Information Technology

Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
Get Involved in SIA’s Cybersecurity Initiatives This National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month. The National Cyber Security Alliance has recognized this month every year since 2003 to bring awareness to the challenges of cybersecurity and to ensure that every individual stays safe and secure online. This year, specific themes for the month include understanding cybersecurity in the connected home, educating for a…
Keep Reading »Securing New Ground Panel to Highlight Shift From Smart Cities to Conscious Cities
It’s almost time for Securing New Ground (SNG), the annual executive conference hosted by the Security Industry Association (SIA), and we’re looking forward to an exciting lineup of discussions on the security business trends that matter most. In one of the event’s featured discussions – The Smart City of the Future Will Be Conscious – a…
Keep Reading »SIA Technology Insights – Fall 2018
In every issue of SIA Technology Insights, we try to look to the cutting edge (and sometimes even to the bleeding edge) of security technology, to ensure you stay current with the steady whir of technology change. In that spirit, we start this issue off with two technologies – social media and facial recognition – that are seeing great adoption in the consumer space and poised to be adopted for security and safety applications.
Keep Reading »Ethical Hacker to Address Securing Physical Security’s Future at Securing New Ground
The Security Industry Association (SIA) is gearing up for its annual executive conference, Securing New Ground (SNG), and we’re looking forward to an exciting lineup of discussions on the security business trends that matter most. One of this year’s keynote speakers – Valerie Thomas, executive information security consultant for Securicon – will forecast how the security of your systems…
Keep Reading »General Data Protection Regulation Fact Sheet 2: Operational Privacy
This resource, as part of SIA’s GDPR guidance, shares an overview of operational privacy for security services, key GDPR terms and helpful resources.
Keep Reading »General Data Protection Regulation Fact Sheet 1
The Security Industry Association shares General Data Protection Regulation (GDPR) guidelines, questions and answers and resources for security companies.
Keep Reading »Securing Banks in a Digital World
How Technology and Risk Are Changing the Banking Market The banking environment faces a multitude of risks, which are evolving and changing daily. Fraud, at the top of the list, leads to significant losses if not controlled, and today more than ever, banks are laser-focused on minimizing fraud attempts and must adopt a proactive approach…
Keep Reading »Leveling Up in Cybersecurity
Why Cybersecurity Is More Important Than Ever for Security Systems Integrators The 2018 Foreign Economic Espionage in Cyberspace report, issued by the National Counterintelligence and Security Center, makes it clear that economic and industrial espionage against the United States continues to be a serious threat. The report names China, Russia and Iran as the top…
Keep Reading »Implementing Cybersecurity Best Practices in Five Steps
Concerned about the cyber risks of security equipment? Cover your bases with these practical recommendations. The rapid gains that technology has made into everyday living have also changed how the security industry operates. In short, physical security has moved from being very simple inputs and outputs to encompassing always-connected devices, which makes the security industry…
Keep Reading »Why the C-Suite Must End Security Convergence Turf Wars
Historically, physical security has been tasked with safeguarding tangible corporate assets, such as personnel, hard copy documents, equipment and the building itself, whereas logical security efforts focus on protecting the corporation by granting or denying access and defending the network against malicious attacks. In most organizations, physical access systems and logical access systems have operated…
Keep Reading »