Dyn - Nov-Dec C pp. 25-64.qxd

advertisement
Destination Security
L
“
adies and gentlemen, welcome to Dallas. Welcome to the ASIS International 56th Annual Seminar and Exhibits, celebrating 55 years of ASIS history,” said
ASIS President Joseph R. Granger, CPP, as he kicked off the event at Tuesday morning’s
opening session. Just before Granger arrived on stage, crowds filled the ballroom
while the Skyline High School Marching Band performed. Next, the flags of more
than 120 nations that are home to ASIS members were posted.
GRANGER TOLD THE AUDIENCE,
“One event, one destination, one
focus—security. Since its founding
55 years ago, our Society has
placed this simple formula in its
long-term plans. As the Society
developed into the leading organization in the security field, it still
concentrated on one event at a
time to make it as productive as
possible….ASIS always strives to
make the investment of time
worthwhile…to enhance the stat ure, standing, and productivity of
security professionals.”
In the 55 years since the Society’s founding, said Granger, “We
have witnessed the growth of our
profession from modest beginnings
to being a key contributor to com-
1
panies’ success, survival, and profitability… Today’s ASIS includes
more than 37,000 members in 128
countries, divided into 47 ASIS regions, and made up of 213 chapters—each one striving for the same
goal originally established by our
founding members 55 years ago.”
The Dallas Symphony Orchestra
then took the stage. Its conductor,
Ron Neal, told the audience that
“We are about to take you on a
journey through five-and-half
decades of ASIS history.”
The orchestra began with selections from the Broadway musical
“Damn Yankees,” which was the
most successful play of 1955. The
1960s were illustrated by selections
from “West Side Story” and The
Beatles’ “Eleanor Rigby.” In this
decade, said Neal, ASIS’s first international chapter was chartered.
The 1970s saw the formation of
the ASIS Foundation, Inc., as well
as strong chapter growth with 56
new charters, including nine new
international chapters. The decade
also witnessed the creation of the
Professional Certification Board,
“international” was added to the
Society’s name, and Security Management magazine celebrated its
20th anniversary, Neal said. He
then welcomed the quartet Max Q
to sing Simon and Garfunkel’s hit
“Bridge Over Troubled Water.”
The orchestra also played “Stars
and Stripes Forever” with a group
of young piccolo players.
ASIS DY NAMICS
The 1980s saw the Society’s
30th anniversary and the election
of its first female president, Darlene Sherwood, CPP. Additionally,
the Security Industry Buyers Guide was
published. The 1990s witnessed
the launch of the Security Insights
program at the Annual Seminar
and Exhibits. Max Q returned to
sing “The Circle of Life” from The
Lion King and selections from ET,
the Extraterrestrial and Beethoven’s
“Ode to Joy.”
The first decade of the 21st century was dominated by the aftermath of 9-11. “ASIS mourned the
loss of its own members,” Neal
stated. The orchestra played the
haunting “Meditation from Thais.”
“By 2005, ASIS had added the
Physical Security Professional® and
Professional Certified Investigator®
designations, introduced webinars,
and added eleven new chapters.”
Neal said. The orchestra finished
by playing “Happy Birthday.”
The Skyline High School Band
then led attendees to the Exhibit
Hall, where Granger cut the ceremonial ribbon. What awaited attendees in the Exhibit Hall, he said,
was a cornucopia of ideas, concepts, products, and services…that
proves the focus of this event is
and always will be security.”
Granger then cut the ribbon
with the help of the ASIS Board
of Directors members, Seminar
cochairs Martin Cramer, CPP, and
Steve Castor, CPP, and the North
Texas Chapter Chair Charles Baxter,
PSP. ◆
Captain Chesley
Sullenberger looks
out at the audience.
Special Keynote
Speakers
T
he ASIS International 56th Annual Seminar
and Exhibits featured thought-provoking keynote
addresses by pilot-turned-hero Captain Chesley Sullenberger and the former President of Pakistan Pervez
Musharraf. For more coverage of these keynotes, see
the December issue of Security Management.
SULLENBERGER
The voice over the radio was calm
and distinct: “We’re going to be in
the Hudson.” Moments later U.S.
Airways Flight 1549 splash landed
in the frigid river. Captain Chesley
Sullenberger, the man who spoke
these words, emerged on stage at
Wednesday’s General Session to a
standing ovation and launched
into a discussion about heroism
and why he believed he had the
right stuff on that cold January
day last year.
Sullenberger told attendees that
NOVEMBER/DECEMBER 2010
the two necessary ingredients of
his success were education and
service. Education has always been
important for Sullenberger. He
noted how education allows people to profit from the mistakes of
others by not having to repeat the
experience. “That’s particularly
true of my profession: we simply
can’t live long enough to make all
the mistakes ourselves,” he said.
Sullenberger, along with his copilot Jeff Skiles, saved the lives of
all 155 people on board the plane
that day because of their commit-
2
ment to their profession and to the
people placed in
their care. “I was
a regular guy who
had done a pretty
good job of preparing himself for
whatever might
come.” On that
day, preparation
made perfect.
What was particularly striking
to Sullenberger is
how he and his
crew’s “Miracle
on the Hudson”
uplifted the nation. In the midst of
a deep recession and the nagging
fear that American competency
was in decline, Sullenberger and
his crew’s quick thinking and
courage gave people faith. “It was
seen as life affirming,” he said.
Since being thrust into the
spotlight, Sullenberger told attendees that he tries to use his newfound influence to better the
world. He was given the American
Spirit Award from the Congressional Medal of Honor Foundation
earlier this year. He says past
Medal of Honor recipients have
set examples he intends to follow.
“They will… tell you that in
many cases the act that earned
them the medal was actually the
easier part,” he said. “It turns out
that the more difficult part was
living every day in such a way
that everyone remembers truly
what the medal stands for.” Sullen berger has become an outspoken
advocate for aviation safety and
for his former comrades in the
cockpit.
MUSHARRAF
An abrupt U.S. withdrawal from
Afghanistan will bring the same
fallout as did the 1989 U.S. departure after a proxy war with the
Soviet Union: instability with ripples of violent extremism around
the globe, former Pakistani President Pervez Musharraf said during
his keynote address Thursday.
3
Musharraf, a former general in
the Pakistani army, led his nation
from 2001 through 2008, serving as
a key ally in the post-9-11 U.S.-led
war on terrorism. He currently
lives in self-imposed exile in England, but recently announced the
formation of a new political party,
and plans to run again for the
presidency at home.
Despite billions in U.S. humanitarian aid to Pakistan in the wake
of the July floods that affected an
estimated 21 million, recent polling
indicates that 59 percent of Pakistanis view the United States as
their enemy. Musharraf traced the
sentiment back to
the departure at
the end of the Soviet-Afghan war,
in which Pakistan
supported Mujahideen rebels along
with the United
States.
In Afghanistan,
Musharraf traces
the persistent political instability
and violence to
the coalition’s installment in 2001
of Northern Alliance members—
tribal Tajiks, Uzbeks, and Hazaras—in government, to the exclusion of Pashtuns, in part because
the Taliban consisted exclusively of
Pashtuns. Musharraf said he repeats again and again: “All Taliban
are Pashtuns. But not all Pashtuns
are Taliban.”
Key to success in Afghanistan is
engagement of Pashtuns and their
democratic inclusion in government as a majority. That requires
bargaining from a position of
strength, which the U.S.-led coalition currently lacks, he said. ◆
Musharaff and ASIS President
Joseph R. Granger, CPP
ASIS DY NAMICS
Aspiring Certificants
Gather for Reviews
H
undreds of people arrived in Dallas be-
fore the official opening of the ASIS International
56th Annual Seminar and Exhibits to attend certification review courses. Those hoping to earn a Certified Protection Professional® (CPP), Professional
Certified Investigator® (PCI), or Physical Security Professional®
(PSP) designation gathered at the Hilton Anatole for the sessions. A CPP review course was also offered in Spanish.
THE CERTIFICATION REVIEW
program drew more than 230 people and covered topics relevant to
the exam. One such attendee was
Lloyd Phelps of Phelps Security,
Inc., in Memphis, Tennessee.
Phelps, who sat in on the CPP review course, plans to take the
exam in three months. “This review has provided me with great
information,” said Phelps.
Phelps noted that it is just one of
his methods for exam preparation.
“I’m using this review in conjunction with my own study efforts,”
he said. “This is helping me focus
NOVEMBER/DECEMBER 2010
in on the areas I need to work on.”
Michael Nagina of Tuscany RPO
in Calgary, Alberta, Canada, has
been attending CPP review sessions
sponsored by his chapter. “The information I have been given here
follows the domains I have been
studying,” he said. “The topics are
similar to those in my CPP review
materials. This makes me feel more
confident about the studying I’ve
been doing on my own.”
Another attendee, Martin Des lauriers, regional security director
for Brinks Canada in Brossard,
Quebec, Canada, was pleased with
the program presenters. “This is
an excellent review,” said Deslauriers. “The speakers are very knowledgeable and the information is
relevant.”
