Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Walking the ASIS Floor

October 1, 2004
Convergence – a trend identified during a walkthrough on the floor of last month’s ASIS exposition – plays out in numerous ways. One is how the line blurs between private security and public safety. Pictured: security using the IR/Thermal Telescopic Camera from Instrument Technology of Westfield, Mass. The inset shows an actual thermal image. The system can locate persons in total darkness
I can describe three trends in just six words: higher visibility, more openness and convergence. Presidents and chief executive officers of the most influential businesses better know their security operation, its return on investment and the real need to have professional security using appropriate technology.

One indication talked about on the ASIS exhibit floor – the Washington, D.C.-based Business Roundtable’s deep and growing commitment to security with the naming of Frederick W. Smith, chairman, president and CEO of FedEx Corp. as chairman of the Roundtable’s Security Task Force.

"Companies are better prepared for a terrorist attack today than ever before because CEOs have stepped up to this challenge and made security a top priority in the three years since 9/11," Smith said. "But improving homeland security is an unending journey, and our members remain committed to strengthening both physical and cyber security to protect our employees, customers and facilities."

The Security Task Force addresses ways that the private and public sectors partner to improve security. It’s created a Crisis Communications Toolkit that offers best practices for communicating with employees, customers and neighbors during a crisis; has issued a white paper – Terrorism: Real threats. Real costs. Joint Solutions. – that promotes a collaborative approach to security regulation; and is developing a risk assessment toolkit.

Business Roundtable (http://www.businessround-table.org) is an association of chief executive officers of leading corporations with a combined workforce of more than 10 million employees in the United States and $4 trillion in annual revenues.

Openness was another trend playing out at ASIS, although there continues to be debates about what it really means. Some exhibitors believe interoperability is a more appropriate goal.

It’s a view shared by the Open Security Exchange (OSE) of Piscataway, N.J. It’s a cross-industry forum dedicated to delivering best practices guidelines in the area of security management and vendor-neutral interoperability specifications for physical and cyber security systems.

The organization has already issued the first of its kind technical specifications for the convergence of physical and cyber security systems, named PHYSBITS. As a result of this effort, the Exchange has actively participated in the launch of the standards committee of the Security Industry Association for data modeling. In addition, the Open Security Exchange has issued a technical white paper designed to help organizations with the adoption and issuance of strong credentials for their physical and IT systems. Check the Web site http://www.opensecurityexchange.org/resources.html.

Convergence continues to be a hot topic, especially to those end users seeing physical and logical security come together. An important event early next year is the Corporate Security Roundtable. Check details in this month’s Industry Events column.

Another way that convergence was measured on the ASIS exhibit floor was how technologies and equipment are blurring the line between private security and public safety.

For example, a number of firms now are marketing tactical surveillance to corporate security even though they were originally developed or aimed at law enforcement and military. A case in point: infrared and thermal camera systems so that security officers can look under vehicles and through walls and shells. Also at ASIS: detection systems from firms as diverse as L-3 Communications and GE Infrastructure Security and originally developed for airports; they are now being marketing for corporate and building entrances and mailrooms.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Blog Logo

    Walking the Show Floor: Cloud, Partnerships and Sci-Fi Security

    See More
  • Blog Logo

    From the Show Floor: Future, Present ASIS Presidents Discuss Upcoming Trends

    See More
  • Blog Logo

    From the Show Floor: The Day-by-Day Rundown

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing