Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Fall ASIS Seminar - Preview Some Speakers

May 30, 2008

Zalud’s Blog got some advance information on ASIS International educational offerings. Check out www.asisonline.org for updates.

 

How Screenings, Checks and Investigations Differ

How do screenings, checks and investigations differ? What are the options? This panel session includes pre-employment screening professionals who represent wholesalers, retailers and end users of screening products. The panel compares and contrasts the differences in products available through traditional methods with Internet options. How do employment and privacy laws differ among these options? What are the quality differences in the options available to you? How do you select among alternatives and set the investigation level while managing organizational liabilities? The Occupational Health and Safety Administration requirement of “due diligence” for a safe workplace, versus the pressure of opting for a CYA approach, also is discussed.

Tim Best, President and Chief Executive Officer, PreScreen America, Inc.

Patti McGowan, Vice President, Personnel Data Research LLP

 

Campus Strategic Security Initiatives Emphasizing Early Warning, Early Notification, and Layered Communication Systems

The Virginia Tech killings, Las Vegas school bus shootings, bomb threats and other events have prompted many schools and institutions to procure Early Warning, Early Notification, Emergency Cell Phone and other notification systems to respond to crisis situations. At the same time they must assure parents and students that their campuses are safe. This presentation offers solutions to the communications issues and gives a clear perspective of the differences between products that operate individually and those that operate as a layered and integrated solution using a single step to initiate response protocols.

Robert Lang, CPP, M.S., Assistant Vice President-Strategic Security and Safety, Kennesaw State University

 

Homeland Security Degree Programs: This Isn't Your Traditional College Education

Everything about the security industry has changed since Sept. 11, 2001: The way we approach our jobs as security leaders and experts. The way we prepare, train and educate our employees on safety and security precautions. The way we hire and staff our security departments. The way terrorists plan attacks on United States soil. The way we educate our future security leaders. This presentation explores the key issues surrounding the new homeland security degree programs that are being offered in colleges and universities across America. Just how good are they, and what can we expect from their graduates?

Jeffrey P. Grossmann, Esq., Assistant Professor and Director, Homeland and Corporate Security Program, St. John's University

 

Security's Role in the Emerging Enterprise Risk Model

The convergence of information security and traditional security?along with a holistic approach to enterprise risk management?creates new opportunities and challenges for those responsible for managing all risks, including security. Security risk management is evolving, and value is migrating from physical assets to information-based assets, due to advances in technology and organizational pressures created by regulatory issues. This session examines top convergence issues and focuses on how this evolution affects enterprise risk models. Hear experts on the panel debate and discuss the research driving important decisions about the enterprise risk model.

Tim Williams, CPP, Director, Global Security, Caterpillar

Ray O'Hara, CPP, Senior Vice-President, Vance-Garda

 

ASIS Standards and Guidelines Update

 

ASIS has launched an ambitious program in international, regional and national standards development. Over the past year, ASIS has established itself as a liaison with various committees in ISO (International Organization for Standardization) and CEN (European Committee for Standardization), playing a leading role in the development of international standards, as well developing national standards in Australia, the Netherlands and the United States. In addition, ASIS International continues to develop guidelines of best practices for security professionals. Recognizing the need for training to meet the changing world of standards, the Commission also is launching training programs in standards implementation and auditing. This session provides an overview of the exciting new developments in ASIS International Standards and Guidelines and highlights ways for you to get involved.

F. Mark Geraci, CPP, Chair, Standards and Guidelines Commission

Marc Siegel, Ph.D., Security Management System Consultant, ASIS International

 Susan Carioti, Assistant Director of Education, Standards and Guidelines, ASIS International

Roger D. Warwick, CPP, Pyramid International, Managing Director, Italy

 

What’s New on the Floor

You have to contend with more than 2,000 booths to find products and applications of interest. Use your time efficiently by learning where new and innovative products can be found on the exhibit floor. This subject had been presented for the last 11 years by Roy Bordes and is one of the most popular presentations! This year, Howard Moster, CPP and Ronald Lander, CPP take the challenge to continue the tradition and expand the focus to include physical and information technology security.

 

Executive Protection: Global Challenges in Protecting High-Level Individuals

This session presents the most current information and strategies available in the ever-changing worlds of terrorism and crime. Whether you are managing the personal protection of an executive or working as an executive protection specialist, this program explores issues that will ultimately affect the protection of the leading asset of your corporation. By examining real case scenarios, we discuss and identify critical flaws in the protection methods that were employed. We also build upon best practices that are utilized by professional executive protection programs.

Robert L. Oatman, CPP, President, Rloatman & Associates, Inc.

 

Animal Rights Extremism Comes of Age

Animal rights movements have borrowed from, and contributed to, the learning processes of extremism in general. Opening with a typical animal rights extremist demonstration in the United Kingdom, we briefly review the movement's history. We then discuss some of the most recent and successful European and U.S. campaigns, and suggest the reasons these movements have achieved global penetration and more consistent success than was seen in the past. Those affected, the differing risks they face, and how this approach is being exported both internationally and to other campaigns are highlighted.

Michael Barbour, Group Director, Security, Huntingdon Life Sciences Ltd.

Guy Mathias, Associate Director, United Kingdom Security, HLS Ltd.

 

Transforming the U.S. Government Security Clearance Process

The federal government needs a qualified, trusted workforce to successfully execute its missions. However, longstanding practices used in processing security clearances pose challenges to the speed with which individuals can begin their work or move from one role to another. This session provides an overview of the full-scale efforts underway to transform the security clearance process. Leaders from the U.S. Department of Defense and the Office of the Director of National Intelligence provide an update on the process, policy, and information technology modifications in progress to enable meaningful change.

John P. Fitzpatrick, Director, Special Security Center, Office of the Director of National Intelligence

Elizabeth McGrath, Principal Deputy, Under Secretary of Defense for Business Transformation, Office of the Director of National Intelligence

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!