Albert Matthews, an electronic
security systems consultant with
JEL Protection in Victoria, British
Columbia, Canada, says the review
has helped him refocus on important main points. “This is important because I plan to retake the
exam immediately,” he said.
Matthews took the exam two
years ago, but says that he “didn’t
prepare properly.” This time
around, he’s studied on his own
and taken the review course.
The other review sessions also
garnered praise. Valerie Greene of
Capital One in New Orleans, Louisiana, came to Dallas to take the
PSP review course. “This course is
organized and the instructors are
well-informed,” she said. “I will be
well-prepared the next time I take
the test.” ◆
4
ASIS Leaders
Applauded
Granger (center) with the winners of the President’s Awards of Merit.
A
t Wednesday’s luncheon, ASIS International President Joseph R. Granger, CPP,
announced the Board Management Committee of the Board of Directors for 2011.
Having completed his term as the Society’s president, Granger will become the
chairman of the Board. Granger is the current director of security for the United
Space Alliance, which is NASA’s Space Shuttle contractor with primary locations at
the Kennedy Space Center, Florida; Johnson Space Center, Texas; and Marshall Space Flight
Center, Alabama. Granger has previously served as ASIS’s president-elect, treasurer, and secretary, as well as a Board member.
THE 2011 PRESIDENT WILL BE
Raymond T. O’Hara, CPP, executive vice president, international operations and consulting and investigations, for Andrews International
of Palm Desert, California. He becomes the ASIS president after
serving as president-elect, secretary,
treasurer, and a Board member.
The Society’s president-elect in
2011 will be Eduard J. Emde, CPP,
consultancy manager for Interseco,
Wassenaar, The Netherlands.
Emde is on the ASIS Board as the
current treasurer, and has served
as its secretary.
Moving into the treasurer’s post
is Geoffrey T. Craighead, CPP, vice
president of Universal Protection
Service of Santa Ana, California.
5
Craighead is currently the Society’s
secretary and was a Board member
before his election to the Board
Management Committee.
The final member of the committee was elected Monday at a
meeting of the Board. He is current
Board Member Richard E. Widup,
Jr., CPP, senior director of security
operations/corporate security for
Purdue Pharma LP of Stamford,
Connecticut. Widup will serve as
the Society’s secretary in 2011.
Stepping down from the Board
is its current chair, Michael R.
Cummings, CPP. “Few things that
I have done in my lifetime have
given me as great a sense of satisfaction as working with such an
impressive, wonderful, and dedi-
cated group of volunteer leaders as
I have had the pleasure to meet
during my years with ASIS,”
Cummings told attendees. “This
event is the last major function in
my voluntary service to the Society. The time has come to move
on and allow others to guide ASIS
International into the future.”
The formal installation of the
2011 officers and directors, as well
as the presentation of the 2010 financial report, will take place at
the Annual Meeting of the Membership on January 20, 2011, at the
Ritz-Carlton Hotel in Arlington,
Virginia.
Granger then asked ASIS Past
Presidents, members of the Professional Certification Board, council
ASIS DY NAMICS
chairs and vice chairs, senior regional vice presidents, regional
vice presidents (RVPs), assistant
RVPs, chapter chairs, and chapter
officers to stand and be recognized
for “all of your time, effort, creativity, and dedication.”
Next, Granger told the audience
that he would exercise “one of the
privileges I truly enjoy as the president of this Society” by singling
out members for special recognition with a President’s Award of
Merit.
“Education is the bedrock of
this organization. So this year, I
want to recognize a group of
members who have devoted themselves to…ASIS International and
its members by providing high
quality educational offerings over
many, many years,” he stated.
Granger then called to the stage
the award winners: Phillip Banks,
CPP; Curt P. Betts; James R.
Bomba, CPP; Philip S. Deming,
CPP; Anthony J. DiGregorio, CPP;
David H. Gilmore, CPP; Richard
P. Grassie, CPP; Milton E. Moritz,
CPP; Howard A. Moster, CPP,
PSP; Robert Oatman, CPP; David
G. Patterson, CPP, PSP; Charlie R.
A. Pierce; Dennis D. Shepp, CPP,
PCI; and Basil J. Steele, CPP.
“Although there are many other
members who also answer the call,
today we recognize this group as
among our best—members who are
always willing, always able, and always productive,” Granger said. ◆
Michael R. Cummings, CPP, Chairman
of the Board, addresses attendees.
NOVEMBER/DECEMBER 2010
Press Room
Highlights
T
he press room at the Dallas Convention Center
during the ASIS International 56th Annual Seminar and
Exhibits was the place to be for the latest announcements from leading security companies. Executives
took time out of their schedules to talk to members of
the media during a series of press conferences held throughout the week. Following are some of the highlights.
XTRALIS
Xtralis, which specializes in the
early detection of fire, gas, and
physical threats, launched a new
hybrid camera and an environmental hazards detector at this year’s
Seminar and Exhibits.
Founded in 1980, the company
has more than 350,000 systems installed at more than 100,000 customer sites in 100 countries around
the world. Xtralis products are
used to protect more than 3 billion
square feet of corporate space.
“More than 80 percent of the
world’s semiconductor manufacturing facilities use our products,” said
Ian Ehrenberg, senior vice president
and general manager for Xtralis.
Ehrenberg introduced the company’s V3100 Hybrid camera sys-
tem. A merger of IP and analog
cameras, the camera has standard
capabilities but also includes postmotion analytics. “This allows for
a highly effective search of events
and recorded images within a large
amount of stored video,” said
Ehrenberg.
The camera also has a feature
that detects loitering. For example,
the camera can be programmed to
alarm if someone loiters for more
than three minutes in a company’s
lobby.
Xtralis also launched its new
ECO gas detection system. Designed for numerous types of facilities, from underground utilities to
warehouses, parking lots, and
manufacturing firms, the product
can detect 10 different types of
6
gases. Each unit can detect two
different gases. Several units can be
used in a facility. The units can be
integrated into HVAC and other
building management systems to
help companies save money. For
example, a unit could be used to
detect carbon dioxide levels, gauging the number of people in the
building and adjusting the air conditioning system accordingly.
KEENEO
Keeneo, of Sophia-Antipolis Cedex,
France, made an announcement
related to its line of smart software
that can help improve the analytical
ability of video software platforms.
The product can now work with
a software platform from the vendor Milestone.
Keeneo’s SafeZone video software offers patented 4D technology
that can intelligently analyze videos
in terms of space, including depth,
width, and height, as well as with
time. Keeneo’s software can also
count vehicles and cars moving
through an area, for example.
The software can give users the
ability to design their own security
rules, said Dick Salzman, CPP, the
company’s vice president of marketing. A company can specify a
minimum amount of time necessary, for example, in which a person or vehicle can be in a certain
area before the software produces
an alarm.
Keeneo can help make security
video more proactive, rather than
after-the-fact, said Salzman. The
software can analyze one or several surveillance scenarios simultaneously using single or multiple
analog, Internet Protocol (IP), or
thermal camera streams, according
to the company.
Milestone’s software, XProtect,
with which Keeneo can be integrated, is an IP-video management
platform designed for large-scale,
multisite installations.
BROWNYARD GROUP
Also introduced at the Seminar
and Exhibits was the Brownyard
Educational Center. It consists of
7
a comprehensive library as well as
continuing professional certification
and degree programs.
The Princeton, New Jersey-based
center is being launched by the
Brownyard Group, an insurance
group for the security profession,
as well as Cardinal Point Strategies,
a risk management and consulting
firm working in national security.
The center features three educational partners: CiNet’s Professional
Security Training Network, Kaplan
EduNeering, and Kaplan University.
Courses range from a continuing
education certification on workplace safety issues to a master’s
program in homeland security.
Training standards and industry
regulation have failed to keep up
with the growth of the security
industry since the 9-11 attacks, said
Paul Goldenberg, president and
CEO of Cardinal Point Strategies.
But, he said, in many violent and
other situations, it is going to be
someone from the security profession “who will be there to save a
life.”
Security professionals often find
themselves under-trained and overexposed to risk, liability, and litigation, said Brownyard Group CEO
Brendan Brownyard. He noted that
the center was designed to reduce
such risks and also to help improve employee productivity and
retention and to give participating
firms an edge when competing for
contracts.
VISITOR PASS SOLUTIONS
Another vendor, Data Management,
Inc. (DMI), recently made some
improvements to its line of VisitorPass time-expiring paper badges.
The new passes include a tab
that extends from one end of the
badge’s self-adhesive label. After information is printed on the badge,
the label can be folded around onto
the badge’s back. This starts a
Experience Pays Off
A
spirited group of members from
the North Texas Chapter worked
with ASIS International staff on
the many details and logistics involved in
producing the 56th Annual Seminar and
Exhibits. Two experienced volunteers
stepped up to take on lead assignments as
Host Chapter Committee cochairs: Martin
Cramer, CPP, director of public safety for
Downtown Dallas, Inc., and Steve Castor,
CPP, national security director, CB Richard
Ellis.
Both men took on their assignments
knowing what to expect, since they had
filled similar roles when the event was held
in Dallas in 2004. “The process has been
streamlined quite a bit,” says Cramer,
whose main responsibilities included coordinating public relations and recruiting law
enforcement assistance. In his current position, Cramer supervises a staff of 50 officers who are responsible for patrolling the
downtown streets, and these knowledgeable officers staffed the information booth
in the registration area.
Castor’s main role was to recruit other
assistance from the chapter. According to
Castor, “there was no shortage of great vol-
unteers,” who responded to a blurb in the
chapter newsletter and announcements at
meetings, including Chapter Chair Charles
Baxter, PSP, and Vice Chair Greg Lilyhorn.
Even with a detailed “playbook” from
ASIS headquarters, one important task still
fell to the chapter: stuffing the packets
handed to each attendee at registration
with pens, pads, and programs. A cadre of
chapter members arrived on the weekend
before the Seminar and Exhibits to complete this critical task.
Special thanks belong to Castor and
Cramer along with the following committee members who coordinated various
components of the Seminar and Exhibits:
ASIS Foundation Golf Tournament:
Wally Cornwell, business development
manager, Securitas Security Services.
Door Prizes: George Quin, Jr., CPP, security education and training, Lockheed Martin Aeronautics and ASIS Regional Vice
President for Region 6.
Hospitality: Frank Garza, senior security
manager, CB Richard Ellis Asset Services.
School Security Funding Competition:
Archie Green, security director, CBRE-Premier Place. ❖
ASIS DY NAMICS
chemical process that, about 12
hours later, makes the badge manifest the word “void” on the front.
Although the expiring badge
technology was invented almost 30
years ago, the badge and the tab
used to always be two separate
pieces, said Brian Gallagher, DMI’s
president. Having the tab extend
from the badge can reduce errors
and improve efficiency, he said,
helping make the activation “virtually foolproof.”
The expiring pass can help prevent people from trying to regain
admission into a facility the next
day without authorization, said
Gallagher. In some cases, it can
also eliminate the need for people
to collect badges after an event.
NC4
NC4, a provider of situational
readiness solutions for risk management, unveiled its new NC4
Risk Center. The center repackages
some of the company’s existing
risk-based functions and adds new
functionalities. The new center includes additional global predictive
intelligence and enhanced analysis
and threat information. It also includes a new component that assists customers with travel risk
management.
The center can help customers
quickly learn about threats to assets, operations, suppliers, and employees, according to NC4. It can
also help ensure business continuity and streamline risk-related decisions, representatives said. NC4 has
provided situational awareness and
alert notifications for more than 10
years and operates two incident
monitoring centers on the East and
West coasts.
CNB TECHNOLOGY
CNB Technology, a leading manufacturer of advanced security products and solutions discussed its
best-selling product lines and new
technologies. Included in these announcements was a new network
IP-video solution that introduces
enhanced resolution and a new
hybrid digital video recorder. ◆
NOVEMBER/DECEMBER 2010
Guiding Young
Professionals
T
he Young Professionals’ Leadership Series debuted at the ASIS International 56th Annual Seminar
and Exhibits on Monday afternoon with a discussion
based in part on the book Leadership Code: Five Rules
to Lead By, by Dave Ulrich. The talk, led by Philip S.
Deming, CPP, of Philip S. Deming and Associates, focused on
“Critical Success Strategies for Effective Leadership.”
DEMING RECOMMENDED 10 steps
to effective leadership: know
yourself, study and understand
the organization’s dynamics, diagnose the business environment,
build your credibility, develop
working relationships, design a
system for aligning resources,
build your team, create supportive
alliances, maintain equilibrium in
life, and create value for the organization.
Knowing oneself is a key piece
to good leadership, says Deming.
But it’s not enough to just be
aware of one’s strengths and weaknesses; it’s important to also serve
as a model for the other employees. As an example of a failure to
do this, Deming spotlighted the
recent stories about the head of
Hewlett-Packard pushing austerity
in the company while bringing in
questionable hires and spending
8
lavishly on meals and trips.
Awareness of one’s weaknesses
allows a manager to seek counsel
in areas he or she is weaker,
rather than fall into a trap of
spending excessive time micromanaging in areas of strength. It’s
also important to be open to other
viewpoints, Deming said. “When
you get in an organization, your
first reaction is to say ‘I know the
right answer,’” says Deming, who
advises, “don’t assume you know
the right answer.”
Deming emphasized the importance of seeking out a mentor.
Professionals must decide whether
they want a mentor within their
organization who has information
to draw from or a mentor from
outside who can bring different
experiences, he said.
Mentoring was the focus of the
Young Professionals’ Reception following Deming’s talk. In an ASIS
version of speed dating, the attendees were matched up at tables
with potential mentors for several
members and then moved onto
other tables to learn about topics
such as certification, women in
security, councils, and career path
planning.
Ryan Walker attended because
he will soon be taking on the role
of security systems administrator
at Sho-Me Power Electric Cooperative in Marshfield, Missouri.
“You’re sitting down with these
people who are knowledgeable,
and it’s a relaxing environment
where you can get beneficial information to [help you make] those
smart strides in your career,” says
Walker.
Angel Toledo, of PDVSA, Vene zuela’s state-owned petroleum
company, is eager to meet other
young professionals in the same
industry to learn from their experiences, as well as to find out
more about gaining ASIS certifications. He found the mentoring
program helpful because he came
to the Seminar and Exhibits
armed with many questions and
the session provided a forum for
obtaining the answers. ◆
9
Accolades
Awards
Representatives of Accolades-winning companies onstage in Dallas.
T
he winners of ASIS International’s 2010 Accolades
awards were announced at the ASIS 56th Annual
Seminar and Exhibits. Exhibitors were invited to submit products and services introduced within the past
year to a team of judges who evaluated the submissions. The judges, who were all ASIS members, represented
end users as well as experts in security product and service
research and development.
COMPANIES WERE ASKED to comment on the technology’s value to
users, explain its novel features, and
describe a specific security problem
that would be solved through its
application. Each entry was also
accompanied by a description of
key features or benefits, a data
specifications sheet, and appropriate images. If a case study or white
paper had been written on the
submission, it could be included
with the application along with
recognition from other sources.
“This year’s program was very
competitive, as entrants continue to
push the envelope in their respective disciplines,” observed Accolades Cochair Ron Lander, CPP.
“In particular, video surveillance
performance is advancing at a rapid
pace, offering enhanced analytics
functionality and better resolution.”
Cochair Howard Belfor, CPP,
noted, “The continued blending of
emerging technologies into readily
available products and services is
striking. The ubiquity of network
and IP-centric solutions in security
is more evident than before.”
Cisco Systems, Inc., won with
the Cisco IP Interoperability Collaboration System (IPICS) 4. The
product is a scalable, comprehensive
solution for communications interoperability that streamlines radio
dispatch operations and improves
response to incidents, emergencies,
and facility events.
The MiY-ID from Cogent Systems, Inc., was honored. It is the
company’s latest outdoor multipurASIS DY NAMICS
pose, multifunctional biometric
access control reader. With its
ground-breaking “Make it Yours”
application development platform,
MiY-ID can virtually interface with
any PACS and government credentials such as PIV, TWIC, and CAC.
Cross Match Technologies, Inc.,
won with SEEK II, which captures
and matches identities on fingerprints, irises, and facial images. The
product can support a database with
up to 120,000 biometric identities
and can communicate with remote
matching databases through WiFi,
3G, and satellite communication.
Dedicated Micros was lauded
for its Closed IPTV SD Advanced
system—a hybrid DVR/NVR video
security system that discovers and
assigns IP cameras to network
ports. It supports multiple IP and
analog video channels, HD IP
camera recording, HDMI output
and more.
The winning entry from Firetide
was the Firetide IVS-100 MIMO.
The product is an integrated highperformance wireless video-surveillance solution that delivers up to
300 Mbps outdoors for real-time,
evidence-grade video. The product
can be used with high-end pantilt-zoom analog or IP cameras and
incorporates an encoder with integrated 40 GB storage.
FLIR Systems, Inc., was honored
for its ChromaNox Color IP Night
Vision security cameras. ChromaNox cameras produce high-quality
color or monochrome video in
lighting conditions from daylight
to starlight without the need for
additional illumination.
The V2216 Analog/Digital Coexistence VMS by Infinova was praised
for allowing security to migrate to
IP video using existing analog control room equipment to manage
both the analog and digital equipment without retraining. Infinova’s
V2216 VMS allows IP and analog
cameras and equipment to coexist.
Laipac Technology won for its
S-911 Bracelet Locator, a powerful
multipurpose quad-band bracelet. Its
design was based on requirements
from law enforcement agencies and
NOVEMBER/DECEMBER 2010
health authorities. Its features include
voice and data communications, a
motion sensor, tamper detection,
and data encryption in a water
resistant enclosure with a built-in
LCD display. The Bracelet Locator
uses assisted GPS technology.
Next Level Security Systems
was commended for its NLSS
Gateway, which correlates information from multiple subsystems—
video surveillance, access control,
analytics, audio, and intrusion—
into a single networked platform.
Its features can be accessed and
controlled from anywhere through
a Web browser. The product includes advanced deployment tools
such as autodiscovery, autoprovisioning, and configuration backup.
VerifiIR from Sarnoff Corporation was also an award winner.
The new product facilitates the
real-time surveillance of individuals
in crowds in unstructured environments without the subject’s cooperation or knowledge. It also aids in
the detection of body armor and
weapons, including an improvised
explosive device (IED) carried by a
person, as well as buried materials.
The all-weather, mobile system
eliminates the ghosting effect of
fused imagery and can be mounted
on vehicles or installed at stationary points. ◆
John A. Petruzzi, Jr., CPP, ASIS Foundation Board treasurer (center), receives a donation
from the Northern Nevada Chapter. Darrell A. Clifton, CPP, chapter vice chair (left), and
Doug R. Laird, Sr., CPP, Regional Vice President of Region 2, deliver the check.
Chapters Donate to Foundation
T
he ASIS International Foundation, Inc., wishes to thank the 14 chapters that have
generously contributed funds during this year’s Annual Chapter Donation Appeal.
Every year the Foundation seeks support from ASIS chapters worldwide to ensure
the continuation of the many programs, awards, research, and scholarships it delivers.
Although the Foundation exists to advance the entire security industry and not just
ASIS members, a number of Foundation activities are specifically designed to provide
chapters with tangible benefits, including the Bordes, Cross, and Walsh awards and the
chapter matching scholarships. These programs are dependent upon donations, so contributions are necessary to avoid cuts in award amounts.
During the ASIS 56th Annual Seminar and Exhibits in Dallas, chapters that participated
in this year’s appeal were invited to the VIP Lounge on Thursday to meet the Board of
Trustees. Donors had a special reserved table at Thursday’s luncheon and were acknowledged during a special presentation.
It’s not too late to donate. The Foundation can accept donations from chapters, individuals, and corporations any time during the year.
Thanks go out to the following chapters for their support: Ark-La-Tex; Boston; Calgary/ Southern Alberta; Central Illinois; Central Pennsylvania; Chicago; Columbus; Fredericksburg/Quantico; Greater Philadelphia; Houston; Memphis; Palm Beaches Florida; Providence; and San Antonio. ❖
10
A Step Back in Time
ASIS President Joseph R.
Granger, CPP, his wife L.J., and
Randy Dorn of the evening’s
sponsor, AlliedBarton, get a
lift from the Clydesdales.
G
uests at Tuesday night’s President’ Reception, sponsored by AlliedBarton,
time-traveled more than a century to the Dallas Heritage Village, which provides a
living history version of life in North Central Texas from 1840 through 1910. Attendees experienced Dallas when it had general stores, saloons, and gunfights along
Main Street. It was only when partygoers overheard nearby banjos playing “New
York, New York” that they were reminded it was the 21st century.
THE HIGHLIGHT OF THE EVENING
for many was when ASIS President
Joseph R. Granger, CPP, rode into
the event atop a wagon pulled by
the famous Anheuser-Busch
Clydesdales. Granger shared space
on the wagon with his wife, L.J.,
and Randy Dorn, west division
president of AlliedBaron, while
members of the crowd cheered him
on. There were plenty of photo
opportunities with the horses, as
they trotted their white-stocking
feet throughout the park.
Guests mingled around numerous food stations that featured
catering by Eddie Deen, or took a
tour of the houses and sites. Arma dillos scampered by, and members
had photos taken while they rode
steers.
11
Also of note was a cigar fundraiser, sponsored by the ASIS Military Liaison Council, which raised
funds for the ASIS Foundation,
Inc., and also for the Wounded
Warrior
Project. The
project provides aid
and awareness for injured service
members.
The President’s Reception is an
opportunity
to see old
friends, according to
Jeffrey L.
Larson, PSP, manager of physical
security and safety at Midwest
ISO. “It’s a great time…the President’s Reception allows us to reconnect with folks we haven’t seen
ASIS DY NAMICS
in over a year.” According to Larson, ASIS provides resources he
can consult when he is dealing
with unfamiliar issues. “I’ll reach
out to one of my peers and say ‘I
have this topic going on, can you
send me some information?’ And
most definitely they’ll get back to
[me].”
Sarah Vogt, associate manager
of security at Noven Pharmaceuticals, also credited the Seminar and
Exhibits for its networking opportunities. “The educational tracks
both here and in general that
[ASIS offers] throughout the year
are very informative and help you
if you’re starting out.”
Keith Kambic, CPP, director of
security at Willis Tower (formerly
the Sears Tower) in Chicago, was
looking forward to hearing the
keynote speakers as well as checking out the new technology in the
Exhibit Hall. He said the President’s Reception is “fantastic every
year…ASIS does it very well.”
The CSO Roundtable hosted
an exclusive party for members at
Brent House, where hors d’oeuvres
were proffered while the most
senior security professionals caught
up with each other.
Ed McDonough, CPP, director
of global security for Tyco International, chatted with his peers at
the CSO Roundtable party. McDonough said he planned on attending sessions regarding security
in Mexico. “It’s a big trouble spot
for our company,” he said. McDonough stressed the importance of
networking as well as giving back
to the Society through volunteering. He applauded the night’s festivities. “The reception’s been
amazing. It’s a beautiful atmosphere and it’s a perfect night….
The food’s been outstanding, and
the Clydesdales—what can you say
when you walk in and they’re
right there? It was great…the atmosphere is always fun; it’s a fun
group of people, but they’re professional,” said McDonough. His
remarks were punctuated by a loud
bang—the gunfighters were at it
again. ◆
NOVEMBER/DECEMBER 2010
Enthusiastic
golfers get ready
to compete in the
ASIS Foundation’s
golf classic.
Golfers Tackle
Cowboy’s Club
O
n Monday morning, 147 golfers descended on
the Cowboy’s Golf Club as part of the sold-out Annual ASIS Foundation, Inc., Golf Classic. The golfers
formed up into four-player teams to tackle the first
and only NFL-themed golf course.
VIP PLAYERS INCLUDED ASIS
Chairman of the Board of Directors
Michael R. Cummings, CPP; ASIS
Treasurer Eduard Emde, CPP; and
Board Members Chad Callaghan,
CPP; Geoff Craighead, CPP; and
David C. Davis, CPP, as well as
John Petruzzi, CPP, from the ASIS
Foundation Board of Directors.
Securitas USA Chairman Don
Walker, CPP, also golfed and
brought 10 foursomes from his
company with him.
This year it was the team from
BAE Systems—made up of Kris
Busch, John Gallagher, Doug
Long, and Daryle Wingerter—who
took first place in the scramble.
Scott Straight, Bobby Dale, Greg
Weil, and Lynn Kresse from Protection One finished second, while
Victor Glover, Mike Castaneda,
Leland Gannaway, and Jeff Leon ard of Securitas rounded out the
winner’s circle.
The golf classic also featured individual contests of strength and
precision. Stuart Bostock from The
Security Center Ltd. earned the
prize for longest drive in the men’s
division. Protection One’s Lynn
Kresse followed suit, winning the
longest drive prize in the women’s
division.
ASIS Foundation Program Manager Barbara Buzzell thanked all the
Golf Classic’s sponsors for their
generous support. Andrews International sponsored the bags, BAE
Systems sponsored shirts, and
ARATA provided the Warbird golf
balls. Breakfast and lunch were
sponsored by Niscayah and Nasatka
Barrier, Inc., respectively, while
iView took care of two beverage
carts. Magicard-Ultra Electronics
also offered generous support,
sponsoring the longest drive hole,
as did Wyndham Jade and EPIC,
who each sponsored a hole. ◆
12
ASISPAC Dinner
Helps Raise Funds
Jeffrey Slotnick, CPP (left), reaches
out to ASISPAC dinner attendees.
W
ith only a few weeks before the congressional midterm elections, about 25 members gathered in a private dining room at the
Dallas Chop House on Monday, October 11,
for the 4th Annual ASISPAC dinner.
JACK LICHTENSTEIN, vice presi-
dent of government affairs and
public policy for ASIS International, thanked everyone for their
generous contribution, noting that
65 to 70 members continually support the PAC and its mission. But
he reserved his praise for the members surrounding him. “The people
in this room are really the core of
that support group,” said Lichtenstein. “You are the rocks who have
been there for us.”
Created in 2005, the PAC has
raised more than $30,000 from U.S.
ASIS members to advance the interests of security professionals on
Capitol Hill. The PAC dinners
have raised about half of that total.
Surveying the political landscape
over the last year, Lichtenstein
said it’s been a “bizarre” one for
security. “Security issues, either
13
national security or homeland security, really haven’t been a part of
the current Congress’ agenda.”
Lichtenstein wants to build a
stronger ASISPAC to ensure ASIS
has input into any security legislation that affects ASIS members as
well as helping to elect members of
Congress friendly to the industry.
“The key to success...is networking: so talk to your friends, talk to
your colleagues, talk to your contacts, and get them interested,” he
said. “If every person in this room
gets just one more person to contribute, you double the impact of
your contribution.”
Theresa Deehan, the vice chair
of the ASIS Educational Institutions Security Council, said she
supports the PAC because it’s important for security professionals
to make their voice heard when
legislation affects their jobs.
As local and state governments
cut back on police forces, Deehan
believes, private security will be
called upon to “fill the gaps.” If
that occurs, private security training and certification could become
a national issue, and she wants to
ensure that private security has the
training and professionalism to
fulfill that role. The ASISPAC can
help that happen, she said.
Jeff Slotnick, CPP, also addressed the PAC supporters to
thank the ASISPAC for helping
him prepare to testify before the
U.S. Congress a year and a half ago
on critical infrastructure protection.
He said Lichtenstein and Kristin
Watchorn, legislative manager for
ASIS, were instrumental to getting
him prepared.
Lichtenstein said that’s what the
ASISPAC is for and encouraged
members to reach out to the PAC
office whenever they have questions regarding public policy or
interactions with the federal government. “We serve you, so let us
know.” ◆
ASIS DY NAMICS
access control that
can be used with
badging. “I’m just
trying to get a feel
for what’s out there
now,” said Abraham,
who said she was
also eager to meet
and greet others she
might be able to
gain ideas from.
Humberto
Botello, manager of
security operations
for Takeda Pharmaceutical Company in
Deerfield, Illinois,
came to Dallas to
network and see
what vendors have
to offer, but he is
also interested in attending educational
sessions regarding
current conflicts in
Mexico related to
the drug cartels and
security. “We just
ventured into Mexico within the last
year…so, we need
to get a better [understanding of ]
what security really
is in Mexico,” said
Botello.
Chris Schwarz is a security operations supervisor for Urenco
USA. He’s been a member for
about a year and decided to attend because his organization
Rocking
Receptions
N
ew members of
ASIS International
and first-time attendees mingled on
Monday night, getting to know each other prior
to the official start of the
ASIS 56th Annual Seminar
and Exhibits in Dallas.
cialist in charge of VIP visitors at
the U.S. Census Bureau, U.S. Department of Commerce, is a new
member looking forward to scouting out some different types of
Cheryl D. Elliott, CPP, PCI, chats with ASIS Treasurer Eduard J. Emde, CPP.
ASIS PRESIDENT-ELECT Raymond
T. O’Hara, CPP, welcomed attendees and reminded them to take
advantage of the many educational
opportunities and networking
events on offer at the Seminar and
Exhibits, as well as the numerous
programs put on by ASIS throughout the year.
Eartha Abraham, security speNOVEMBER/DECEMBER 2010
14
wants to become more involved in
ASIS. Schwarz said he planned on
checking out the exhibit hall and
sitting in on educational sessions.
Steve Rients, CPP, manager of
security training for BAE Systems,
Inc., has been a member for four
years but this was his first Seminar
and Exhibits. “I want to learn
more and make my training more
effective,” said Rients, who is hoping to gather information about
information systems security that
his company’s employees can use
as the first line of defense against
attacks. “Every time there’s a session on that topic, I’m going to
go,” said Rients.
Hundreds of attendees gathered
at the Welcome Reception to kick
off the event in style. Refreshments
were plentiful as attendees networked while being entertained by
jazz band The Texas Gypsies.
Jennifer Hayes, security integrator at Engineered Protection Systems in Michigan, is a regional vice
president (RVP) for ASIS. “[The
Seminar and Exhibits] is a good
opportunity for me to connect
with people from my area as well
as people outside my area.”
Larry Schwabauer, senior security professional at Pfizer, came to
network. He said that he also
looked forward to seeing new
technology and “getting acclimated
to the different types of security
features that are out there.”
Klas Nilsson, CPP, PCI, PSP,
founder of the security firm Security Manager in Sweden and chapter certification representative and
webmaster for ASIS’s Sweden
Chapter, has been an ASIS member for several years and has attended the Seminar and Exhibits
every year since 2004. Nilsson
found the preseminar intensive on
security consulting to be helpful.
“Even though I’ve been a security
consultant for 15 years, I managed
to pick up quite a few things there
to help me grow my business….
[This is] the place to be if you
want to keep on track and actually
ahead of what’s happening in the
industry.” ◆
15
Intensives
Offer
Insight
Investigator David E.
Lewis outlines his method
for detecting deception.
A
ttendees seeking in-depth information on cer-
tain topics arrived early in Dallas to take part in
preseminar intensives—courses prepared by experts
in issues ranging from consulting to protecting
houses of worship. The intensives were held at
the Hilton Anatole and the Dallas Convention Center on the
Sunday and Monday before the official opening of the ASIS
International 56th Annual Seminar and Exhibits. Topics covered included detecting deception in investigations, starting
a security consulting company, protecting faith-based organizations, facility security assessments, and threat assessments
and response.
WOMEN IN SECURITY
On Monday afternoon, the Dallas
Convention Center was the place
to be for all aspiring women in the
security field. The ASIS International CSO Roundtable’s Preseminar Intensive offered a wealth of
good advice and ideas for today’s
professional females aiming to suc-
ceed in their careers.
The events began with the introduction of the speakers for the
first session, “How to Promote
Yourself.” They were Kathy Lavinder, executive director of Security
and Investigative Placement Consultants, LLC, of Bethesda, Maryland, a retained search firm deASIS DY NAMICS
voted to finding and placing highly
qualified experts in security and
investigation; Stephanie Angelo,
president and owner of the consulting and training company Human Resource Essential, LLC, of
Chandler, Arizona; and Ed McDonough, CPP, director of global security for Tyco International Ltd.,
of Princeton, New Jersey, a diversified, global company that provides
vital products and services to customers in more than 60 countries.
Angelo began by giving attendees an honest picture of how recruiters sort through the résumés
that arrive for an open position.
She asked the audience if they
thought that she spent five minutes,
a minute, or 30 seconds looking at
each résumé. The truth, Angelo admitted, was none of these. She said
she spends about 15 seconds per résumé. “If certain things don’t pop
off the page, they go in the ‘thanks,
but no thanks’ pile,” Angelo stated.
The candidates who will make
the cut send a résumé and cover
letter that is customized for that
company and position. “You need
to do your homework—or rather
eyework—to find out about the
company and know who you are
talking to,” she explained. Among
the ways to do this, she suggested,
are including a quote from the
company’s annual report or from
the job description.
When reviewing résumés, Angelo said, prospective employers do
not want to see a reverse chronology of the applicant’s work history.
“Companies want to know what’s
in it for them. What did you accomplish for a past employer that
you can do for them? Past behavior is the best indicator of future
behavior. They want to know if
you saved money for the organization, or if you managed with five
employees when there used to be
10—quantitative things.”
Angelo cautioned her listeners
against “cutesy,” saying that using
fancy fonts or colored paper résumés, for example, “no longer
work.” She suggested using a good
stock white paper with a single
font in three formats—for example,
regular, bold, and italic. She told
listeners that the cover letter needs
to speak to the person who is receiving it. It should not be addressed to “dear sir or dear ma’am.”
It should also highlight accomplishments that don’t fit on the résumé.
Next, Lavinder focused on selfpromotion. “I want to talk about
what self-promotion is and isn’t
and what it can do and can’t,” she
explained.
Lavinder said that she has met
many women who say that they
cannot be self-promotive. “They
say ‘It’s not in my nature; it’s not
in my culture’—I tell them to get
over it. You have to do it to get
recognition and promotions.”
Women needed to be self-promotive both in the company and
Lorrie Bentley-Navarro, CPP (left), and Natalie
Runyon spoke during the Women in Security
preseminar intensive.
NOVEMBER/DECEMBER 2010
outside of it. “If you don’t do it, no
one else will. Let people inside
know about your contributions
and skills,” she prompted, saying
that there are ways to do this that
do not appear overly aggressive or
self-serving.
“How you say it is as important
as what you say,” Lavinder explained. As an example, she noted,
rather than saying to “your boss’s
boss that you worked all weekend
to make sure that the company
didn’t end up on the front page of
the newspaper, say that ‘We
dodged a bullet the other day, but
we became aware of the situation
and we worked to correct it.’” In
this way, the employee stresses that
she is a team player who is bringing value to the organization.
Lavinder also told attendees that
certain behavior gets results. “You
should project confidence, say
what you need to say, and then
stop. Believe in yourself. Use humor, storytelling, and creativity,”
she noted.
Externally, Lavinder said, women
needed to network, volunteer, and
make themselves “thought leaders”
in their industry. She highly recommended participating in LinkedIn’s forums. “There is no downside
to doing this,” she stressed.
McDonough stressed professionalism. “It’s the key element in getting noticed in a positive way.
People think that that is someone
valuable who can add to the organization,” he said.
He coached the attendees to
“be confident, but not cocky. Be
assertive but not aggressive…. Stay
composed, be cool under pressure.
In the security world that is very
important. You inspire confidence
that way.” McDonough also said
that is important to communicate
effectively in writing and in presentations. He also stressed finding
a mentor within the company who
can be consulted, and to mentor
others in return.
McDonough stressed the importance of networking and looking
for opportunities to volunteer.
“ASIS can provide so many oppor-
16
tunities to do this through ASIS
councils or with the local chapters,” he said.
Later in the day, attendees heard
about “Staying Competitive While
Managing the Work/Life Balance,”
from experts Natalie Runyon, vice
president of leadership and training
for Goldman Sachs; Lorrie BentleyNavarro, CPP, deputy director of
security, SAS Institute; and Normadene Murphy, manager-in-charge
for Guardsmark. This was followed by an open session and a
networking reception sponsored by
Accenture, a global management
consulting firm.
DETECTING DECEPTION
Through instruction and practical
exercises, attendees at the session
on “Detecting Deception in Verbal
and Written Statements,” learned
tips and techniques for ferreting
out lies during investigations.
On Sunday, presenters John Dietz, CPP, president of Dietz and
Associates, and investigator David
E. Lewis, outlined their method
for detecting deception through
written questionnaires and interviews. Investigators should ask
suspects to fill out a questionnaire
containing a predetermined set of
questions. The suspects should use
an ink pen to fill out the questionnaire and should be instructed to
mark out any errors with a
straight line. The information that
suspects choose to strike out can
be valuable to the investigation, according to Dietz, indicating levels
of stress or attempts at deception.
Attendees also learned how to analyze sentence structure, verb
tense, and pronoun usage to tell
whether someone is lying.
During Monday’s session, attendees used this information to analyze questionnaires from actual investigations. For example, attendees
went over questionnaires gathered
in an incident of workplace theft.
Dietz guided the attendees through
the process. He stressed that while
individual questions may indicate
deception, it is important that the
investigators look at the question-
17
naire as a whole. “Keep an open
mind and look at the entire document for signs of deception,” said
Dietz. “Very few people will answer all the questions perfectly.”
SECURITY CONSULTING
Attendees at the two-day session
on “Successful Security Consulting”
heard from seven presenters who
covered all aspects of establishing a
security consulting company. The
session, which was organized by
cochairs Richard Grassie, CPP, of
Good Harbor Consulting, and
Frank Pisciotta of Business Protection Specialists, Inc., covered issues
such as marketing a consulting
business, developing winning proposals, completing assignments,
conducting audits, billing, and
gaining an end-user perspective.
David Aggleton, CPP, of Aggleton Associates, Inc., in New York
City, offered expertise on billing
and collecting payment from
clients. “Billing is a critical aspect of
your consulting business,” Aggleton
said. “Without it, you will fail.”
Aggleton helped attendees formulate how much they should
charge for their services per hour.
This charge is based on numerous
factors, noted Aggleton, from the
amount of experience the consultant has to the state of the economy
to the type of service being offered.
Consultants also need to determine
what their annual salary should be
along with all the expenses the
company will accrue—from medical insurance to postage costs.
Another crucial issue, said Aggleton, is how to invoice clients.
He discussed the benefits and
drawbacks of billing hourly or by
job and whether to request a retainer. For his own business, Aggleton says that 90 percent of clients
are billed a fixed price per job.
“We come out even,” says Aggleton. “Some jobs take a little less
time and we make a little extra,
sometimes they take longer and
cost us a little more.”
Karin Vellani, CPP, of Threat
Analysis Group, Inc., of Sugarland,
Texas, gave a presentation on developing a business plan. Vellani
told attendees that the purpose of
a business plan is to help the consultant focus. “What are you trying to do? Are you trying to start
a large firm that will have many
employees? Or do you want to be
a one-person shop?” Vellani asked.
A business plan can help answer
these types of questions, according
Mobile Planner with GPS
T
his year, attendees of the ASIS International 56th Annual Seminar and
Exhibits had access to a high-tech
tool for planning for the event. ASIS Mobile, which was launched in September, is
an innovative feature available as an
iPhone application or in a Web mobile version for all other smart phones. Since ASIS
Mobile could be easily added to an iPhone
or PDA, several planning options were
available to the app’s users.
First, the app was linked to the show
planner. Attendees could set a personal
schedule noting speakers they wanted to
hear at specific sessions and plug in the
meetings they had committed to attend
with other council members or colleagues.
If a time slot remained open, other activities scheduled at that time popped up as
suggestions.
A map of the entire Exhibit Hall was
also available through the app. Attendees
could enter a booth number and the app
provided the fastest route to get to that
spot. A search capability allowed attendees
to find an exhibitor by product or service
type or specific application.
The app included a Mobile Showroom
for select exhibitors, which placed all relevant information about that exhibiting company in one location and directed attendees
to its booth via the routing software.
Once they had accessed an exhibitor’s
showroom, attendees could request an appointment to meet a representative while
in Dallas, request a return call from the exhibitor, or access the exhibitor’s Web site.
Pictures of products could also be viewed
through the app along with relevant details
in PDF format. ❖
ASIS DY NAMICS
Institutions should know,
for example, how they
will contact faculty and
students in an emergency.
They should also consider
issues such as how to back
up critical data in case of
an emergency.
Watson also mentioned
other available resources to
help strengthen security at
faith-based and other
schools. Sources include
local law enforcement, The
U.S. Department of Education, and the ASIS Houses
of Worship and Faith Based
Organizations Council.
to Vellani. It can also help the consultant define the services he or she
has to offer and identify the customers the consultant should be
seeking. “A business plan helps you
communicate with yourself,” said
Vellani. “Then, after you start your
businesses, it helps you identify
risks, and track your progress.”
FAITH-BASED ORGANIZATIONS
Faith-based schools have many of
the same security concerns as other
academic institutions, but they can
also have some special challenges,
according to Scott Watson, CPP,
speaking at a preseminar intensive
on Monday.
Religious-oriented schools can
sometimes have relatively few resources to devote to security personnel and other efforts, he said
during the session, “Protecting the
Future: Security at Faith Based
Schools.” Such institutions tend to
have an open culture, and personnel may erroneously feel that violent crimes and other major threats
“can’t happen here,” he said.
Some of the steps faith-based institutions should take to strengthen
security include conducting risk
assessments and also educating
administrators, faculty, and students about possible threats and
responses, he explained.
In conducting a risk assessment,
administrators may want to consider factors such as the neighborhood surrounding a school, as well
as any prior crimes that might have
taken place at the school. Schools
should draw up a matrix of possible threats and consider possible
countermeasures, based partly on
factors such as the measures’ return
on investment. Schools should continue to conduct assessments on a
regular basis, Watson stated.
Educating administrators, faculty,
students, and others is also a central
part of stronger school security,
Watson stated. Faculty and staff
should be taught to recognize signs
of criminal and other security
threats. Schools should also have a
structure for collecting, analyzing,
and acting upon such data. In many
NOVEMBER/DECEMBER 2010
cases, when schools experience a
particularly violent incident, the
media will report that there were
“many warning signs,” he said.
Students at faith-based and
other schools should also be taught
to follow certain security procedures. An example could be not
holding exterior doors open for
strangers, even when they appear
nonthreatening.
Watson said that many schools
could also benefit from a “broken
windows” policy, referring to Broken Window Theory which postulates that monitoring and maintaining urban environments in a
well-ordered condition may prevent further vandalism as well as
an escalation into more serious
crime. By cleaning up graffiti and
making repairs quickly, for example, a school shows the community
that it cares about the facility and
that the building and its occupants
are watched over, he said.
Schools should have existing procedures for reacting to incidents and
threats, he said, ranging from bomb
threats to kidnapping to fires. As
part of a holistic security plan,
many schools should also consider
business continuity-related issues.
FACILITY SECURITY
Most security managers
cope daily with the challenge of imposing physical
security controls on facilities that were designed
and built with only two things in
mind—function and aesthetics. The
good news for security professionals is that doctrines such as crime
prevention through environmental
design (CPTED) dictate that security is designed and built into new
structures. However, that process
poses its own unique challenges, as
addressed at the preseminar intensive session “Facility Security and
Initial Conceptual Design,” sponsored by the ASIS Security Architecture and Engineering Council.
The process required to build an
inherently secure facility encompasses five stages: study and reporting, design, bidding and negotiation, construction, and operation.
The process is expansive enough
that presenters Richard Grassie,
CPP; Philip Stearns, CPP; Mark
Hankewycz, CPP; and Doug Fitzgerald, CPP, spent the whole day
focusing on the first step. Later
steps were addressed in three consecutive sessions on security architecture and engineering.
Grassie, managing principal of
Good Harbor Consulting, LLC,
offered useful advice for attendees.
He advised practitioners to “not
just go out and talk to vendors.
