Destination Security L “ adies and gentlemen, welcome to Dallas. Welcome to the ASIS International 56th Annual Seminar and Exhibits, celebrating 55 years of ASIS history,” said ASIS President Joseph R. Granger, CPP, as he kicked off the event at Tuesday morning’s opening session. Just before Granger arrived on stage, crowds filled the ballroom while the Skyline High School Marching Band performed. Next, the flags of more than 120 nations that are home to ASIS members were posted. GRANGER TOLD THE AUDIENCE, “One event, one destination, one focus—security. Since its founding 55 years ago, our Society has placed this simple formula in its long-term plans. As the Society developed into the leading organization in the security field, it still concentrated on one event at a time to make it as productive as possible….ASIS always strives to make the investment of time worthwhile…to enhance the stat ure, standing, and productivity of security professionals.” In the 55 years since the Society’s founding, said Granger, “We have witnessed the growth of our profession from modest beginnings to being a key contributor to com- 1 panies’ success, survival, and profitability… Today’s ASIS includes more than 37,000 members in 128 countries, divided into 47 ASIS regions, and made up of 213 chapters—each one striving for the same goal originally established by our founding members 55 years ago.” The Dallas Symphony Orchestra then took the stage. Its conductor, Ron Neal, told the audience that “We are about to take you on a journey through five-and-half decades of ASIS history.” The orchestra began with selections from the Broadway musical “Damn Yankees,” which was the most successful play of 1955. The 1960s were illustrated by selections from “West Side Story” and The Beatles’ “Eleanor Rigby.” In this decade, said Neal, ASIS’s first international chapter was chartered. The 1970s saw the formation of the ASIS Foundation, Inc., as well as strong chapter growth with 56 new charters, including nine new international chapters. The decade also witnessed the creation of the Professional Certification Board, “international” was added to the Society’s name, and Security Management magazine celebrated its 20th anniversary, Neal said. He then welcomed the quartet Max Q to sing Simon and Garfunkel’s hit “Bridge Over Troubled Water.” The orchestra also played “Stars and Stripes Forever” with a group of young piccolo players. ASIS DY NAMICS The 1980s saw the Society’s 30th anniversary and the election of its first female president, Darlene Sherwood, CPP. Additionally, the Security Industry Buyers Guide was published. The 1990s witnessed the launch of the Security Insights program at the Annual Seminar and Exhibits. Max Q returned to sing “The Circle of Life” from The Lion King and selections from ET, the Extraterrestrial and Beethoven’s “Ode to Joy.” The first decade of the 21st century was dominated by the aftermath of 9-11. “ASIS mourned the loss of its own members,” Neal stated. The orchestra played the haunting “Meditation from Thais.” “By 2005, ASIS had added the Physical Security Professional® and Professional Certified Investigator® designations, introduced webinars, and added eleven new chapters.” Neal said. The orchestra finished by playing “Happy Birthday.” The Skyline High School Band then led attendees to the Exhibit Hall, where Granger cut the ceremonial ribbon. What awaited attendees in the Exhibit Hall, he said, was a cornucopia of ideas, concepts, products, and services…that proves the focus of this event is and always will be security.” Granger then cut the ribbon with the help of the ASIS Board of Directors members, Seminar cochairs Martin Cramer, CPP, and Steve Castor, CPP, and the North Texas Chapter Chair Charles Baxter, PSP. ◆ Captain Chesley Sullenberger looks out at the audience. Special Keynote Speakers T he ASIS International 56th Annual Seminar and Exhibits featured thought-provoking keynote addresses by pilot-turned-hero Captain Chesley Sullenberger and the former President of Pakistan Pervez Musharraf. For more coverage of these keynotes, see the December issue of Security Management. SULLENBERGER The voice over the radio was calm and distinct: “We’re going to be in the Hudson.” Moments later U.S. Airways Flight 1549 splash landed in the frigid river. Captain Chesley Sullenberger, the man who spoke these words, emerged on stage at Wednesday’s General Session to a standing ovation and launched into a discussion about heroism and why he believed he had the right stuff on that cold January day last year. Sullenberger told attendees that NOVEMBER/DECEMBER 2010 the two necessary ingredients of his success were education and service. Education has always been important for Sullenberger. He noted how education allows people to profit from the mistakes of others by not having to repeat the experience. “That’s particularly true of my profession: we simply can’t live long enough to make all the mistakes ourselves,” he said. Sullenberger, along with his copilot Jeff Skiles, saved the lives of all 155 people on board the plane that day because of their commit- 2 ment to their profession and to the people placed in their care. “I was a regular guy who had done a pretty good job of preparing himself for whatever might come.” On that day, preparation made perfect. What was particularly striking to Sullenberger is how he and his crew’s “Miracle on the Hudson” uplifted the nation. In the midst of a deep recession and the nagging fear that American competency was in decline, Sullenberger and his crew’s quick thinking and courage gave people faith. “It was seen as life affirming,” he said. Since being thrust into the spotlight, Sullenberger told attendees that he tries to use his newfound influence to better the world. He was given the American Spirit Award from the Congressional Medal of Honor Foundation earlier this year. He says past Medal of Honor recipients have set examples he intends to follow. “They will… tell you that in many cases the act that earned them the medal was actually the easier part,” he said. “It turns out that the more difficult part was living every day in such a way that everyone remembers truly what the medal stands for.” Sullen berger has become an outspoken advocate for aviation safety and for his former comrades in the cockpit. MUSHARRAF An abrupt U.S. withdrawal from Afghanistan will bring the same fallout as did the 1989 U.S. departure after a proxy war with the Soviet Union: instability with ripples of violent extremism around the globe, former Pakistani President Pervez Musharraf said during his keynote address Thursday. 3 Musharraf, a former general in the Pakistani army, led his nation from 2001 through 2008, serving as a key ally in the post-9-11 U.S.-led war on terrorism. He currently lives in self-imposed exile in England, but recently announced the formation of a new political party, and plans to run again for the presidency at home. Despite billions in U.S. humanitarian aid to Pakistan in the wake of the July floods that affected an estimated 21 million, recent polling indicates that 59 percent of Pakistanis view the United States as their enemy. Musharraf traced the sentiment back to the departure at the end of the Soviet-Afghan war, in which Pakistan supported Mujahideen rebels along with the United States. In Afghanistan, Musharraf traces the persistent political instability and violence to the coalition’s installment in 2001 of Northern Alliance members— tribal Tajiks, Uzbeks, and Hazaras—in government, to the exclusion of Pashtuns, in part because the Taliban consisted exclusively of Pashtuns. Musharraf said he repeats again and again: “All Taliban are Pashtuns. But not all Pashtuns are Taliban.” Key to success in Afghanistan is engagement of Pashtuns and their democratic inclusion in government as a majority. That requires bargaining from a position of strength, which the U.S.-led coalition currently lacks, he said. ◆ Musharaff and ASIS President Joseph R. Granger, CPP ASIS DY NAMICS Aspiring Certificants Gather for Reviews H undreds of people arrived in Dallas be- fore the official opening of the ASIS International 56th Annual Seminar and Exhibits to attend certification review courses. Those hoping to earn a Certified Protection Professional® (CPP), Professional Certified Investigator® (PCI), or Physical Security Professional® (PSP) designation gathered at the Hilton Anatole for the sessions. A CPP review course was also offered in Spanish. THE CERTIFICATION REVIEW program drew more than 230 people and covered topics relevant to the exam. One such attendee was Lloyd Phelps of Phelps Security, Inc., in Memphis, Tennessee. Phelps, who sat in on the CPP review course, plans to take the exam in three months. “This review has provided me with great information,” said Phelps. Phelps noted that it is just one of his methods for exam preparation. “I’m using this review in conjunction with my own study efforts,” he said. “This is helping me focus NOVEMBER/DECEMBER 2010 in on the areas I need to work on.” Michael Nagina of Tuscany RPO in Calgary, Alberta, Canada, has been attending CPP review sessions sponsored by his chapter. “The information I have been given here follows the domains I have been studying,” he said. “The topics are similar to those in my CPP review materials. This makes me feel more confident about the studying I’ve been doing on my own.” Another attendee, Martin Des lauriers, regional security director for Brinks Canada in Brossard, Quebec, Canada, was pleased with the program presenters. “This is an excellent review,” said Deslauriers. “The speakers are very knowledgeable and the information is relevant.” Albert Matthews, an electronic security systems consultant with JEL Protection in Victoria, British Columbia, Canada, says the review has helped him refocus on important main points. “This is important because I plan to retake the exam immediately,” he said. Matthews took the exam two years ago, but says that he “didn’t prepare properly.” This time around, he’s studied on his own and taken the review course. The other review sessions also garnered praise. Valerie Greene of Capital One in New Orleans, Louisiana, came to Dallas to take the PSP review course. “This course is organized and the instructors are well-informed,” she said. “I will be well-prepared the next time I take the test.” ◆ 4 ASIS Leaders Applauded Granger (center) with the winners of the President’s Awards of Merit. A t Wednesday’s luncheon, ASIS International President Joseph R. Granger, CPP, announced the Board Management Committee of the Board of Directors for 2011. Having completed his term as the Society’s president, Granger will become the chairman of the Board. Granger is the current director of security for the United Space Alliance, which is NASA’s Space Shuttle contractor with primary locations at the Kennedy Space Center, Florida; Johnson Space Center, Texas; and Marshall Space Flight Center, Alabama. Granger has previously served as ASIS’s president-elect, treasurer, and secretary, as well as a Board member. THE 2011 PRESIDENT WILL BE Raymond T. O’Hara, CPP, executive vice president, international operations and consulting and investigations, for Andrews International of Palm Desert, California. He becomes the ASIS president after serving as president-elect, secretary, treasurer, and a Board member. The Society’s president-elect in 2011 will be Eduard J. Emde, CPP, consultancy manager for Interseco, Wassenaar, The Netherlands. Emde is on the ASIS Board as the current treasurer, and has served as its secretary. Moving into the treasurer’s post is Geoffrey T. Craighead, CPP, vice president of Universal Protection Service of Santa Ana, California. 5 Craighead is currently the Society’s secretary and was a Board member before his election to the Board Management Committee. The final member of the committee was elected Monday at a meeting of the Board. He is current Board Member Richard E. Widup, Jr., CPP, senior director of security operations/corporate security for Purdue Pharma LP of Stamford, Connecticut. Widup will serve as the Society’s secretary in 2011. Stepping down from the Board is its current chair, Michael R. Cummings, CPP. “Few things that I have done in my lifetime have given me as great a sense of satisfaction as working with such an impressive, wonderful, and dedi- cated group of volunteer leaders as I have had the pleasure to meet during my years with ASIS,” Cummings told attendees. “This event is the last major function in my voluntary service to the Society. The time has come to move on and allow others to guide ASIS International into the future.” The formal installation of the 2011 officers and directors, as well as the presentation of the 2010 financial report, will take place at the Annual Meeting of the Membership on January 20, 2011, at the Ritz-Carlton Hotel in Arlington, Virginia. Granger then asked ASIS Past Presidents, members of the Professional Certification Board, council ASIS DY NAMICS chairs and vice chairs, senior regional vice presidents, regional vice presidents (RVPs), assistant RVPs, chapter chairs, and chapter officers to stand and be recognized for “all of your time, effort, creativity, and dedication.” Next, Granger told the audience that he would exercise “one of the privileges I truly enjoy as the president of this Society” by singling out members for special recognition with a President’s Award of Merit. “Education is the bedrock of this organization. So this year, I want to recognize a group of members who have devoted themselves to…ASIS International and its members by providing high quality educational offerings over many, many years,” he stated. Granger then called to the stage the award winners: Phillip Banks, CPP; Curt P. Betts; James R. Bomba, CPP; Philip S. Deming, CPP; Anthony J. DiGregorio, CPP; David H. Gilmore, CPP; Richard P. Grassie, CPP; Milton E. Moritz, CPP; Howard A. Moster, CPP, PSP; Robert Oatman, CPP; David G. Patterson, CPP, PSP; Charlie R. A. Pierce; Dennis D. Shepp, CPP, PCI; and Basil J. Steele, CPP. “Although there are many other members who also answer the call, today we recognize this group as among our best—members who are always willing, always able, and always productive,” Granger said. ◆ Michael R. Cummings, CPP, Chairman of the Board, addresses attendees. NOVEMBER/DECEMBER 2010 Press Room Highlights T he press room at the Dallas Convention Center during the ASIS International 56th Annual Seminar and Exhibits was the place to be for the latest announcements from leading security companies. Executives took time out of their schedules to talk to members of the media during a series of press conferences held throughout the week. Following are some of the highlights. XTRALIS Xtralis, which specializes in the early detection of fire, gas, and physical threats, launched a new hybrid camera and an environmental hazards detector at this year’s Seminar and Exhibits. Founded in 1980, the company has more than 350,000 systems installed at more than 100,000 customer sites in 100 countries around the world. Xtralis products are used to protect more than 3 billion square feet of corporate space. “More than 80 percent of the world’s semiconductor manufacturing facilities use our products,” said Ian Ehrenberg, senior vice president and general manager for Xtralis. Ehrenberg introduced the company’s V3100 Hybrid camera sys- tem. A merger of IP and analog cameras, the camera has standard capabilities but also includes postmotion analytics. “This allows for a highly effective search of events and recorded images within a large amount of stored video,” said Ehrenberg. The camera also has a feature that detects loitering. For example, the camera can be programmed to alarm if someone loiters for more than three minutes in a company’s lobby. Xtralis also launched its new ECO gas detection system. Designed for numerous types of facilities, from underground utilities to warehouses, parking lots, and manufacturing firms, the product can detect 10 different types of 6 gases. Each unit can detect two different gases. Several units can be used in a facility. The units can be integrated into HVAC and other building management systems to help companies save money. For example, a unit could be used to detect carbon dioxide levels, gauging the number of people in the building and adjusting the air conditioning system accordingly. KEENEO Keeneo, of Sophia-Antipolis Cedex, France, made an announcement related to its line of smart software that can help improve the analytical ability of video software platforms. The product can now work with a software platform from the vendor Milestone. Keeneo’s SafeZone video software offers patented 4D technology that can intelligently analyze videos in terms of space, including depth, width, and height, as well as with time. Keeneo’s software can also count vehicles and cars moving through an area, for example. The software can give users the ability to design their own security rules, said Dick Salzman, CPP, the company’s vice president of marketing. A company can specify a minimum amount of time necessary, for example, in which a person or vehicle can be in a certain area before the software produces an alarm. Keeneo can help make security video more proactive, rather than after-the-fact, said Salzman. The software can analyze one or several surveillance scenarios simultaneously using single or multiple analog, Internet Protocol (IP), or thermal camera streams, according to the company. Milestone’s software, XProtect, with which Keeneo can be integrated, is an IP-video management platform designed for large-scale, multisite installations. BROWNYARD GROUP Also introduced at the Seminar and Exhibits was the Brownyard Educational Center. It consists of 7 a comprehensive library as well as continuing professional certification and degree programs. The Princeton, New Jersey-based center is being launched by the Brownyard Group, an insurance group for the security profession, as well as Cardinal Point Strategies, a risk management and consulting firm working in national security. The center features three educational partners: CiNet’s Professional Security Training Network, Kaplan EduNeering, and Kaplan University. Courses range from a continuing education certification on workplace safety issues to a master’s program in homeland security. Training standards and industry regulation have failed to keep up with the growth of the security industry since the 9-11 attacks, said Paul Goldenberg, president and CEO of Cardinal Point Strategies. But, he said, in many violent and other situations, it is going to be someone from the security profession “who will be there to save a life.” Security professionals often find themselves under-trained and overexposed to risk, liability, and litigation, said Brownyard Group CEO Brendan Brownyard. He noted that the center was designed to reduce such risks and also to help improve employee productivity and retention and to give participating firms an edge when competing for contracts. VISITOR PASS SOLUTIONS Another vendor, Data Management, Inc. (DMI), recently made some improvements to its line of VisitorPass time-expiring paper badges. The new passes include a tab that extends from one end of the badge’s self-adhesive label. After information is printed on the badge, the label can be folded around onto the badge’s back. This starts a Experience Pays Off A spirited group of members from the North Texas Chapter worked with ASIS International staff on the many details and logistics involved in producing the 56th Annual Seminar and Exhibits. Two experienced volunteers stepped up to take on lead assignments as Host Chapter Committee cochairs: Martin Cramer, CPP, director of public safety for Downtown Dallas, Inc., and Steve Castor, CPP, national security director, CB Richard Ellis. Both men took on their assignments knowing what to expect, since they had filled similar roles when the event was held in Dallas in 2004. “The process has been streamlined quite a bit,” says Cramer, whose main responsibilities included coordinating public relations and recruiting law enforcement assistance. In his current position, Cramer supervises a staff of 50 officers who are responsible for patrolling the downtown streets, and these knowledgeable officers staffed the information booth in the registration area. Castor’s main role was to recruit other assistance from the chapter. According to Castor, “there was no shortage of great vol- unteers,” who responded to a blurb in the chapter newsletter and announcements at meetings, including Chapter Chair Charles Baxter, PSP, and Vice Chair Greg Lilyhorn. Even with a detailed “playbook” from ASIS headquarters, one important task still fell to the chapter: stuffing the packets handed to each attendee at registration with pens, pads, and programs. A cadre of chapter members arrived on the weekend before the Seminar and Exhibits to complete this critical task. Special thanks belong to Castor and Cramer along with the following committee members who coordinated various components of the Seminar and Exhibits: ASIS Foundation Golf Tournament: Wally Cornwell, business development manager, Securitas Security Services. Door Prizes: George Quin, Jr., CPP, security education and training, Lockheed Martin Aeronautics and ASIS Regional Vice President for Region 6. Hospitality: Frank Garza, senior security manager, CB Richard Ellis Asset Services. School Security Funding Competition: Archie Green, security director, CBRE-Premier Place. ❖ ASIS DY NAMICS chemical process that, about 12 hours later, makes the badge manifest the word “void” on the front. Although the expiring badge technology was invented almost 30 years ago, the badge and the tab used to always be two separate pieces, said Brian Gallagher, DMI’s president. Having the tab extend from the badge can reduce errors and improve efficiency, he said, helping make the activation “virtually foolproof.” The expiring pass can help prevent people from trying to regain admission into a facility the next day without authorization, said Gallagher. In some cases, it can also eliminate the need for people to collect badges after an event. NC4 NC4, a provider of situational readiness solutions for risk management, unveiled its new NC4 Risk Center. The center repackages some of the company’s existing risk-based functions and adds new functionalities. The new center includes additional global predictive intelligence and enhanced analysis and threat information. It also includes a new component that assists customers with travel risk management. The center can help customers quickly learn about threats to assets, operations, suppliers, and employees, according to NC4. It can also help ensure business continuity and streamline risk-related decisions, representatives said. NC4 has provided situational awareness and alert notifications for more than 10 years and operates two incident monitoring centers on the East and West coasts. CNB TECHNOLOGY CNB Technology, a leading manufacturer of advanced security products and solutions discussed its best-selling product lines and new technologies. Included in these announcements was a new network IP-video solution that introduces enhanced resolution and a new hybrid digital video recorder. ◆ NOVEMBER/DECEMBER 2010 Guiding Young Professionals T he Young Professionals’ Leadership Series debuted at the ASIS International 56th Annual Seminar and Exhibits on Monday afternoon with a discussion based in part on the book Leadership Code: Five Rules to Lead By, by Dave Ulrich. The talk, led by Philip S. Deming, CPP, of Philip S. Deming and Associates, focused on “Critical Success Strategies for Effective Leadership.” DEMING RECOMMENDED 10 steps to effective leadership: know yourself, study and understand the organization’s dynamics, diagnose the business environment, build your credibility, develop working relationships, design a system for aligning resources, build your team, create supportive alliances, maintain equilibrium in life, and create value for the organization. Knowing oneself is a key piece to good leadership, says Deming. But it’s not enough to just be aware of one’s strengths and weaknesses; it’s important to also serve as a model for the other employees. As an example of a failure to do this, Deming spotlighted the recent stories about the head of Hewlett-Packard pushing austerity in the company while bringing in questionable hires and spending 8 lavishly on meals and trips. Awareness of one’s weaknesses allows a manager to seek counsel in areas he or she is weaker, rather than fall into a trap of spending excessive time micromanaging in areas of strength. It’s also important to be open to other viewpoints, Deming said. “When you get in an organization, your first reaction is to say ‘I know the right answer,’” says Deming, who advises, “don’t assume you know the right answer.” Deming emphasized the importance of seeking out a mentor. Professionals must decide whether they want a mentor within their organization who has information to draw from or a mentor from outside who can bring different experiences, he said. Mentoring was the focus of the Young Professionals’ Reception following Deming’s talk. In an ASIS version of speed dating, the attendees were matched up at tables with potential mentors for several members and then moved onto other tables to learn about topics such as certification, women in security, councils, and career path planning. Ryan Walker attended because he will soon be taking on the role of security systems administrator at Sho-Me Power Electric Cooperative in Marshfield, Missouri. “You’re sitting down with these people who are knowledgeable, and it’s a relaxing environment where you can get beneficial information to [help you make] those smart strides in your career,” says Walker. Angel Toledo, of PDVSA, Vene zuela’s state-owned petroleum company, is eager to meet other young professionals in the same industry to learn from their experiences, as well as to find out more about gaining ASIS certifications. He found the mentoring program helpful because he came to the Seminar and Exhibits armed with many questions and the session provided a forum for obtaining the answers. ◆ 9 Accolades Awards Representatives of Accolades-winning companies onstage in Dallas. T he winners of ASIS International’s 2010 Accolades awards were announced at the ASIS 56th Annual Seminar and Exhibits. Exhibitors were invited to submit products and services introduced within the past year to a team of judges who evaluated the submissions. The judges, who were all ASIS members, represented end users as well as experts in security product and service research and development. COMPANIES WERE ASKED to comment on the technology’s value to users, explain its novel features, and describe a specific security problem that would be solved through its application. Each entry was also accompanied by a description of key features or benefits, a data specifications sheet, and appropriate images. If a case study or white paper had been written on the submission, it could be included with the application along with recognition from other sources. “This year’s program was very competitive, as entrants continue to push the envelope in their respective disciplines,” observed Accolades Cochair Ron Lander, CPP. “In particular, video surveillance performance is advancing at a rapid pace, offering enhanced analytics functionality and better resolution.” Cochair Howard Belfor, CPP, noted, “The continued blending of emerging technologies into readily available products and services is striking. The ubiquity of network and IP-centric solutions in security is more evident than before.” Cisco Systems, Inc., won with the Cisco IP Interoperability Collaboration System (IPICS) 4. The product is a scalable, comprehensive solution for communications interoperability that streamlines radio dispatch operations and improves response to incidents, emergencies, and facility events. The MiY-ID from Cogent Systems, Inc., was honored. It is the company’s latest outdoor multipurASIS DY NAMICS pose, multifunctional biometric access control reader. With its ground-breaking “Make it Yours” application development platform, MiY-ID can virtually interface with any PACS and government credentials such as PIV, TWIC, and CAC. Cross Match Technologies, Inc., won with SEEK II, which captures and matches identities on fingerprints, irises, and facial images. The product can support a database with up to 120,000 biometric identities and can communicate with remote matching databases through WiFi, 3G, and satellite communication. Dedicated Micros was lauded for its Closed IPTV SD Advanced system—a hybrid DVR/NVR video security system that discovers and assigns IP cameras to network ports. It supports multiple IP and analog video channels, HD IP camera recording, HDMI output and more. The winning entry from Firetide was the Firetide IVS-100 MIMO. The product is an integrated highperformance wireless video-surveillance solution that delivers up to 300 Mbps outdoors for real-time, evidence-grade video. The product can be used with high-end pantilt-zoom analog or IP cameras and incorporates an encoder with integrated 40 GB storage. FLIR Systems, Inc., was honored for its ChromaNox Color IP Night Vision security cameras. ChromaNox cameras produce high-quality color or monochrome video in lighting conditions from daylight to starlight without the need for additional illumination. The V2216 Analog/Digital Coexistence VMS by Infinova was praised for allowing security to migrate to IP video using existing analog control room equipment to manage both the analog and digital equipment without retraining. Infinova’s V2216 VMS allows IP and analog cameras and equipment to coexist. Laipac Technology won for its S-911 Bracelet Locator, a powerful multipurpose quad-band bracelet. Its design was based on requirements from law enforcement agencies and NOVEMBER/DECEMBER 2010 health authorities. Its features include voice and data communications, a motion sensor, tamper detection, and data encryption in a water resistant enclosure with a built-in LCD display. The Bracelet Locator uses assisted GPS technology. Next Level Security Systems was commended for its NLSS Gateway, which correlates information from multiple subsystems— video surveillance, access control, analytics, audio, and intrusion— into a single networked platform. Its features can be accessed and controlled from anywhere through a Web browser. The product includes advanced deployment tools such as autodiscovery, autoprovisioning, and configuration backup. VerifiIR from Sarnoff Corporation was also an award winner. The new product facilitates the real-time surveillance of individuals in crowds in unstructured environments without the subject’s cooperation or knowledge. It also aids in the detection of body armor and weapons, including an improvised explosive device (IED) carried by a person, as well as buried materials. The all-weather, mobile system eliminates the ghosting effect of fused imagery and can be mounted on vehicles or installed at stationary points. ◆ John A. Petruzzi, Jr., CPP, ASIS Foundation Board treasurer (center), receives a donation from the Northern Nevada Chapter. Darrell A. Clifton, CPP, chapter vice chair (left), and Doug R. Laird, Sr., CPP, Regional Vice President of Region 2, deliver the check. Chapters Donate to Foundation T he ASIS International Foundation, Inc., wishes to thank the 14 chapters that have generously contributed funds during this year’s Annual Chapter Donation Appeal. Every year the Foundation seeks support from ASIS chapters worldwide to ensure the continuation of the many programs, awards, research, and scholarships it delivers. Although the Foundation exists to advance the entire security industry and not just ASIS members, a number of Foundation activities are specifically designed to provide chapters with tangible benefits, including the Bordes, Cross, and Walsh awards and the chapter matching scholarships. These programs are dependent upon donations, so contributions are necessary to avoid cuts in award amounts. During the ASIS 56th Annual Seminar and Exhibits in Dallas, chapters that participated in this year’s appeal were invited to the VIP Lounge on Thursday to meet the Board of Trustees. Donors had a special reserved table at Thursday’s luncheon and were acknowledged during a special presentation. It’s not too late to donate. The Foundation can accept donations from chapters, individuals, and corporations any time during the year. Thanks go out to the following chapters for their support: Ark-La-Tex; Boston; Calgary/ Southern Alberta; Central Illinois; Central Pennsylvania; Chicago; Columbus; Fredericksburg/Quantico; Greater Philadelphia; Houston; Memphis; Palm Beaches Florida; Providence; and San Antonio. ❖ 10 A Step Back in Time ASIS President Joseph R. Granger, CPP, his wife L.J., and Randy Dorn of the evening’s sponsor, AlliedBarton, get a lift from the Clydesdales. G uests at Tuesday night’s President’ Reception, sponsored by AlliedBarton, time-traveled more than a century to the Dallas Heritage Village, which provides a living history version of life in North Central Texas from 1840 through 1910. Attendees experienced Dallas when it had general stores, saloons, and gunfights along Main Street. It was only when partygoers overheard nearby banjos playing “New York, New York” that they were reminded it was the 21st century. THE HIGHLIGHT OF THE EVENING for many was when ASIS President Joseph R. Granger, CPP, rode into the event atop a wagon pulled by the famous Anheuser-Busch Clydesdales. Granger shared space on the wagon with his wife, L.J., and Randy Dorn, west division president of AlliedBaron, while members of the crowd cheered him on. There were plenty of photo opportunities with the horses, as they trotted their white-stocking feet throughout the park. Guests mingled around numerous food stations that featured catering by Eddie Deen, or took a tour of the houses and sites. Arma dillos scampered by, and members had photos taken while they rode steers. 11 Also of note was a cigar fundraiser, sponsored by the ASIS Military Liaison Council, which raised funds for the ASIS Foundation, Inc., and also for the Wounded Warrior Project. The project provides aid and awareness for injured service members. The President’s Reception is an opportunity to see old friends, according to Jeffrey L. Larson, PSP, manager of physical security and safety at Midwest ISO. “It’s a great time…the President’s Reception allows us to reconnect with folks we haven’t seen ASIS DY NAMICS in over a year.” According to Larson, ASIS provides resources he can consult when he is dealing with unfamiliar issues. “I’ll reach out to one of my peers and say ‘I have this topic going on, can you send me some information?’ And most definitely they’ll get back to [me].” Sarah Vogt, associate manager of security at Noven Pharmaceuticals, also credited the Seminar and Exhibits for its networking opportunities. “The educational tracks both here and in general that [ASIS offers] throughout the year are very informative and help you if you’re starting out.” Keith Kambic, CPP, director of security at Willis Tower (formerly the Sears Tower) in Chicago, was looking forward to hearing the keynote speakers as well as checking out the new technology in the Exhibit Hall. He said the President’s Reception is “fantastic every year…ASIS does it very well.” The CSO Roundtable hosted an exclusive party for members at Brent House, where hors d’oeuvres were proffered while the most senior security professionals caught up with each other. Ed McDonough, CPP, director of global security for Tyco International, chatted with his peers at the CSO Roundtable party. McDonough said he planned on attending sessions regarding security in Mexico. “It’s a big trouble spot for our company,” he said. McDonough stressed the importance of networking as well as giving back to the Society through volunteering. He applauded the night’s festivities. “The reception’s been amazing. It’s a beautiful atmosphere and it’s a perfect night…. The food’s been outstanding, and the Clydesdales—what can you say when you walk in and they’re right there? It was great…the atmosphere is always fun; it’s a fun group of people, but they’re professional,” said McDonough. His remarks were punctuated by a loud bang—the gunfighters were at it again. ◆ NOVEMBER/DECEMBER 2010 Enthusiastic golfers get ready to compete in the ASIS Foundation’s golf classic. Golfers Tackle Cowboy’s Club O n Monday morning, 147 golfers descended on the Cowboy’s Golf Club as part of the sold-out Annual ASIS Foundation, Inc., Golf Classic. The golfers formed up into four-player teams to tackle the first and only NFL-themed golf course. VIP PLAYERS INCLUDED ASIS Chairman of the Board of Directors Michael R. Cummings, CPP; ASIS Treasurer Eduard Emde, CPP; and Board Members Chad Callaghan, CPP; Geoff Craighead, CPP; and David C. Davis, CPP, as well as John Petruzzi, CPP, from the ASIS Foundation Board of Directors. Securitas USA Chairman Don Walker, CPP, also golfed and brought 10 foursomes from his company with him. This year it was the team from BAE Systems—made up of Kris Busch, John Gallagher, Doug Long, and Daryle Wingerter—who took first place in the scramble. Scott Straight, Bobby Dale, Greg Weil, and Lynn Kresse from Protection One finished second, while Victor Glover, Mike Castaneda, Leland Gannaway, and Jeff Leon ard of Securitas rounded out the winner’s circle. The golf classic also featured individual contests of strength and precision. Stuart Bostock from The Security Center Ltd. earned the prize for longest drive in the men’s division. Protection One’s Lynn Kresse followed suit, winning the longest drive prize in the women’s division. ASIS Foundation Program Manager Barbara Buzzell thanked all the Golf Classic’s sponsors for their generous support. Andrews International sponsored the bags, BAE Systems sponsored shirts, and ARATA provided the Warbird golf balls. Breakfast and lunch were sponsored by Niscayah and Nasatka Barrier, Inc., respectively, while iView took care of two beverage carts. Magicard-Ultra Electronics also offered generous support, sponsoring the longest drive hole, as did Wyndham Jade and EPIC, who each sponsored a hole. ◆ 12 ASISPAC Dinner Helps Raise Funds Jeffrey Slotnick, CPP (left), reaches out to ASISPAC dinner attendees. W ith only a few weeks before the congressional midterm elections, about 25 members gathered in a private dining room at the Dallas Chop House on Monday, October 11, for the 4th Annual ASISPAC dinner. JACK LICHTENSTEIN, vice presi- dent of government affairs and public policy for ASIS International, thanked everyone for their generous contribution, noting that 65 to 70 members continually support the PAC and its mission. But he reserved his praise for the members surrounding him. “The people in this room are really the core of that support group,” said Lichtenstein. “You are the rocks who have been there for us.” Created in 2005, the PAC has raised more than $30,000 from U.S. ASIS members to advance the interests of security professionals on Capitol Hill. The PAC dinners have raised about half of that total. Surveying the political landscape over the last year, Lichtenstein said it’s been a “bizarre” one for security. “Security issues, either 13 national security or homeland security, really haven’t been a part of the current Congress’ agenda.” Lichtenstein wants to build a stronger ASISPAC to ensure ASIS has input into any security legislation that affects ASIS members as well as helping to elect members of Congress friendly to the industry. “The key to success...is networking: so talk to your friends, talk to your colleagues, talk to your contacts, and get them interested,” he said. “If every person in this room gets just one more person to contribute, you double the impact of your contribution.” Theresa Deehan, the vice chair of the ASIS Educational Institutions Security Council, said she supports the PAC because it’s important for security professionals to make their voice heard when legislation affects their jobs. As local and state governments cut back on police forces, Deehan believes, private security will be called upon to “fill the gaps.” If that occurs, private security training and certification could become a national issue, and she wants to ensure that private security has the training and professionalism to fulfill that role. The ASISPAC can help that happen, she said. Jeff Slotnick, CPP, also addressed the PAC supporters to thank the ASISPAC for helping him prepare to testify before the U.S. Congress a year and a half ago on critical infrastructure protection. He said Lichtenstein and Kristin Watchorn, legislative manager for ASIS, were instrumental to getting him prepared. Lichtenstein said that’s what the ASISPAC is for and encouraged members to reach out to the PAC office whenever they have questions regarding public policy or interactions with the federal government. “We serve you, so let us know.” ◆ ASIS DY NAMICS access control that can be used with badging. “I’m just trying to get a feel for what’s out there now,” said Abraham, who said she was also eager to meet and greet others she might be able to gain ideas from. Humberto Botello, manager of security operations for Takeda Pharmaceutical Company in Deerfield, Illinois, came to Dallas to network and see what vendors have to offer, but he is also interested in attending educational sessions regarding current conflicts in Mexico related to the drug cartels and security. “We just ventured into Mexico within the last year…so, we need to get a better [understanding of ] what security really is in Mexico,” said Botello. Chris Schwarz is a security operations supervisor for Urenco USA. He’s been a member for about a year and decided to attend because his organization Rocking Receptions N ew members of ASIS International and first-time attendees mingled on Monday night, getting to know each other prior to the official start of the ASIS 56th Annual Seminar and Exhibits in Dallas. cialist in charge of VIP visitors at the U.S. Census Bureau, U.S. Department of Commerce, is a new member looking forward to scouting out some different types of Cheryl D. Elliott, CPP, PCI, chats with ASIS Treasurer Eduard J. Emde, CPP. ASIS PRESIDENT-ELECT Raymond T. O’Hara, CPP, welcomed attendees and reminded them to take advantage of the many educational opportunities and networking events on offer at the Seminar and Exhibits, as well as the numerous programs put on by ASIS throughout the year. Eartha Abraham, security speNOVEMBER/DECEMBER 2010 14 wants to become more involved in ASIS. Schwarz said he planned on checking out the exhibit hall and sitting in on educational sessions. Steve Rients, CPP, manager of security training for BAE Systems, Inc., has been a member for four years but this was his first Seminar and Exhibits. “I want to learn more and make my training more effective,” said Rients, who is hoping to gather information about information systems security that his company’s employees can use as the first line of defense against attacks. “Every time there’s a session on that topic, I’m going to go,” said Rients. Hundreds of attendees gathered at the Welcome Reception to kick off the event in style. Refreshments were plentiful as attendees networked while being entertained by jazz band The Texas Gypsies. Jennifer Hayes, security integrator at Engineered Protection Systems in Michigan, is a regional vice president (RVP) for ASIS. “[The Seminar and Exhibits] is a good opportunity for me to connect with people from my area as well as people outside my area.” Larry Schwabauer, senior security professional at Pfizer, came to network. He said that he also looked forward to seeing new technology and “getting acclimated to the different types of security features that are out there.” Klas Nilsson, CPP, PCI, PSP, founder of the security firm Security Manager in Sweden and chapter certification representative and webmaster for ASIS’s Sweden Chapter, has been an ASIS member for several years and has attended the Seminar and Exhibits every year since 2004. Nilsson found the preseminar intensive on security consulting to be helpful. “Even though I’ve been a security consultant for 15 years, I managed to pick up quite a few things there to help me grow my business…. [This is] the place to be if you want to keep on track and actually ahead of what’s happening in the industry.” ◆ 15 Intensives Offer Insight Investigator David E. Lewis outlines his method for detecting deception. A ttendees seeking in-depth information on cer- tain topics arrived early in Dallas to take part in preseminar intensives—courses prepared by experts in issues ranging from consulting to protecting houses of worship. The intensives were held at the Hilton Anatole and the Dallas Convention Center on the Sunday and Monday before the official opening of the ASIS International 56th Annual Seminar and Exhibits. Topics covered included detecting deception in investigations, starting a security consulting company, protecting faith-based organizations, facility security assessments, and threat assessments and response. WOMEN IN SECURITY On Monday afternoon, the Dallas Convention Center was the place to be for all aspiring women in the security field. The ASIS International CSO Roundtable’s Preseminar Intensive offered a wealth of good advice and ideas for today’s professional females aiming to suc- ceed in their careers. The events began with the introduction of the speakers for the first session, “How to Promote Yourself.” They were Kathy Lavinder, executive director of Security and Investigative Placement Consultants, LLC, of Bethesda, Maryland, a retained search firm deASIS DY NAMICS voted to finding and placing highly qualified experts in security and investigation; Stephanie Angelo, president and owner of the consulting and training company Human Resource Essential, LLC, of Chandler, Arizona; and Ed McDonough, CPP, director of global security for Tyco International Ltd., of Princeton, New Jersey, a diversified, global company that provides vital products and services to customers in more than 60 countries. Angelo began by giving attendees an honest picture of how recruiters sort through the résumés that arrive for an open position. She asked the audience if they thought that she spent five minutes, a minute, or 30 seconds looking at each résumé. The truth, Angelo admitted, was none of these. She said she spends about 15 seconds per résumé. “If certain things don’t pop off the page, they go in the ‘thanks, but no thanks’ pile,” Angelo stated. The candidates who will make the cut send a résumé and cover letter that is customized for that company and position. “You need to do your homework—or rather eyework—to find out about the company and know who you are talking to,” she explained. Among the ways to do this, she suggested, are including a quote from the company’s annual report or from the job description. When reviewing résumés, Angelo said, prospective employers do not want to see a reverse chronology of the applicant’s work history. “Companies want to know what’s in it for them. What did you accomplish for a past employer that you can do for them? Past behavior is the best indicator of future behavior. They want to know if you saved money for the organization, or if you managed with five employees when there used to be 10—quantitative things.” Angelo cautioned her listeners against “cutesy,” saying that using fancy fonts or colored paper résumés, for example, “no longer work.” She suggested using a good stock white paper with a single font in three formats—for example, regular, bold, and italic. She told listeners that the cover letter needs to speak to the person who is receiving it. It should not be addressed to “dear sir or dear ma’am.” It should also highlight accomplishments that don’t fit on the résumé. Next, Lavinder focused on selfpromotion. “I want to talk about what self-promotion is and isn’t and what it can do and can’t,” she explained. Lavinder said that she has met many women who say that they cannot be self-promotive. “They say ‘It’s not in my nature; it’s not in my culture’—I tell them to get over it. You have to do it to get recognition and promotions.” Women needed to be self-promotive both in the company and Lorrie Bentley-Navarro, CPP (left), and Natalie Runyon spoke during the Women in Security preseminar intensive. NOVEMBER/DECEMBER 2010 outside of it. “If you don’t do it, no one else will. Let people inside know about your contributions and skills,” she prompted, saying that there are ways to do this that do not appear overly aggressive or self-serving. “How you say it is as important as what you say,” Lavinder explained. As an example, she noted, rather than saying to “your boss’s boss that you worked all weekend to make sure that the company didn’t end up on the front page of the newspaper, say that ‘We dodged a bullet the other day, but we became aware of the situation and we worked to correct it.’” In this way, the employee stresses that she is a team player who is bringing value to the organization. Lavinder also told attendees that certain behavior gets results. “You should project confidence, say what you need to say, and then stop. Believe in yourself. Use humor, storytelling, and creativity,” she noted. Externally, Lavinder said, women needed to network, volunteer, and make themselves “thought leaders” in their industry. She highly recommended participating in LinkedIn’s forums. “There is no downside to doing this,” she stressed. McDonough stressed professionalism. “It’s the key element in getting noticed in a positive way. People think that that is someone valuable who can add to the organization,” he said. He coached the attendees to “be confident, but not cocky. Be assertive but not aggressive…. Stay composed, be cool under pressure. In the security world that is very important. You inspire confidence that way.” McDonough also said that is important to communicate effectively in writing and in presentations. He also stressed finding a mentor within the company who can be consulted, and to mentor others in return. McDonough stressed the importance of networking and looking for opportunities to volunteer. “ASIS can provide so many oppor- 16 tunities to do this through ASIS councils or with the local chapters,” he said. Later in the day, attendees heard about “Staying Competitive While Managing the Work/Life Balance,” from experts Natalie Runyon, vice president of leadership and training for Goldman Sachs; Lorrie BentleyNavarro, CPP, deputy