Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Expanding Relationships’ Potential

Ed and Lorna Chandler
October 5, 2011
Ed and Lorna Chandler

Jennifer Birkholtz (left), SecurityXchange director, recognizes Ed Chandler, chairman of Security By Design Inc., and Lorna Chandler, chief executive officer of Security By Design Inc., for their long-time participation (nine years) in the SecurityXchange. Joining them is Matt Spencer (right), chief operating officer of VerticalXchange and founder of SecurityXchange.

SecurityXchange, held this year in Park City, Utah, has come a long way since it was founded shortly after 9/11. Every year, the event gathers integrators and manufacturers together for targeted meetings focused on relationships, both establishing new ones and building into existing relationships, as well as finding new technology solutions. This year, more than 325 scheduled meetings occurred during the event — in addition to the impromptu meetings over lunch, dinner and drinks.

As the event’s founder (and the chief operating officer of VerticalXchange, SecurityXchange’s parent company) Matt Spencer is very proud of the event’s growth.

“SecurityXchange started in the shadows of 9/11. Obviously security was top of mind for everybody at that time,” Spencer recalls. “VerticalXchange was a brand new company at the time, and it wasn’t the best time to be starting a new venture, but we waded in and chose security as our first vertical. Our first year we brought in 13 manufacturers and 16 integrators, so it was relatively humble beginnings, but the early feedback was very positive. The whole concept was to assist systems integrators and help them grow by providing a tool to help them increase their businesses and make them stronger.”

SecurityXchange is decidedly an event that does things its own way, discarding the frenzy found at large shows like ISC West and ASIS for the order and quiet of scheduled, targeted meetings located on a mountain resort during the calm of summer.

Brad Wilson, president of RFI Communications and Security Systems headquartered in San Jose, Ca., shared, “The whole underlying theme of this event is an optimization of time and resources that lets attendees migrate to an increasingly strategic position. When meeting with manufacturers here I can have conversations about where they are investing. They can give me indicators of their strategic road map so we can work better together moving forward,” Wilson said.

This year SecurityXchange expanded its relationship-building potential, inviting end users to the event for the first time in a new program called Client Partnership.

 According to SecurityXchange, the end user candidates are those that already actively get involved in technology decisions and want to have a direct dialogue with manufacturers to understand their options more clearly. The program is designed as an opportunity to provide another resource for attendees.

“We thought we would try to incorporate end users in our process. Incorporating them in an entirely separate Xchange seemed cumbersome, so we thought, let’s bring everyone together and have them all play nicely in the same sandbox, so to speak. So far we have been pleased with the results and hope to continue to do it and keep the concept moving forward,” Spencer shared.

Wilson said the new program added a useful dimension and only increases efficiency for attendees.

SecurityXchange networking

Attendees gather for cocktails, and networking, before one of the dinners at SecurityXchange held in Park City, Utah, August 7-10.

“The opportunity to have end users attend hits the target. Because many of the integrators here have large, complex projects, their end users are very active in the technology selection. When we bring along a client [end user] to a meeting with a manufacturer here, and the manufacturer participates in presenting the technology, that adds more value to the relationship we have with the manufacturer. We can discuss the technology right away with out client, show how it integrates and take a deeper role as more of a trusted adviser role. Plus, it makes it more efficient use of everyone’s time,” Wilson added.

This year at the event’s first dinner on Monday, Spencer and the SecurityXchange staff took time to recognize the people and companies that have participated long-term throughout the years, showcasing the relationships that have been built as a result of the event.

“We had humble beginnings and a lot of people have participated with us in our journey. Brad Wilson was the first person to sign a participation agreement. Long–term people like Ed and Lorna Chandler of Security by Design Inc. (pictured in photo), Matt Ladd of the Protection Bureau, and so many others have been involved from the beginning and integral for a long time. Manufacturers like HID Global and Altronix have participated in every event alongside additional long-time companies like Altronix, Ameristar Fence Products, ASSA ABLOY, Clinton and more. There are so many people to recognize. This year we presented long-time integrators and manufacturers with awards to recognize their long-time service and participation. That is the thing I think is cool about this industry; it really is a community. You get to know these people, and not just their businesses but their families, their interests and their passions.”

Focusing on the future, Spencer shared, “If you look down the road, I would like the event to be as vibrant and valuable as it possibly can be. We are never going to be a massive event like ISC West or ASIS, and we don’t want to be. Our intention is to remain a valuable resource where people at a very high level can get business done in a very effective way. — By Heather Klotz-Young, Senior Editor

KEYWORDS: recognition in the security industry relationship building event Security Events SecurityXchange

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 9_25-investing

    Investing in Long-Term End User-Integrator Relationships

    See More
  • comm bank

    Balancing customer relationships and security

    See More
  • SEC0819-Career-Feat-slide1_900px

    Building Relationships to Advance Your Personal Brand

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!