18
Do it smart. Do a risk assessment.”
Grassie and Stearns, himself a
systems engineer and a program
manager with The Conti Group in
Pittsburgh, further emphasized that
practitioners must remember that
technology is not a panacea. It can
detect people but not intent, Grassie
said, while other critical elements
of the security program include
people, policy, and procedure.
The design process begins with
formation of a team of at least three
specialists: an architect, a systems
engineer, and a security specialist,
Stearns explained. He added that
architects, while devoted to function and the visual appeal of structures, now accept the necessity of
incorporating security into design.
The team must begin their
work by assessing risk at the location and establishing a desired endstate of risk management. “Don’t
get caught up in how it’s going to
be done. When you’re really confident in your design, the results
will be better.” Only then, and in
the later steps of the process,
should the team consider the “constructability” of different options,
and do so at every turn.
Offering familiar advice, Grassie
said that team members must explain the design program to senior
executives in the language of business, explaining that security translates to a competitive advantage.
When practitioners do that, “we’re
talking about security in the terms
the organization is familiar with,”
he said.
THREAT ASSESSMENTS
The risk organizations face due to
disasters—natural or man-made—
are well-documented. According
to the U.S. Small Business Administration, 25 percent of businesses
that close after a major disaster do
not reopen. Yet security managers
still struggle to communicate that
risk to their superiors, and to keep
their organizations adequately prepared. Seminar attendees gained
expert guidance for both tasks at
Monday’s preseminar intensive session “The Reality of Threat Assessment and Response,” conducted by
the International Foundation for
Cultural Property Protection and
Layne Consultants International.
Presenter Stevan P. Layne, CPP,
principal of Layne Consultants, reminded participants of a lesson
from Hurricane Katrina lost on
many organizations. Not only do
organizations require emergency
management plans for more common cases like accidents, natural
disasters, and incidences of violence, they must prepare for events
in which days pass before aid arrives, even from first response
agencies. “Emergency agencies can’t
do it all. You’ve got to do it for
Enter the Hub
W
ith so much going on at the
ASIS International 56th Annual
Seminar and Exhibits, attendees
couldn’t possibly see everything. To make
sure they didn’t miss anything important,
The Hub at www.asis2010.org was created.
Users could see videos of selected sessions,
broadcasts from ASIS TV, photos of events,
exhibitor information, and headlines from
the ASIS Show Daily.
The following full sessions and more
can still be viewed at The Hub:
“What’s New on the Floor” examines
some of the innovative products that could
be found on the ASIS 2010 exhibit floor.
The presenters are Ron Lander, CPP, and
19
Howard Belfor, CPP.
“Bioterrorism: Understanding the
Threat and Designing Responses,” presented by Dr. Jeffrey Simon.
“Social Networking, Media, and Your
Professional Development.” The presenters
are Steve Surfaro, Shawn Flaugher, and
Ksenia Coffman.
“A Cartel Hempisphere: Protecting International Interests in Today’s Most Enticing Emerging Markets,” presented by Raymond T. O’Hara, CPP, Bruce McIndoe, and
Samuel Logan.
“Cyber Series: Case Studies from the
Front Lines - Computer Forensic,” by
speaker Kevin Blumi, CPP. ❖
yourself.” Otherwise, “You’re going
to be standing, like in Katrina,
looking to the sky for an emergency management agency that
never shows up.”
Organizations’ emergency management plans should be built
around the Incident Command
System (ICS), originally developed
for response to massive wildfires,
and now the common playbook
for response to incidents of all
sizes, from federal to local agencies,
said presenter William J. Powers
III, director of facilities at The
Clark Art Institute in Williamstown, Massachusetts. Positions
from incident commander down
to planning and finance chiefs
must be staffed “three deep,”
meaning they must have two alternates in case the primary person is
indisposed. These positions should
not be based on seniority but
should be dispensed according to
capabilities and expertise.
Emergency plans and the ICS,
Powers and Layne said, are useless
if they are left to collect dust.
“This is something you should
train, train, train on,” Powers said.
Similarly, plans and procedures
should be communicated simply
and succinctly to employees, rather
than circulating voluminous plans.
Layne recommended using a simple, two-page guide briefly listing
exactly what employees should do
in a series of scenarios from fires
to active shooter incidents.
Separately, Layne, Powers, and
fellow presenter R. Michael Kirchner, CPP, director of security for
the Harvard Art Museums, recommended regular liaison with local
first response agencies. Smarter organizations even invite local law
enforcement agencies to use their
facilities for agency exercises. “Guess
who gets the best response when
there’s an incident?” Layne said.
Need help making the case for
emergency planning? The presenters offered this statistic from the
Emergency Management Institute,
which found that $1 spent on mitigation saves $4 in recovery from a
disaster. ◆
ASIS DY NAMICS
The Best of the
Exhibit Hall
O
n Tuesday, attendees packed the eagerly antici-
pated “What’s New on the Floor” session, presented again by Ronald Lander, CPP, chair of the
Information Technology Security Council, and
Howard J. Belfor, CPP, of the ASIS Physical Security
Council. Belfor said that the effect of the economic downturn
on the security industry is that it has pushed manufacturers
to be more innovative. This was exemplified in the various
products they highlighted.
THE SPEAKERS SPOTLIGHTED the
10 winners of the ASIS Accolades
competition. They also pointed to
some of the entrants that did not
win but caught their attention during a trip around the exhibit hall.
Among those were numerous
products related to video and
NOVEMBER/DECEMBER 2010
video networks, said Lander and
Belfor, such as the Verint Video
Solutions Nextiva HDR 1800
High-Definition Decoder/Receiver,
which can support video walls and
moves towards a more ergonomic
approach, said Lander.
Another video-related product
was DVTel’s Smart Security Solution, which provides IP camera
technology, intelligent video, and
analytics, and is customizable, said
Lander. Lander and Belfor stressed
that it is becoming more important
to have forensic quality video that
is not just good quality on the
monitor, but also when saved.
Sentry 360 Security’s FullSight
360-degree 10-megapixel camera
with no blind spots and no moving parts was singled out for praise.
Another camera the presenters
lauded was the Scallop Imaging
Digital Window A7-180 Analog
Camera, which is “so cool and so
small,” said Belfor, and blends
various views into a 180-degree
field of view.
Additional video-related appliances include Microsemi’s PowerDsine midspans, which are a
breakthrough in getting electricity
to IP cameras, said Lander.
Additionally, Belfor and Lander
cited various projections for in-
20
creased growth in the biometrics
industry, and they noted numerous
biometric products to check out.
One was L-1 Identity Solutions’
4G FingerVein Station, which Lander and Belfor referred to as an
unobtrusive biometric device that
looks at various distinguishing elements. Also in the biometrics field
was the InSight VM 2 Meter Iris
Recognition System from AOptix
Technologies, Inc. The product is
capable of scanning irises from
several feet away.
One of the recent trends, said
Belfor, is that old things are new
again. An example is Videx, Inc.’s
CyberKey Vault 20, which is designed to dispense keys using an
Internet connection. Belfor said
one interesting aspect of the product is the user-defined fields.
Lander also spotlighted technology from Patriot3, Inc., which
manufactures shields. For example,
in a workplace violence or school
shooting situation, Lander said
that one Patriot3 product has
wings that flip out and can cover
a six-foot hallway, so that potential
victims of an attack can be protected behind the shield.
Many companies perform background investigations on potential
job candidates, and Lander and
Belfor pointed to the electronic
research firm LexisNexis as a
leader in that industry.
In the access control realm,
Lander highlighted Brivo Systems,
LLC’s ACS OnSite Aparato which
provides the ability to keep data
private unless permission is granted
to a user.
The Powdersafe Containment
System of Powdersafe Pty., Ltd.,
which assists in the opening of
suspicious letters, was also singled
out for praise. If something hazardous is detected, the containment
system slams shut and seals the
letter inside.
A technology that has generated
headlines and is “here to stay,” according to Lander, is Canon subsidiary Virtual Imaging, Inc.’s
technology SecurPass, which does
a full body scan. ◆
21
Dennis Hastert speaks to CSOs.
Roundtable
Delivers
Distinguished
Speakers
D
uring the ASIS In-
ternational Seminar
and Exhibits, CSO
Roundtable members heard from a roster of prominent leaders as
part of a CSO Distinguished
Speaker Series.
ON TUESDAY, Dennis Hastert, the
59th Speaker of the U.S. House of
Representatives, addressed an audience of senior security executives,
sharing his experiences as the
country’s senior lawmaker during
one of the most tumultuous periods in its history, as well as his
outlook for the then upcoming
midterm elections.
Hastert spoke to attendees about
the flurry of reforms that followed
the terrorist attacks of 9-11, among
them the PATRIOT Act, which
allowed collaboration between U.S.
foreign intelligence services and
domestic law enforcement agencies,
and the SAFETY Act, which mitigates civil liability for qualified security products.
ASIS DY NAMICS
On Wednesday, after delivering
a morning keynote to the full body
of attendees, CSO Roundtable
members had a private session
with airline Captain Chesley B.
Sullenberger III, famous for landing
his crippled commercial airliner in
the Hudson River. On Thursday,
the Roundtable members met former Pakistani president Pervez
Musharraf for another exclusive
dialogue.
The CSO Roundtable also
sponsored sessions for Roundtable
members and those eligible for
membership. These sessions included “Career Guidance for Security Executives,” which focused on
how CSOs can put together a résumé package that will impress
corporations looking to upgrade
their security team; “The Maritime
Link in the Security Chain,” which
provided an update on piracy, assessing existing security measures,
and recommending countermeasures; and “Nobody Expected a
Volcano: Protecting the Supply
Chain No Matter What Happens,”
which explored how risk factors
affect the movement of goods and
services in times of chaos, and
provided advice to attendees on
how to respond to events such as
this year’s eruption of the Eyjafjallajökull volcano in Iceland. ◆
Fred Evans speaks on
maritime security.
Final Sessions
Probe Issues
Keith T. Darcy
speaks at Friday’s
Insights session.
T
hose who attended the final day of the ASIS
International 56th Annual Seminar and Exhibits were
treated to panels of experts discussing the most
pressing topics of the day, including cloud computing,
supply chain security, and ethics.
CLOUD COMPUTING.
The first session on Friday was
“Get Off My Cloud—New Opportunities, Dangers, and Realities
with Cloud Computing.” The session was sponsored by the Information Security Management Advisory Commission, the Cloud
Security Alliance, and the CSO
Roundtable.
ASIS President-Elect Raymond
T. O’Hara, CPP, executive vice
NOVEMBER/DECEMBER 2010
president of consulting and investigation for Andrews International,
introduced the session and discussed the importance of the topic.
“Cloud computing has the potential to change computing as much
as the Internet did,” said O’Hara.
O’Hara then introduced the
two panelists, ASIS Board of Directors Member Dave Tyson, CPP,
senior director and CISO for Pacific Gas and Electric, and Former
22
ASIS President Jeffrey M. Spivey,
CPP, PSP, president of Security
Risk Management Inc.
Cloud computing, explained
Tyson, allows businesses to access
applications online via the Internet, while those applications and
the data they generate are stored
on servers elsewhere. From a security perspective, the critical issue
is the company that creates that
data often has no control over
where it is stored.
The main attraction of cloud
computing is that it saves money.
“Cloud computing can save companies millions of dollars,” said
Tyson. “Businesses can do away
with servers and they no longer
need to purchase software. Companies only need to pay for the
space they use.”
Tyson explained that, in his
company, cloud computing reduced corporate storage costs from
$10,000 a terabyte to $700.
Both Tyson and Spivey noted
that there are several traditional
security concerns companies must
consider when using cloud computing. First, security must get a
seat at the table when the company is discussing whether to
move into the cloud. This will allow security to discuss the dangers. For example, Spivey noted
that malware can be in the cloud.
23
Another issue to consider is
how cloud computing affects the
emergency preparedness plan. “Do
you know where the servers are?
Are the servers in danger from
natural disasters or political unrest?” asked Spivey.
Companies must also be sure
they can get data back once it has
been sent to the cloud. “Security
should be concerned,” said Tyson.
“It’s important data is somewhere
unknown and they have no control over it. Companies must not
only be sure they get data back,
they must be sure that
it is not still in the
cloud once it is returned.”
One way to deal
with this, noted Tyson,
is to keep high security
data on a company
server, in a central
place, and not send it
to the cloud. But this
method requires planning and foresight by
the company.
Another security
measure that companies should consider is
background screening
for the company providing the cloud.
Companies should
also include language in the contract that allows corporate security
to inspect the cloud company’s
server. “This means that the client
companies must understand what
is necessary to protect data,” said
Tyson.
However, the panelists were
clear that cloud computing risks
must be managed because they
cannot be avoided. Spivey quoted
a Gartner study that projects that
20 percent of companies will no
longer have an IT department by
2012. Businesses will use cloud
Thanks, Partner
T
he educational component of the
ASIS International Seminar and Exhibits has long been a magnet for
top-level speakers. This year, several industry groups partnered with ASIS to broaden
the pool of experts with in-depth knowledge on subjects of current interest to all
attendees. ASIS is pleased to have joined
with these educational partners:
(ISC)2. A global, not-for-profit group,
(ISC)2 is known for its world class educational programs and certifications. Members
in more than 135 countries adhere to
(ISC)2’s global standards and code of ethics
for the information security industry.
IT-ISAC. IT-ISAC is a trusted community of security specialists from across the
IT industry. Members of the Information
Technology-Information Sharing and Analysis Center identify threats and vulnerabilities and share best practices.
ISACA. This leading organization is a
global provider of knowledge, certifications,
advocacy, and education on information
systems assurance and security, enterprise
governance of IT, and IT-related risk and
compliance. The group also develops international auditing and control standards.
IAPSC. The International Association
of Professional Security Consultants
(IAPSC) is a respected and widely recognized consulting association. Members of
IAPSC meet rigid requirements that ensure
clients can select from an elite group of
professional, ethical, and competent security consultants. ❖
ASIS DY NAMICS
computing, according to the panelists because it is so cost effective.
But cloud computing has upsides in addition to cutting cost. It
can also drive innovation. “The
cloud allows you to be bold,” said
Tyson. “To go big and go fast.”
Perspectives. At Friday morning’s second session, moderator
past ASIS President Steve Chupa,
CPP, director of security, worldwide security group, for Johnson
& Johnson, discussed the genesis
of the Perspectives program.
“At several recent ASIS meetings, we asked ‘what keeps you up
at night?’” said Chupa. “We got a
long list of responses. Among the
most prevalent ones were worries
regarding the security of an organization’s supply chain.”
Chupa then introduced Yossi
Sheffi, head of the engineering
systems division and director of
the Center for Transportation and
Logistics at the Massachusetts Institute of Technology. Sheffi, the
author of The Resilient Enterprise:
Overcoming Vulnerability for Competitive
Advantage, discussed how companies can evaluate risk.
According to Sheffi, a company
must not only examine risks to its
own operations but to those of its
suppliers, third-party manufacturers, and contractors. “The supply
chain is the whole ecosystem of
getting products from the earth to
the consumer,” said Sheffi.
Other panelists included Tony
Strange, director of channel integ rity, Medical Device and Diagnostic
Sector, Johnson & Johnson, and
Ken Konigsmark, program manager
for supply chain and aviation security for The Boeing Company.
Insights. At the Security Insights Program, a group of ethics
experts led a discussion on “Connecting the Dots: Security and
Corporate Ethics.” Introduced by
former ASIS President Regis
Becker, CPP, global director of security and compliance for PPG
Industries, the session focused on
the relationship between ethical
corporate behavior and the health
of the economy.
NOVEMBER/DECEMBER 2010
Humorist Dave Barry entertained attendees at the Closing Luncheon on Friday by
telling jokes and humorous stories about his life in Florida and his adventures as a
writer and as a husband and father.
The session moderator, Keith T.
Darcy, executive director of the
Ethics and Compliance Officer
Association, started the discussion
by linking unethical conduct to the
economic collapse. “I can give a
new speech on ethics every day,”
Darcy said. “There is so much
malfeasance going on.”
The upside to this bad behavior
is that the role of ethics in business is now considered a critical
one. And companies around the
world are cooperating in ethics
investigations on a level “that is
historic,” said Darcy.
Darcy then introduced the panelists: Donna Boehme, principal of
Compliance Strategists LLC; Perry
A. Minnis, chief officer of Minnis
and Associates; Richard M. Kelly,
CPP, corporate compliance officer
and director of global security and
compliance for Harsco Corporation;
and Dean Luchsinger, vice president
and chief ethics and compliance
officer for AECOM Technologies.
The panel explored the importance of using ethics hotlines to
allow employees to report violations. Kelly noted that when his
company launched a hotline in
2009, it received 69 calls within
the first 10 days. “There were two
significant safety reports,” says
Kelly. “Those two calls resulted in
investigations and uncovered violations at two different sites.”
Another critical issue that was
addressed was how to conduct
ethics investigations. Boehme suggested that companies establish a
set of investigative guidelines to
keep all investigations “on the
same page.” Boehme stressed that
such investigations will not be
conducted in the same way as law
enforcement investigations.
Companies must also be wary
of anticorruption laws in nations
around the globe. While businesses
may be certain that they are not
conducting business in an unethical manner, they may not know
what their contractors are doing.
“It doesn’t matter how much security you have in place,” explained
Minnis. “If an agent of yours acts
corruptly on your behalf, you are
responsible.”
This thought process also extends to the places companies
choose to do business in. Luchsinger says that his company has a
security team that evaluates the
prospective corruption in countries
where the company may set up
shop. “In some cases, security has
come back and said: ‘We can’t
work here without bribing officials,’” said Luchsinger. “We don’t
go to those places.” ◆
24
Download