Information Technology

Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.

data privacy
, , ,

#DataDoneRight: Highlights From the U.S. Chamber of Commerce’s Data Privacy Conference

On July 11 in Washington, D.C., the U.S. Chamber of Commerce hosted Data Done Right, a summit for all things related to data privacy. The conference featured discussions of the policy issues surrounding consumer data and the businesses that use it, the future of tech innovation and ways to protect individual privacy while promoting innovation…

Keep Reading »
Jimmie Lee
, ,

Featured Session at Cyber:Secured Forum: Technologies Transforming Cyber-Physical Security

Cyber:Secured Forum is coming soon! ISC Security Events, PSA Security Network and the Security Industry Association (SIA) have come together to create an educational two-day event connecting the worlds of cybersecurity, physical security and systems integration. This second annual cybersecurity educational summit will take place July 29-31 at the Westin Dallas Park Central in Dallas,…

Keep Reading »
Tony Reinert
, , ,

Featured Session at Cyber:Secured Forum: View From the CISO’s Office

Cyber:Secured Forum is coming soon! ISC Security Events, PSA Security Network and the Security Industry Association (SIA) have come together to create an educational two-day event connecting the worlds of cybersecurity, physical security and systems integration. This second annual cybersecurity educational summit will take place July 29-31 at the Westin Dallas Park Central in Dallas,…

Keep Reading »
Cyber:Secured Forum
, , ,

Your Session Road Map for Cyber:Secured Forum

, ,

Cyber:Secured Forum (July 29-31 in Dallas, Texas) is quickly approaching! This second annual cybersecurity educational summit will help your company: MINIMIZE the risk of cyberattacks on your integrated systems MAXIMIZE protection of your organization and clients MONETIZE cybersecurity by turning risk into business opportunities A day and a half of engaging general sessions for the…

Keep Reading »
cloud computing
, ,

Security Megatrend: Cloud Computing

Cloud computing platforms and applications are proliferating across enterprises today, serving as the IT infrastructure driving new digital businesses. The cloud is an enabling technology for security integrators, who can provide managed services and the cost and labor advantages of off-site servers to their customers. In the Security Industry Association’s 2019 Megatrends report, showcasing the major…

Keep Reading »
Mitigating Risks From A to Z-Wave
, ,

Mitigating Risks From A to Z-Wave

A wireless standard delivers interoperability but could create vulnerability Zigbee and Z-Wave are wireless standards that enable home and building automation devices to communicate with each other without using Wi-Fi or Bluetooth. Z-Wave is lower power than Wi-Fi and has a longer range than Bluetooth. This article will examine the complexities and vulnerabilities introduced by…

Keep Reading »
Back to Top