Information Technology
Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
VMware’s Philip Jang to Keynote Risk + Exposure Cybersecurity Event
Join SIA this Thursday, Nov. 12, for part two of the Risk + Exposure webinar series, Discussions with the SIA Cybersecurity Advisory Board. Hear from keynote speaker, Philip J. Jang, senior manager physical security systems & technology of VMware. Jang will discuss how physical security can take ownership of their IoT universe by leveraging proven…
Keep Reading »Security Sales Microlearning Series
SIA has created a microlearning series including five mini-webinars designed to enhance SIA member knowledge on key security sales concepts.
Keep Reading »SIA Principles for the Responsible and Effective Use of Facial Recognition Technology
This document explores SIA’s values and the benefits of facial recognition, outlines each of SIA’s core principles regarding the responsible and effective use of facial recognition technology and makes recommendations for public- and private-sector applications of the technology, including use of facial recognition by law enforcement.
Keep Reading »Security Convergence & the Top IoT Security Threats
This month, the website IoT Evolution noted that Internet of Things (IoT) systems are “one of the most challenging areas to secure” in its examination of the most recent list of top 10 IoT security threats as compiled by the Open Web Application Security Project. While, at first glance, the threats listed may not lead…
Keep Reading »Cybersecurity by the Numbers – Maturity Metrics of Successful Security Organizations
Get a clear framework and interactive self-assessment to help you score the maturity of your organization’s cybersecurity initiatives quickly and accurately.
Keep Reading »COVID-19 Raises Many Privacy Questions
The COVID-19 pandemic has unfortunately brought about an explosion of cyber scams, with bad actors preying on fear, uncertainty and doubt. But it’s also raising some big challenges regarding data privacy because of both the escalated cyber threat and the direct effects of the outbreak itself. The International Association of Privacy Professionals (IAPP) recently held…
Keep Reading »Minimize Risk by Protecting Privacy: A Primer
SIA has provided a primer on privacy basics. While not comprehensive, these suggestions will help you begin the process of protecting privacy in your organization.
Keep Reading »Ensuring Connectivity to Enhance Security
I recently conducted an interview with security industry veteran Michael Kemp about connectivity issues for the Security Industry Association (SIA). Many people may be familiar with initiatives, such as FirstNet, which bring public safety systems into the Internet of Things through a single wireless broadband connection. Still, they may not understand the other wireless options…
Keep Reading »Unlimited Access: How Cloud and Open-Source Solutions Allow for Greater Access Control Scalability & Efficiency
Jumping into the world of entrepreneurship is not for the faint of heart. In addition to managing finances, hiring competent employees and creating a sustainable business plan, there are many other important considerations to be aware of, such as ensuring the comprehensive protection of the people and assets inside a facility. Entrepreneurs are responsible for…
Keep Reading »Who Am I, and Why Am I Here in this Database? Addressing Privacy Concerns With Security Technology
The definition of personal data, also known as personally identifiable information (PII), has expanded in recent years. Previously, personal data typically referred only to the most sensitive information, such as name, address, Social Security number, health records and date of birth. Today, it has expanded to include things like location data, IP address, MAC address,…
Keep Reading »