Technology Recommendations for Incident Monitoring and Investigations in Retail
The Security Industry Association’s Public Safety Working Group and Retail Security Interest Group have collaborated to develop detailed information on recommended technologies supporting incident monitoring and investigations in the retail sector. Here you will find a list of security solutions aiming to improve security for retail owners and assist law enforcement in conducting investigations against petty…
Keep Reading »SIA Data Privacy Advisory Board to Meet at ISC East
Going to ISC East Nov. 14-15 in New York City? The Security Industry Association (SIA) invites you to join SIA’s Data Privacy Advisory Board for its meeting on Wednesday, Nov. 14, at 1:30 p.m. in Room 1A01 of the Javits Center. SIA’s Data Privacy Advisory Board provides information and best practices to help SIA members handle sensitive…
Keep Reading »Join SIA at Infosecurity North America
The Security Industry Association (SIA) is gearing up for ISC East 2018, held Nov. 14-15 at the Javits Center in New York City. ISC East is co-located with another conference, InfoSecurity North America. At this conference, Europe’s top information security event brings its brand of industry-leading dialogue to the United States for a two-day immersive…
Keep Reading »Going to ISC East? Don’t Miss Honors Night
Planning to attend ISC East Nov. 14-15 in New York City? Come join us for food, fun and entertainment at the 2018 SIA Honors Night. On the evening of Wednesday, Nov. 14, following day 1 of the conference, security industry luminaries will gather for drinks, networking and musical entertainment by Like Minds Trio; a gala…
Keep Reading »Meet SIA’s New Associate Director of Standards and Technology
Cameron Walker-Miller, the Security Industry Association’s (SIA’s) newest staff member, will lead industry projects that align security technologies with industry best practices, standards and guidelines. Cameron joins SIA from Columbia University, where he served as the assistant director of technology systems for the university’s Office of Public Safety for more than eight years. SIA: Tell…
Keep Reading »Environmental Monitoring for Increased RMR
Security dealers and integrators rely upon recurring monthly revenue (RMR) to grow their business. The obvious path to growth is to acquire more customers, but an equally valid approach is to upsell your base by increasing the number of monitored endpoints. This approach has led some to expand their residential security portfolios to include smart…
Keep Reading »New Member Profile: Traction Guest
New Security Industry Association (SIA) member Traction Guest is the developer of a leading cloud-based visitor management system (VMS) that creates an intuitive visitor sign-in experience that delivers top security for companies with multiple entry points. Traction Guest is used by global brands such as Netflix, DocuSign and VICE Media. The company is headquartered in…
Keep Reading »Lessons and Excitement From SNG 2018
SIA Chairman Scott Schafer shares his takeaways from SNG 2018 The 2018 Securing New Ground (SNG) conference was the best gathering of security industry executives this year. The top security drivers of business were engaged in important discussions about the near-term and long-term opportunities and challenges for 2019 and the future. The event started with…
Keep Reading »How the Security Industry Handles Cybersecurity
We asked you what steps you were taking to ensure the cybersecurity of your physical security systems. The results were eye opening. To better understand how the industry is approaching cybersecurity, we decided to ask the industry. What we wanted to know was what specific steps companies were taking to secure the systems they installed.…
Keep Reading »Recommendations for Initiating an Enterprise Cybersecurity Strategy
According to the Security Industry Association’s (SIA’s) Cybersecurity Advisory Board, there are five key steps to initiating an enterprise cybersecurity strategy. These recommendations can help you identify areas where more targeted research may be needed within your business and provide a starting point for developing a comprehensive cybersecurity strategy to mitigate cybersecurity risk. Decide who…
Keep Reading »