director of security, SAS Institute; and Normadene Murphy, manager-in-charge for Guardsmark. This was followed by an open session and a networking reception sponsored by Accenture, a global management consulting firm. DETECTING DECEPTION Through instruction and practical exercises, attendees at the session on “Detecting Deception in Verbal and Written Statements,” learned tips and techniques for ferreting out lies during investigations. On Sunday, presenters John Dietz, CPP, president of Dietz and Associates, and investigator David E. Lewis, outlined their method for detecting deception through written questionnaires and interviews. Investigators should ask suspects to fill out a questionnaire containing a predetermined set of questions. The suspects should use an ink pen to fill out the questionnaire and should be instructed to mark out any errors with a straight line. The information that suspects choose to strike out can be valuable to the investigation, according to Dietz, indicating levels of stress or attempts at deception. Attendees also learned how to analyze sentence structure, verb tense, and pronoun usage to tell whether someone is lying. During Monday’s session, attendees used this information to analyze questionnaires from actual investigations. For example, attendees went over questionnaires gathered in an incident of workplace theft. Dietz guided the attendees through the process. He stressed that while individual questions may indicate deception, it is important that the investigators look at the question- 17 naire as a whole. “Keep an open mind and look at the entire document for signs of deception,” said Dietz. “Very few people will answer all the questions perfectly.” SECURITY CONSULTING Attendees at the two-day session on “Successful Security Consulting” heard from seven presenters who covered all aspects of establishing a security consulting company. The session, which was organized by cochairs Richard Grassie, CPP, of Good Harbor Consulting, and Frank Pisciotta of Business Protection Specialists, Inc., covered issues such as marketing a consulting business, developing winning proposals, completing assignments, conducting audits, billing, and gaining an end-user perspective. David Aggleton, CPP, of Aggleton Associates, Inc., in New York City, offered expertise on billing and collecting payment from clients. “Billing is a critical aspect of your consulting business,” Aggleton said. “Without it, you will fail.” Aggleton helped attendees formulate how much they should charge for their services per hour. This charge is based on numerous factors, noted Aggleton, from the amount of experience the consultant has to the state of the economy to the type of service being offered. Consultants also need to determine what their annual salary should be along with all the expenses the company will accrue—from medical insurance to postage costs. Another crucial issue, said Aggleton, is how to invoice clients. He discussed the benefits and drawbacks of billing hourly or by job and whether to request a retainer. For his own business, Aggleton says that 90 percent of clients are billed a fixed price per job. “We come out even,” says Aggleton. “Some jobs take a little less time and we make a little extra, sometimes they take longer and cost us a little more.” Karin Vellani, CPP, of Threat Analysis Group, Inc., of Sugarland, Texas, gave a presentation on developing a business plan. Vellani told attendees that the purpose of a business plan is to help the consultant focus. “What are you trying to do? Are you trying to start a large firm that will have many employees? Or do you want to be a one-person shop?” Vellani asked. A business plan can help answer these types of questions, according Mobile Planner with GPS T his year, attendees of the ASIS International 56th Annual Seminar and Exhibits had access to a high-tech tool for planning for the event. ASIS Mobile, which was launched in September, is an innovative feature available as an iPhone application or in a Web mobile version for all other smart phones. Since ASIS Mobile could be easily added to an iPhone or PDA, several planning options were available to the app’s users. First, the app was linked to the show planner. Attendees could set a personal schedule noting speakers they wanted to hear at specific sessions and plug in the meetings they had committed to attend with other council members or colleagues. If a time slot remained open, other activities scheduled at that time popped up as suggestions. A map of the entire Exhibit Hall was also available through the app. Attendees could enter a booth number and the app provided the fastest route to get to that spot. A search capability allowed attendees to find an exhibitor by product or service type or specific application. The app included a Mobile Showroom for select exhibitors, which placed all relevant information about that exhibiting company in one location and directed attendees to its booth via the routing software. Once they had accessed an exhibitor’s showroom, attendees could request an appointment to meet a representative while in Dallas, request a return call from the exhibitor, or access the exhibitor’s Web site. Pictures of products could also be viewed through the app along with relevant details in PDF format. ❖ ASIS DY NAMICS Institutions should know, for example, how they will contact faculty and students in an emergency. They should also consider issues such as how to back up critical data in case of an emergency. Watson also mentioned other available resources to help strengthen security at faith-based and other schools. Sources include local law enforcement, The U.S. Department of Education, and the ASIS Houses of Worship and Faith Based Organizations Council. to Vellani. It can also help the consultant define the services he or she has to offer and identify the customers the consultant should be seeking. “A business plan helps you communicate with yourself,” said Vellani. “Then, after you start your businesses, it helps you identify risks, and track your progress.” FAITH-BASED ORGANIZATIONS Faith-based schools have many of the same security concerns as other academic institutions, but they can also have some special challenges, according to Scott Watson, CPP, speaking at a preseminar intensive on Monday. Religious-oriented schools can sometimes have relatively few resources to devote to security personnel and other efforts, he said during the session, “Protecting the Future: Security at Faith Based Schools.” Such institutions tend to have an open culture, and personnel may erroneously feel that violent crimes and other major threats “can’t happen here,” he said. Some of the steps faith-based institutions should take to strengthen security include conducting risk assessments and also educating administrators, faculty, and students about possible threats and responses, he explained. In conducting a risk assessment, administrators may want to consider factors such as the neighborhood surrounding a school, as well as any prior crimes that might have taken place at the school. Schools should draw up a matrix of possible threats and consider possible countermeasures, based partly on factors such as the measures’ return on investment. Schools should continue to conduct assessments on a regular basis, Watson stated. Educating administrators, faculty, students, and others is also a central part of stronger school security, Watson stated. Faculty and staff should be taught to recognize signs of criminal and other security threats. Schools should also have a structure for collecting, analyzing, and acting upon such data. In many NOVEMBER/DECEMBER 2010 cases, when schools experience a particularly violent incident, the media will report that there were “many warning signs,” he said. Students at faith-based and other schools should also be taught to follow certain security procedures. An example could be not holding exterior doors open for strangers, even when they appear nonthreatening. Watson said that many schools could also benefit from a “broken windows” policy, referring to Broken Window Theory which postulates that monitoring and maintaining urban environments in a well-ordered condition may prevent further vandalism as well as an escalation into more serious crime. By cleaning up graffiti and making repairs quickly, for example, a school shows the community that it cares about the facility and that the building and its occupants are watched over, he said. Schools should have existing procedures for reacting to incidents and threats, he said, ranging from bomb threats to kidnapping to fires. As part of a holistic security plan, many schools should also consider business continuity-related issues. FACILITY SECURITY Most security managers cope daily with the challenge of imposing physical security controls on facilities that were designed and built with only two things in mind—function and aesthetics. The good news for security professionals is that doctrines such as crime prevention through environmental design (CPTED) dictate that security is designed and built into new structures. However, that process poses its own unique challenges, as addressed at the preseminar intensive session “Facility Security and Initial Conceptual Design,” sponsored by the ASIS Security Architecture and Engineering Council. The process required to build an inherently secure facility encompasses five stages: study and reporting, design, bidding and negotiation, construction, and operation. The process is expansive enough that presenters Richard Grassie, CPP; Philip Stearns, CPP; Mark Hankewycz, CPP; and Doug Fitzgerald, CPP, spent the whole day focusing on the first step. Later steps were addressed in three consecutive sessions on security architecture and engineering. Grassie, managing principal of Good Harbor Consulting, LLC, offered useful advice for attendees. He advised practitioners to “not just go out and talk to vendors. 