Information Technology

Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
#DataDoneRight: Highlights From the U.S. Chamber of Commerce’s Data Privacy Conference
On July 11 in Washington, D.C., the U.S. Chamber of Commerce hosted Data Done Right, a summit for all things related to data privacy. The conference featured discussions of the policy issues surrounding consumer data and the businesses that use it, the future of tech innovation and ways to protect individual privacy while promoting innovation…
Keep Reading »Challenges and Recommendations for Connected Physical Security Products
Physical security products have transformed into always-connected devices. The trend towards connectivity and collaboration will only continue to increase. This report discusses the threats – both old and new – faced by today’s connected physical security products.
Keep Reading »Featured Session at Cyber:Secured Forum: Technologies Transforming Cyber-Physical Security
Cyber:Secured Forum is coming soon! ISC Security Events, PSA Security Network and the Security Industry Association (SIA) have come together to create an educational two-day event connecting the worlds of cybersecurity, physical security and systems integration. This second annual cybersecurity educational summit will take place July 29-31 at the Westin Dallas Park Central in Dallas,…
Keep Reading »Featured Session at Cyber:Secured Forum: View From the CISO’s Office
Cyber:Secured Forum is coming soon! ISC Security Events, PSA Security Network and the Security Industry Association (SIA) have come together to create an educational two-day event connecting the worlds of cybersecurity, physical security and systems integration. This second annual cybersecurity educational summit will take place July 29-31 at the Westin Dallas Park Central in Dallas,…
Keep Reading »Webinar: What the Intersection of New Technology, Cybersecurity and Privacy Means to You
Your Session Road Map for Cyber:Secured Forum
Cyber:Secured Forum (July 29-31 in Dallas, Texas) is quickly approaching! This second annual cybersecurity educational summit will help your company: MINIMIZE the risk of cyberattacks on your integrated systems MAXIMIZE protection of your organization and clients MONETIZE cybersecurity by turning risk into business opportunities A day and a half of engaging general sessions for the…
Keep Reading »Security Megatrend: Cloud Computing
Cloud computing platforms and applications are proliferating across enterprises today, serving as the IT infrastructure driving new digital businesses. The cloud is an enabling technology for security integrators, who can provide managed services and the cost and labor advantages of off-site servers to their customers. In the Security Industry Association’s 2019 Megatrends report, showcasing the major…
Keep Reading »Online and Under Attack
Cybersecurity must be built in to protect connected security products The December 2018 McAfee Labs Threat Report identified 45,000 new Internet of Things (IoT) malware variants in the third quarter of 2018. The number of attacks will continue to increase as more products are “IoT-enabled,” opening new communication pathways but also exposing vulnerabilities. Yet Gartner’s…
Keep Reading »Mitigating Risks From A to Z-Wave
A wireless standard delivers interoperability but could create vulnerability Zigbee and Z-Wave are wireless standards that enable home and building automation devices to communicate with each other without using Wi-Fi or Bluetooth. Z-Wave is lower power than Wi-Fi and has a longer range than Bluetooth. This article will examine the complexities and vulnerabilities introduced by…
Keep Reading »The More You Know: How New Technologies Can Improve Information Sharing & Efficiency
One of the biggest headaches for a security practitioner typically is finding the most up-to-date version of an organization’s security system floor plan or “as-built drawing.” Is it in an old PDF on a computer used by someone who has since left? Is it in the file cabinet gathering dust? Is there a system of…
Keep Reading »