - Director of One Card and Campus Security Systems, University of San Francisco
Charlie Sasso - Business Development Manager, Education Market , Ingersoll Rand Security Technologies
End User - Physical Security Issues
PS01: More Than Security: Using Video-Surveillance Where You Would Never Expect It
10:15 am - 11:15 am (Wednesday, March 28, 2012) ~ Intermediate
With the pendulum swinging towards IP, cameras that were once used for video surveillance alone are now being leveraged into doing more than ever thought possible. Video enabling is allowing end-users to monitor shopping patterns in retail outlets, cities to increase the effectiveness of law enforcement, and construction managers to more effectively monitor ROI. Robust open IP platforms are allowing for tighter integration and more video enabling than ever before. In this session, attendees explore multiple examples of how real-world companies are realizing the benefits of video outside of traditional security, including animal protection, food production, customer service, logistics and parcel tracking, and more.

Learning Objectives
1. Improve business outcomes, such as cost reduction and process optimization, through the integration of IP video
2. Identify real-world applications of IP video across various industry sectors
3. Identify why and how to properly integrate solutions
Speaker:
Eric Fullerton - Chief Sales and Marketing Officer, Milestone Systems
PS02: The Virtual Security Officer: The Ultimate Application of Technology
11:30 am - 12:30 pm (Wednesday, March 28, 2012) ~ Advanced
Remote Monitoring has teased the security industry for decades. Its concepts aren’t new, but advancements in technology, the low cost of Internet connectivity and our challenged economy create the "perfect storm" for virtual security. From traditional applications, such as alarm validation, to complex protocols used to comply with chemical facility regulations, the Virtual Security Officer is here to stay. This session provides an overview of the technologies and services available. Attendees will learn how to qualify vendors, develop budgets and integrate virtual officers into their security programs. An expert panel presents operational and technology perspectives, including those of an end-user currently using virtual security officers.

Learning Objectives:
1. Identify potential uses for virtual security officers
2. Determine what technology is required to support a virtual security officer
3. Outline the advantages and drawbacks of using a virtual security officer
Speaker:
Eric Fullerton - Chief Sales and Marketing Officer, Milestone Systems
Gregory Pickard - President, Solutions International
Wade Pinnell, CPP - Vice President, Protective Services Group, Huffmaster Crisis Response, LLC
PS03: Innovative Situational Awareness at the New World Trade Center: Security Intelligence Through the Integration of Identities and Events
2:45 pm - 3:45 pm (Wednesday, March 28, 2012) ~ Intermediate
With five major new office towers built to the highest architectural, environmental, safety and security standards, a state-of-the-art transportation hub, unparalleled retail opportunities, a performing arts center, the National September 11 Memorial and Museum and more, the new World Trade Center represents the triumph of the human spirit. As part of this significant build, the WTC is creating a centralized security command and control center to monitor video surveillance; access control; intrusion detection; vertical transportation (elevators); building management systems, including HVAC; visitor management; fire alarm; chemical, biological, radioactive, nuclear detection; and more.

Running within this command center is a conjoined identity management and situation management software solution, bringing together physical identity and access management with PSIM technologies to manage identities and events in real time for the estimated 50,000 tenants and over 1 million visitors, providing unparalleled visibility for the WTC security team, the New York Police and Fire Departments. In this session, Phil Santore of DVS Security will share the vision of security at the new WTC and best practices contributing to a holistic approach to identity management and physical security integration. Tim Galvin of VidSys and Laurie Aaron of Quantum Secure will explain how this vision is being brought to life through the use of technology and how an integrated approach to Identity and Situation management site-wide can significantly reduce operational costs, as it has a profound impact on reducing risk.

Learning Objectives
1. Discuss the concept of Physical Identity & Access Management, integrating multiple disparate access control systems across a diverse security infrastructure and automating key policies to streamline identity management
2. Discuss the value of integrating physical identity & access management (PIAM) software with physical security information management (PSIM) software
3. Integrate best practices and lessons learned from the deployment of an integrated security solution for the new World Trade Center into your security approaches
Moderator:
Laurie Aaron - VP Business Development & Corporate Marketing, Quantum Secure
Speaker:
Tim Galvin - Sales Executive, VidSys, Inc.
Phil Santore - President, DVS Security
PS04: IAHSS Special Session: End Users and Suppliers Working Together to Meet Regulatory Requirements
4:00 pm - 5:00 pm (Wednesday, March 28, 2012) ~ 1
Do you understand the regulatory requirements healthcare must meet? This session will discuss regulatory impact on the design, installation and implementation of systems in healthcare. Attendees will obtain a working knowledge of how decisions are impacted by regulatory requirements.
Speaker:
Bryan Warren, CHPA - President, IAHSS
End-User - Public Safety
PB01: Security Best Practices for Airports
10:15 am - 11:15 am (Wednesday, March 28, 2012) ~ Introductory
Airports are designed to move passengers quickly and efficiently through the facility. However, there are a great number of challenges that face airports today including identity verification of personnel and flight crew, security, cooperation with government (TSA, Customs and Border Patrol), construction and growth. The Radio Technical Commission for Aeronautics (RTCA) Sub-Committee SC-224 recently issued an update to its recommendations on airport security covering identity management, access control and video surveillance functions. In this expert panel, hear three distinct perspectives in airport security discuss the implications of the SC-224 recommendations.

