Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Expanding Relationships’ Potential

October 5, 2011
Ed and Lorna Chandler

Jennifer Birkholtz (left), SecurityXchange director, recognizes Ed Chandler, chairman of Security By Design Inc., and Lorna Chandler, chief executive officer of Security By Design Inc., for their long-time participation (nine years) in the SecurityXchange. Joining them is Matt Spencer (right), chief operating officer of VerticalXchange and founder of SecurityXchange.

SecurityXchange, held this year in Park City, Utah, has come a long way since it was founded shortly after 9/11. Every year, the event gathers integrators and manufacturers together for targeted meetings focused on relationships, both establishing new ones and building into existing relationships, as well as finding new technology solutions. This year, more than 325 scheduled meetings occurred during the event — in addition to the impromptu meetings over lunch, dinner and drinks.

As the event’s founder (and the chief operating officer of VerticalXchange, SecurityXchange’s parent company) Matt Spencer is very proud of the event’s growth.

“SecurityXchange started in the shadows of 9/11. Obviously security was top of mind for everybody at that time,” Spencer recalls. “VerticalXchange was a brand new company at the time, and it wasn’t the best time to be starting a new venture, but we waded in and chose security as our first vertical. Our first year we brought in 13 manufacturers and 16 integrators, so it was relatively humble beginnings, but the early feedback was very positive. The whole concept was to assist systems integrators and help them grow by providing a tool to help them increase their businesses and make them stronger.”

SecurityXchange is decidedly an event that does things its own way, discarding the frenzy found at large shows like ISC West and ASIS for the order and quiet of scheduled, targeted meetings located on a mountain resort during the calm of summer.

Brad Wilson, president of RFI Communications and Security Systems headquartered in San Jose, Ca., shared, “The whole underlying theme of this event is an optimization of time and resources that lets attendees migrate to an increasingly strategic position. When meeting with manufacturers here I can have conversations about where they are investing. They can give me indicators of their strategic road map so we can work better together moving forward,” Wilson said.

This year SecurityXchange expanded its relationship-building potential, inviting end users to the event for the first time in a new program called Client Partnership.

 According to SecurityXchange, the end user candidates are those that already actively get involved in technology decisions and want to have a direct dialogue with manufacturers to understand their options more clearly. The program is designed as an opportunity to provide another resource for attendees.

“We thought we would try to incorporate end users in our process. Incorporating them in an entirely separate Xchange seemed cumbersome, so we thought, let’s bring everyone together and have them all play nicely in the same sandbox, so to speak. So far we have been pleased with the results and hope to continue to do it and keep the concept moving forward,” Spencer shared.

Wilson said the new program added a useful dimension and only increases efficiency for attendees.

SecurityXchange networking

Attendees gather for cocktails, and networking, before one of the dinners at SecurityXchange held in Park City, Utah, August 7-10.

“The opportunity to have end users attend hits the target. Because many of the integrators here have large, complex projects, their end users are very active in the technology selection. When we bring along a client [end user] to a meeting with a manufacturer here, and the manufacturer participates in presenting the technology, that adds more value to the relationship we have with the manufacturer. We can discuss the technology right away with out client, show how it integrates and take a deeper role as more of a trusted adviser role. Plus, it makes it more efficient use of everyone’s time,” Wilson added.

This year at the event’s first dinner on Monday, Spencer and the SecurityXchange staff took time to recognize the people and companies that have participated long-term throughout the years, showcasing the relationships that have been built as a result of the event.

“We had humble beginnings and a lot of people have participated with us in our journey. Brad Wilson was the first person to sign a participation agreement. Long–term people like Ed and Lorna Chandler of Security by Design Inc. (pictured in photo), Matt Ladd of the Protection Bureau, and so many others have been involved from the beginning and integral for a long time. Manufacturers like HID Global and Altronix have participated in every event alongside additional long-time companies like Altronix, Ameristar Fence Products, ASSA ABLOY, Clinton and more. There are so many people to recognize. This year we presented long-time integrators and manufacturers with awards to recognize their long-time service and participation. That is the thing I think is cool about this industry; it really is a community. You get to know these people, and not just their businesses but their families, their interests and their passions.”

Focusing on the future, Spencer shared, “If you look down the road, I would like the event to be as vibrant and valuable as it possibly can be. We are never going to be a massive event like ISC West or ASIS, and we don’t want to be. Our intention is to remain a valuable resource where people at a very high level can get business done in a very effective way. — By Heather Klotz-Young, Senior Editor

KEYWORDS: recognition in the security industry relationship building event Security Events SecurityXchange

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Investing in Long-Term End User-Integrator Relationships

    See More
  • comm bank

    Balancing customer relationships and security

    See More
  • SEC0819-Career-Feat-slide1_900px

    Building Relationships to Advance Your Personal Brand

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing