Security Newswire / Security Education & Training

Next-Generation Security Training Planned for ISC West 2013


Next Generation Securityis not just the focus of the Security Industry Association’s (SIA) ISC West 2013 educational program; it’s the means by which leading security professionals create enterprise-wide value through security. Today’s security experts understand the complex interdependencies between security and business performance and protection, as well as the need to deliver measurable value to bottom-line business results.

Increasingly, next generation security products and technologies are providing intelligence to help businesses make tough, data-based decisions across the enterprise, such as where to invest, how to increase profitability and sales, and how to optimize resources. From the use of big data analytics to manage huge volumes of data to get ahead of problems, opportunities and competitors, to the leveraging of intelligent video to analyze and respond to events in real-time, enterprises are using previously hidden business intelligence to make solid decisions, ensure compliance across various systems, and provide critical dashboard information across business units.  

At ISC West 2013, scheduled for April 9-12, the SIA Education@ISC program and the SIA New Product Showcase (NPS) explore the emerging technologies and products that are changing the landscape of modern security. Through the conference, participants learn what it takes to turn data from access control systems, video and social media into actionable intelligence and apply it across various markets, including critical infrastructure, education and healthcare. Two “Next Generation Security” tracks feature sessions such as Smart Buildings, Towns and Cities: Physical and Cyber Technologies and Case Studies; Intelligent Video Round-Up; and Turning Access Control Data Into Security Intelligence.

Conference planners restructured the 2013 educational program to provide attendees practical information on how to unify current and future infrastructure technologies and added “Learning Labs” to help them gain hands-on experience while onsite. Further, the conference schedule has been shifted – Each day, the program starts and ends earlier than usual to give attendees more time to explore the show floor without sacrificing learning opportunities.  

Through the SIA New Product Showcase, ISC attendees get the first look at the products and technologies that are revolutionizing the security industry. In addition to awarding the Best New Product and Judges’ Choice awards, this year NPS added a spotlight on Emerging Technologies. This new component, which will be judged separately from other entries, highlights exciting technologies that are not yet ready for market – the solutions that may well be next year’s Best New Product.

Aligning security with C-suite expectations to meet strategic enterprise goals is what today’s security is all about. Join us at ISC West to ensure you are prepared to meet the challenge.

For more information, contact Arminda Valles-Hall at, 301.804.4707.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Arminda Valles-Hall

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.