18 Do it smart. Do a risk assessment.” Grassie and Stearns, himself a systems engineer and a program manager with The Conti Group in Pittsburgh, further emphasized that practitioners must remember that technology is not a panacea. It can detect people but not intent, Grassie said, while other critical elements of the security program include people, policy, and procedure. The design process begins with formation of a team of at least three specialists: an architect, a systems engineer, and a security specialist, Stearns explained. He added that architects, while devoted to function and the visual appeal of structures, now accept the necessity of incorporating security into design. The team must begin their work by assessing risk at the location and establishing a desired endstate of risk management. “Don’t get caught up in how it’s going to be done. When you’re really confident in your design, the results will be better.” Only then, and in the later steps of the process, should the team consider the “constructability” of different options, and do so at every turn. Offering familiar advice, Grassie said that team members must explain the design program to senior executives in the language of business, explaining that security translates to a competitive advantage. When practitioners do that, “we’re talking about security in the terms the organization is familiar with,” he said. THREAT ASSESSMENTS The risk organizations face due to disasters—natural or man-made— are well-documented. According to the U.S. Small Business Administration, 25 percent of businesses that close after a major disaster do not reopen. Yet security managers still struggle to communicate that risk to their superiors, and to keep their organizations adequately prepared. Seminar attendees gained expert guidance for both tasks at Monday’s preseminar intensive session “The Reality of Threat Assessment and Response,” conducted by the International Foundation for Cultural Property Protection and Layne Consultants International. Presenter Stevan P. Layne, CPP, principal of Layne Consultants, reminded participants of a lesson from Hurricane Katrina lost on many organizations. Not only do organizations require emergency management plans for more common cases like accidents, natural disasters, and incidences of violence, they must prepare for events in which days pass before aid arrives, even from first response agencies. “Emergency agencies can’t do it all. You’ve got to do it for Enter the Hub W ith so much going on at the ASIS International 56th Annual Seminar and Exhibits, attendees couldn’t possibly see everything. To make sure they didn’t miss anything important, The Hub at www.asis2010.org was created. Users could see videos of selected sessions, broadcasts from ASIS TV, photos of events, exhibitor information, and headlines from the ASIS Show Daily. The following full sessions and more can still be viewed at The Hub: “What’s New on the Floor” examines some of the innovative products that could be found on the ASIS 2010 exhibit floor. The presenters are Ron Lander, CPP, and 19 Howard Belfor, CPP. “Bioterrorism: Understanding the Threat and Designing Responses,” presented by Dr. Jeffrey Simon. “Social Networking, Media, and Your Professional Development.” The presenters are Steve Surfaro, Shawn Flaugher, and Ksenia Coffman. “A Cartel Hempisphere: Protecting International Interests in Today’s Most Enticing Emerging Markets,” presented by Raymond T. O’Hara, CPP, Bruce McIndoe, and Samuel Logan. “Cyber Series: Case Studies from the Front Lines - Computer Forensic,” by speaker Kevin Blumi, CPP. ❖ yourself.” Otherwise, “You’re going to be standing, like in Katrina, looking to the sky for an emergency management agency that never shows up.” Organizations’ emergency management plans should be built around the Incident Command System (ICS), originally developed for response to massive wildfires, and now the common playbook for response to incidents of all sizes, from federal to local agencies, said presenter William J. Powers III, director of facilities at The Clark Art Institute in Williamstown, Massachusetts. Positions from incident commander down to planning and finance chiefs must be staffed “three deep,” meaning they must have two alternates in case the primary person is indisposed. These positions should not be based on seniority but should be dispensed according to capabilities and expertise. Emergency plans and the ICS, Powers and Layne said, are useless if they are left to collect dust. “This is something you should train, train, train on,” Powers said. Similarly, plans and procedures should be communicated simply and succinctly to employees, rather than circulating voluminous plans. Layne recommended using a simple, two-page guide briefly listing exactly what employees should do in a series of scenarios from fires to active shooter incidents. Separately, Layne, Powers, and fellow presenter R. Michael Kirchner, CPP, director of security for the Harvard Art Museums, recommended regular liaison with local first response agencies. Smarter organizations even invite local law enforcement agencies to use their facilities for agency exercises. “Guess who gets the best response when there’s an incident?” Layne said. Need help making the case for emergency planning? The presenters offered this statistic from the Emergency Management Institute, which found that $1 spent on mitigation saves $4 in recovery from a disaster. ◆ ASIS DY NAMICS The Best of the Exhibit Hall O n Tuesday, attendees packed the eagerly antici- pated “What’s New on the Floor” session, presented again by Ronald Lander, CPP, chair of the Information Technology Security Council, and Howard J. Belfor, CPP, of the ASIS Physical Security Council. Belfor said that the effect of the economic downturn on the security industry is that it has pushed manufacturers to be more innovative. This was exemplified in the various products they highlighted. THE SPEAKERS SPOTLIGHTED the 10 winners of the ASIS Accolades competition. They also pointed to some of the entrants that did not win but caught their attention during a trip around the exhibit hall. Among those were numerous products related to video and NOVEMBER/DECEMBER 2010 video networks, said Lander and Belfor, such as the Verint Video Solutions Nextiva HDR 1800 High-Definition Decoder/Receiver, which can support video walls and moves towards a more ergonomic approach, said Lander. Another video-related product was DVTel’s Smart Security Solution, which provides IP camera technology, intelligent video, and analytics, and is customizable, said Lander. Lander and Belfor stressed that it is becoming more important to have forensic quality video that is not just good quality on the monitor, but also when saved. Sentry 360 Security’s FullSight 360-degree 10-megapixel camera with no blind spots and no moving parts was singled out for praise. Another camera the presenters lauded was the Scallop Imaging Digital Window A7-180 Analog Camera, which is “so cool and so small,” said Belfor, and blends various views into a 180-degree field of view. Additional video-related appliances include Microsemi’s PowerDsine midspans, which are a breakthrough in getting electricity to IP cameras, said Lander. Additionally, Belfor and Lander cited various projections for in- 20 creased growth in the biometrics industry, and they noted numerous biometric products to check out. One was L-1 Identity Solutions’ 4G FingerVein Station, which Lander and Belfor referred to as an unobtrusive biometric device that looks at various distinguishing elements. Also in the biometrics field was the InSight VM 2 Meter Iris Recognition System from AOptix Technologies, Inc. The product is capable of scanning irises from several feet away. One of the recent trends, said Belfor, is that old things are new again. An example is Videx, Inc.’s CyberKey Vault 20, which is designed to dispense keys using an Internet connection. Belfor said one interesting aspect of the product is the user-defined fields. Lander also spotlighted technology from Patriot3, Inc., which manufactures shields. For example, in a workplace violence or school shooting situation, Lander said that one Patriot3 product has wings that flip out and can cover a six-foot hallway, so that potential victims of an attack can be protected behind the shield. Many companies perform background investigations on potential job candidates, and Lander and Belfor pointed to the electronic research firm LexisNexis as a leader in that industry. In the access control realm, Lander highlighted Brivo Systems, LLC’s ACS OnSite Aparato which provides the ability to keep data private unless permission is granted to a user. The Powdersafe Containment System of Powdersafe Pty., Ltd., which assists in the opening of suspicious letters, was also singled out for praise. If something hazardous is detected, the containment system slams shut and seals the letter inside. A technology that has generated headlines and is “here to stay,” according to Lander, is Canon subsidiary Virtual Imaging, Inc.’s technology SecurPass, which does a full body scan. ◆ 21 Dennis Hastert speaks to CSOs. Roundtable Delivers Distinguished Speakers D uring the ASIS In- ternational Seminar and Exhibits, CSO Roundtable members heard from a roster of prominent leaders as part of a CSO Distinguished Speaker Series. ON TUESDAY, Dennis Hastert, the 59th Speaker of the U.S. House of Representatives, addressed an audience of senior security executives, sharing his experiences as the country’s senior lawmaker during one of the most tumultuous periods in its history, as well as his outlook for the then upcoming midterm elections. Hastert spoke to attendees about the flurry of reforms that followed the terrorist attacks of 9-11, among them the PATRIOT Act, which allowed collaboration between U.S. foreign intelligence services and domestic law enforcement agencies, and the SAFETY Act, which mitigates civil liability for qualified security products. ASIS DY NAMICS On Wednesday, after delivering a morning keynote to the full body of attendees, CSO Roundtable members had a private session with airline Captain Chesley B. Sullenberger III, famous for landing his crippled commercial airliner in the Hudson River. On Thursday, the Roundtable members met former Pakistani president Pervez Musharraf for