Information Technology
Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
General Data Protection Regulation Fact Sheet 2: Operational Privacy
This resource, as part of SIA’s GDPR guidance, shares an overview of operational privacy for security services, key GDPR terms and helpful resources.
Keep Reading »General Data Protection Regulation Fact Sheet 1
The Security Industry Association shares General Data Protection Regulation (GDPR) guidelines, questions and answers and resources for security companies.
Keep Reading »Securing Banks in a Digital World
How Technology and Risk Are Changing the Banking Market The banking environment faces a multitude of risks, which are evolving and changing daily. Fraud, at the top of the list, leads to significant losses if not controlled, and today more than ever, banks are laser-focused on minimizing fraud attempts and must adopt a proactive approach…
Keep Reading »Leveling Up in Cybersecurity
Why Cybersecurity Is More Important Than Ever for Security Systems Integrators The 2018 Foreign Economic Espionage in Cyberspace report, issued by the National Counterintelligence and Security Center, makes it clear that economic and industrial espionage against the United States continues to be a serious threat. The report names China, Russia and Iran as the top…
Keep Reading »Implementing Cybersecurity Best Practices in Five Steps
Concerned about the cyber risks of security equipment? Cover your bases with these practical recommendations. The rapid gains that technology has made into everyday living have also changed how the security industry operates. In short, physical security has moved from being very simple inputs and outputs to encompassing always-connected devices, which makes the security industry…
Keep Reading »Why the C-Suite Must End Security Convergence Turf Wars
Historically, physical security has been tasked with safeguarding tangible corporate assets, such as personnel, hard copy documents, equipment and the building itself, whereas logical security efforts focus on protecting the corporation by granting or denying access and defending the network against malicious attacks. In most organizations, physical access systems and logical access systems have operated…
Keep Reading »Blockchain: Implications for the Security Professional
We are at peak hype on blockchain, one of the most searched terms on Google. All CEOs and technologists, along with many Uber drivers in New York City, seem to be talking about it. Blockchain is the generic term for the technology behind bitcoin and other cryptocurrencies. In a nutshell, the blockchain is a real-time…
Keep Reading »Intelligent Building Management Systems Report on Building Automation and Control Systems
Co-presented by the ASIS Foundation, BOMA International (BOMA) and the Security Industry Association (SIA), these report and research materials provide groundbreaking, first-of-its-kind guidance for practitioners in the security and building management fields. Intelligent Building Management Systems: Guidance for Protecting Organizations provides a framework to help decision-makers assign a risk-based criticality or impact to their building and asks relevant security questions to develop appropriate mitigation strategies. It also serves to establish a common language between the many intelligent building stakeholders.
Keep Reading »