Learning Objectives:
1. Discuss the latest RTCA SC-224 recommendations and rationale behind the updates
2. Identify potential challenges in meeting new recommendations
3. Provide recommendations for implementing RTCA-proposed security practices
Speaker:
Glen W. Granger - Systems Programmer II, Los Angeles World Airports
Steve Rogers - President & CEO, Intellisoft, Inc.
Adam Shane - Product Manager, AMAG Technology
Christer J. Wilkinson, Phd. - Associate Vice President, Technology Solutions
PB02: Protecting the Pentagon: Lessons Learned
11:30 am - 12:30 pm (Wednesday, March 28, 2012) ~ Intermediate
The Pentagon Force Protection Agency (PFPA) is implementing an HSPD-12 / Federal Identity Credential and Access Management (FICAM)-aligned solution called the Privilege Management Program (PMP) to collect, manage and distribute identity credentials, biometrics and privileges. PFPA is also evaluating a multi-modal biometric access control solution because they realized early on that no single biometric was a complete solution. The PFPA has now enrolled more than 6,000 Mark Center tenants and will be focusing on the Pentagon next. In last year's ISC West conference program, the project plan and status of its pilot programs were discussed. This year's session provides the lessons learned after 6 months of live operation at the Mark Center - what worked, what didn't work, and what had to be changed - and subsequently the steps leading up to implementation at the Pentagon.

Learning Objectives:
1. Understand the key components to properly plan and execute a PIV and FICAM solution using real world examples.
2. Learn the techniques used to gain stakeholder and senior management support.
3. Learn about the technical aspects of PFPA's program that make it unique and how they overcame challenges encountered during deployment.
Speaker:
Derek Nagel - Access Control Branch Chief, Pentagon Force Protection Agency
Roger Roehr - HSPD-12 Physical Security Engineer, Pentagon Force Protection Agency (PFPA)
Steve Rogers - President & CEO, Intellisoft, Inc.
PB03: Effective Security Command Center Design and Planning
2:45 pm - 3:45 pm (Wednesday, March 28, 2012) ~ Intermediate
The command center is one of the most critical elements of a security program. This session provides a look into the process of designing a new command center or upgrading an existing security command center. Expert presenters, who have designed more than a dozen modern-day command centers, will discuss the design process, essential functions, systems integration, space planning, ergonomic design, system programming and transition planning. In this valuable and practical session, attendees receive a security command center design guide that includes instructions for designing a command center, as well as essential forms, templates, and a best practices design guide.

Learning Objectives:
1. Outline the command center design process
2. Identify the key elements of a command center
3. Identify strategies for maximizing the value of the command center
Speaker:
Daniel O'Neill - Senior Vice President, TSG Solutions
Roger Rueda, PSP - Vice President, Risk Management, TSG Solutions, Inc.
Kevin Tuohey - Executive Director, Research Compliance, Boston University
PB04: Cloud Computing for First Responders
4:00 pm - 5:00 pm (Wednesday, March 28, 2012) ~ Intermediate
The Cloud is the next frontier for the integrated security services market, and we are on the verge of a revolution akin to what we saw with the Internet and IP networking in the 1990s at the end of which the cloud will dominate electronic service delivery. Driving development is revenue. Cloud Computing offers opportunities for new services, along with scalability and economy that may make bricks and mortar irrelevant. Increasingly, electronic service delivery, including capabilities such as intrusion detection riding in the Cloud, must be tied to devices at the customer premises. End-user interest in new capabilities and in realizing cost savings by using the Cloud as an information repository are driving continued innovation on the manufacturer end. In this session, attendees learn how and why first responders will be using the cloud to minimize risk, manage costs, and maximize efficiencies and performance; discuss the factors driving development of the Cloud; and engage in lively debate about what belongs on the Cloud and what does not.

Learning Objectives:
1. Identify three ways first responders are using the Cloud to minimize risks, manage costs and maximize performance
2. Investigate the potential Cloud Computing has to drive the development of next generation technologies for physical security and first responders
3. Evaluate what belongs in the Cloud and what does not
Speaker:
Laurence Russell, CPP - Vice President, Global Corporate Security, Salesforce.com
Eugene Smith, Boise (ID) Police Department

Quick Search

You can use the search box below to locate specific speakers or sessions.



View Options

View By Track

View By Day

View All

Follow ISC West







One Click to Ship!
ConferencePath System © 2004 - 2014 ConferencePath & MasseyMedia. All Rights Reserved.