another exclusive dialogue. The CSO Roundtable also sponsored sessions for Roundtable members and those eligible for membership. These sessions included “Career Guidance for Security Executives,” which focused on how CSOs can put together a résumé package that will impress corporations looking to upgrade their security team; “The Maritime Link in the Security Chain,” which provided an update on piracy, assessing existing security measures, and recommending countermeasures; and “Nobody Expected a Volcano: Protecting the Supply Chain No Matter What Happens,” which explored how risk factors affect the movement of goods and services in times of chaos, and provided advice to attendees on how to respond to events such as this year’s eruption of the Eyjafjallajökull volcano in Iceland. ◆ Fred Evans speaks on maritime security. Final Sessions Probe Issues Keith T. Darcy speaks at Friday’s Insights session. T hose who attended the final day of the ASIS International 56th Annual Seminar and Exhibits were treated to panels of experts discussing the most pressing topics of the day, including cloud computing, supply chain security, and ethics. CLOUD COMPUTING. The first session on Friday was “Get Off My Cloud—New Opportunities, Dangers, and Realities with Cloud Computing.” The session was sponsored by the Information Security Management Advisory Commission, the Cloud Security Alliance, and the CSO Roundtable. ASIS President-Elect Raymond T. O’Hara, CPP, executive vice NOVEMBER/DECEMBER 2010 president of consulting and investigation for Andrews International, introduced the session and discussed the importance of the topic. “Cloud computing has the potential to change computing as much as the Internet did,” said O’Hara. O’Hara then introduced the two panelists, ASIS Board of Directors Member Dave Tyson, CPP, senior director and CISO for Pacific Gas and Electric, and Former 22 ASIS President Jeffrey M. Spivey, CPP, PSP, president of Security Risk Management Inc. Cloud computing, explained Tyson, allows businesses to access applications online via the Internet, while those applications and the data they generate are stored on servers elsewhere. From a security perspective, the critical issue is the company that creates that data often has no control over where it is stored. The main attraction of cloud computing is that it saves money. “Cloud computing can save companies millions of dollars,” said Tyson. “Businesses can do away with servers and they no longer need to purchase software. Companies only need to pay for the space they use.” Tyson explained that, in his company, cloud computing reduced corporate storage costs from $10,000 a terabyte to $700. Both Tyson and Spivey noted that there are several traditional security concerns companies must consider when using cloud computing. First, security must get a seat at the table when the company is discussing whether to move into the cloud. This will allow security to discuss the dangers. For example, Spivey noted that malware can be in the cloud. 23 Another issue to consider is how cloud computing affects the emergency preparedness plan. “Do you know where the servers are? Are the servers in danger from natural disasters or political unrest?” asked Spivey. Companies must also be sure they can get data back once it has been sent to the cloud. “Security should be concerned,” said Tyson. “It’s important data is somewhere unknown and they have no control over it. Companies must not only be sure they get data back, they must be sure that it is not still in the cloud once it is returned.” One way to deal with this, noted Tyson, is to keep high security data on a company server, in a central place, and not send it to the cloud. But this method requires planning and foresight by the company. Another security measure that companies should consider is background screening for the company providing the cloud. Companies should also include language in the contract that allows corporate security to inspect the cloud company’s server. “This means that the client companies must understand what is necessary to protect data,” said Tyson. However, the panelists were clear that cloud computing risks must be managed because they cannot be avoided. Spivey quoted a Gartner study that projects that 20 percent of companies will no longer have an IT department by 2012. Businesses will use cloud Thanks, Partner T he educational component of the ASIS International Seminar and Exhibits has long been a magnet for top-level speakers. This year, several industry groups partnered with ASIS to broaden the pool of experts with in-depth knowledge on subjects of current interest to all attendees. ASIS is pleased to have joined with these educational partners: (ISC)2. A global, not-for-profit group, (ISC)2 is known for its world class educational programs and certifications. Members in more than 135 countries adhere to (ISC)2’s global standards and code of ethics for the information security industry. IT-ISAC. IT-ISAC is a trusted community of security specialists from across the IT industry. Members of the Information Technology-Information Sharing and Analysis Center identify threats and vulnerabilities and share best practices. ISACA. This leading organization is a global provider of knowledge, certifications, advocacy, and education on information systems assurance and security, enterprise governance of IT, and IT-related risk and compliance. The group also develops international auditing and control standards. IAPSC. The International Association of Professional Security Consultants (IAPSC) is a respected and widely recognized consulting association. Members of IAPSC meet rigid requirements that ensure clients can select from an elite group of professional, ethical, and competent security consultants. ❖ ASIS DY NAMICS computing, according to the panelists because it is so cost effective. But cloud computing has upsides in addition to cutting cost. It can also drive innovation. “The cloud allows you to be bold,” said Tyson. “To go big and go fast.” Perspectives. At Friday morning’s second session, moderator past ASIS President Steve Chupa, CPP, director of security, worldwide security group, for Johnson & Johnson, discussed the genesis of the Perspectives program. “At several recent ASIS meetings, we asked ‘what keeps you up at night?’” said Chupa. “We got a long list of responses. Among the most prevalent ones were worries regarding the security of an organization’s supply chain.” Chupa then introduced Yossi Sheffi, head of the engineering systems division and director of the Center for Transportation and Logistics at the Massachusetts Institute of Technology. Sheffi, the author of The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage, discussed how companies can evaluate risk. According to Sheffi, a company must not only examine risks to its own operations but to those of its suppliers, third-party manufacturers, and contractors. “The supply chain is the whole ecosystem of getting products from the earth to the consumer,” said Sheffi. Other panelists included Tony Strange, director of channel integ rity, Medical Device and Diagnostic Sector, Johnson & Johnson, and Ken Konigsmark, program manager for supply chain and aviation security for The Boeing Company. Insights. At the Security Insights Program, a group of ethics experts led a discussion on “Connecting the Dots: Security and Corporate Ethics.” Introduced by former ASIS President Regis Becker, CPP, global director of security and compliance for PPG Industries, the session focused on the relationship between ethical corporate behavior and the health of the economy. NOVEMBER/DECEMBER 2010 Humorist Dave Barry entertained attendees at the Closing Luncheon on Friday by telling jokes and humorous stories about his life in Florida and his adventures as a writer and as a husband and father. The session moderator, Keith T. Darcy, executive director of the Ethics and Compliance Officer Association, started the discussion by linking unethical conduct to the economic collapse. “I can give a new speech on ethics every day,” Darcy said. “There is so much malfeasance going on.” The upside to this bad behavior is that the role of ethics in business is now considered a critical one. And companies around the world are cooperating in ethics investigations on a level “that is historic,” said Darcy. Darcy then introduced the panelists: Donna Boehme, principal of Compliance Strategists LLC; Perry A. Minnis, chief officer of Minnis and Associates; Richard M. Kelly, CPP, corporate compliance officer and director of global security and compliance for Harsco Corporation; and Dean Luchsinger, vice president and chief ethics and compliance officer for AECOM Technologies. The panel explored the importance of using ethics hotlines to allow employees to report violations. Kelly noted that when his company launched a hotline in 2009, it received 69 calls within the first 10 days. “There were two significant safety reports,” says Kelly. “Those two calls resulted in investigations and uncovered violations at two different sites.” Another critical issue that was addressed was how to conduct ethics investigations. Boehme suggested that companies establish a set of investigative guidelines to keep all investigations “on the same page.” Boehme stressed that such investigations will not be conducted in the same way as law enforcement investigations. Companies must also be wary of anticorruption laws in nations around the globe. While businesses may be certain that they are not conducting business in an unethical manner, they may not know what their contractors are doing. “It doesn’t matter how much security you have in place,” explained Minnis. “If an agent of yours acts corruptly on your behalf, you are responsible.” This thought process also extends to the places companies choose to do business in. Luchsinger says that his company has a security team that evaluates the prospective corruption in countries where the company may set up shop. “In some cases, security has come back and said: ‘We can’t work here without bribing officials,’” said Luchsinger. “We don’t go to those places.” ◆ 24