Information Technology
Historically, physical security systems and information technology systems dwelt in different silos. Chief security officers and chief information officers ran their respective domains without input from the other. But rapid adoption of IP-based security devices spurred the convergence of physical and information security, bringing the two spheres together. SIA is dedicated to managing disciplines within this convergence.
Tackling the Complexities of the Connected World
Enterprise security must be a team effort Cybersecurity trends and risks are top of mind for nearly every business leader today, and these executives are turning to security professionals within their organizations to keep pace with IT security risks while also helping secure people, critical data and physical assets. As the world becomes more connected,…
Keep Reading »Don’t Be the Weakest Link
Security, IT Departments Must Work Together to Reduce Vulnerabilities The physical security industry has generally not received a lot of attention when it comes to cybersecurity issues, breaches and threats to data. However, with the shift from analog to IP devices, and with a more converged network of devices, many organizations have found themselves face-to-face…
Keep Reading »A CEO’s Guide to Cybersecurity
Identifying and addressing vulnerabilities must be a priority Cybersecurity responds to leadership priorities just as finances and human resources do. Computers and networks come with flaws and vulnerabilities, as with all other aspects of a business, and these vulnerabilities enable hackers to achieve their goals. The CEO mitigates risk, regardless of domain, by exhibiting leadership…
Keep Reading »Becoming Predictive, Rather than Reactive
A holistic view of physical and logical identities can help to identify insider threats Current events have raised awareness of digital threats worldwide, bringing cybersecurity to the forefront of our global consciousness. It seems that hardly a day goes by without news of an attack and precious digital assets such as personal and financial data…
Keep Reading »SIA Announces Cybersecurity Advisory Board in Conjunction with National Cybersecurity Awareness Month
The empanelment of the SIA Cybersecurity Advisory Board follows last month’s introduction of the Connected Security Expo @ ISC West by ISC Events. Silver Spring, Md. — To enhance its cybersecurity posture going forward from National Cybersecurity Awareness Month, the Security Industry Association (SIA) today announced the empaneling of the SIA Cybersecurity Advisory Board. The…
Keep Reading »All Security Is Cybersecurity
At the most recent ASIS Annual Seminar in September, I spoke on two different panels about the rise of the Internet of Things (IoT) and its likely impacts on commercial security. In both cases, the conversation started off describing all the amazing new capabilities that these billions of tiny new sensors and controllers would bring.…
Keep Reading »New Symbols Add More Security to Architectural Designs
AG-01 V.3.0 addresses some of the industry’s latest technologies, including IP cameras, advanced intrusion sensors, Power over Ethernet and biometric devices, among others. SILVER SPRING, Md. — The Security Industry Association (SIA), along with the International Association of Professional Security Consultants (IAPSC), today released AG-01 Architectural Graphics Standard–CAD Symbols for Security System Layout Standard 3.0.…
Keep Reading »Creating the Workforce of Tomorrow
The Security Industry Association (SIA) has teamed up with Mercer County Community College in New Jersey to bring you a new degree program that prepares students for jobs that support the selling, installation, management and technical support of physical security systems technologies in an IP-based networked environment. The Associate in Applied Science Degree in Security…
Keep Reading »The Public Safety Data Lake
Making the right decisions regarding storage and other issues can vastly increase the value of video surveillance For years, surveillance has largely been deployed either as a closed system or on an appliance. The reasons are understandable: Most customers, companies and partners come from the CCTV days where every system was closed, and that is…
Keep Reading »Transforming Data into Actionable Intelligence
New solutions can identify insider threats before it is too late Ajay Jain, Quantum Secure In every industry, data drives decisions. This might be as simple as an organization reviewing financials to determine whether an expansion is feasible, or it could come in the form of more complex analysis, such as examining a pool of…
Keep Reading »