Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.

, , ,

Get Involved in SIA’s Cybersecurity Initiatives This National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month. The National Cyber Security Alliance has recognized this month every year since 2003 to bring awareness to the challenges of cybersecurity and to ensure that every individual stays safe and secure online. This year, specific themes for the month include understanding cybersecurity in the connected home, educating for a…

Keep Reading »
, , , , , , , ,

Securing New Ground Panel to Highlight Shift From Smart Cities to Conscious Cities

,

It’s almost time for Securing New Ground (SNG), the annual executive conference  hosted by the Security Industry Association (SIA), and we’re looking forward to an exciting lineup of discussions on the security business trends that matter most. In one of the event’s featured discussions – The Smart City of the Future Will Be Conscious – a…

Keep Reading »
SIA Technology Insights STI Fall 2018
, , , , , , , , , ,

SIA Technology Insights – Fall 2018

In every issue of SIA Technology Insights, we try to look to the cutting edge (and sometimes even to the bleeding edge) of security technology, to ensure you stay current with the steady whir of technology change. In that spirit, we start this issue off with two technologies – social media and facial recognition – that are seeing great adoption in the consumer space and poised to be adopted for security and safety applications.

Keep Reading »
Valerie Thomas SNG 2018
, , ,

Ethical Hacker to Address Securing Physical Security’s Future at Securing New Ground

,

The Security Industry Association (SIA) is gearing up for its annual executive conference, Securing New Ground (SNG), and we’re looking forward to an exciting lineup of discussions on the security business trends that matter most. One of this year’s keynote speakers – Valerie Thomas, executive information security consultant for Securicon – will forecast how the security of your systems…

Keep Reading »
securing banks
, , , ,

Securing Banks in a Digital World

How Technology and Risk Are Changing the Banking Market The banking environment faces a multitude of risks, which are evolving and changing daily. Fraud, at the top of the list, leads to significant losses if not controlled, and today more than ever, banks are laser-focused on minimizing fraud attempts and must adopt a proactive approach…

Keep Reading »
leveling up cybersecurity
, , , ,

Leveling Up in Cybersecurity

Why Cybersecurity Is More Important Than Ever for Security Systems Integrators The 2018 Foreign Economic Espionage in Cyberspace report, issued by the National Counterintelligence and Security Center, makes it clear that economic and industrial espionage against the United States continues to be a serious threat. The report names China, Russia and Iran as the top…

Keep Reading »
cybersecurity best practices
, , , ,

Implementing Cybersecurity Best Practices in Five Steps

Concerned about the cyber risks of security equipment? Cover your bases with these practical recommendations. The rapid gains that technology has made into everyday living have also changed how the security industry operates. In short, physical security has moved from being very simple inputs and outputs to encompassing always-connected devices, which makes the security industry…

Keep Reading »
Convergence
, ,

Why the C-Suite Must End Security Convergence Turf Wars

Historically, physical security has been tasked with safeguarding tangible corporate assets, such as personnel, hard copy documents, equipment and the building itself, whereas logical security efforts focus on protecting the corporation by granting or denying access and defending the network against malicious attacks. In most organizations, physical access systems and logical access systems have operated…

Keep Reading »