PSA Security Network is dedicated to providing systems integrators with the necessary training to be successful in business, service, system design, installation and deployment. Join PSA in their full track of sessions on Tuesday, April 5th:

Tuesday, April 5, 2016

Taking the Edge Off of Systems Integration

8:30 AM – 10:00 AM

Paul Boucherle, CPP, CSC, Principal, Matterhorn Consulting
Nigel Waterton, Sr. Vice President of Corporate Strategy & Development, Aronson Security Group
Chad Parris, CSC, President, Security Risk Management Consultants, LLC
Wayne Smith, CISSP, CPP, CISM, President, Tech Systems

Integrating multiple security systems in an effort to streamline management and reporting capabilities has great value to the end user, though it isn’t always as easy as it sounds. Having multiple systems tools in place can create sensory overload issues for staff, for instance. Data should be easily accessible to be useful and interoperability must simplify versus complicate your process to make integration worthwhile. Collaborative vendor partnerships are critical to ensure integration engenders cooperation and efficiency. Join a discussion featuring consultants and systems integrators who have established their own winning formula for an end-to-end approach to systems integration.

Learning Objectives:

  • Discover how working with the right partners to help consolidate your systems can improve system efficiency without unnecessary complexity.
  • Simplify new services and technologies utilizing good program management, such as requirements planning, engineering and architecture, testing and by prioritizing developments for deployment.
  • Create new opportunities to become the trusted advisor by acting as the systems integration facilitator that bridges the gap between technical solutions to operational excellence and efficiency.

Video Analytics: The Real Past and the Imagined Future

10:15 AM - 11:15 AM

Bill Bozeman, CPP, President/Chief Executive Officer, PSA Security Network
Matthew Kushner, President and CEO, 3xLOGIC
AJ Frazier, Vice President, Sales for the Americas, Agent Vi
Mahesh Saptharishi, PhD, Chief Technology Officer, Senior Vice President, Avigilon

Join solution providers to discuss the utility of today’s video analytic products for non-security as well as security oriented commercial applications. Networked cameras and video analytics offer new possibilities such as business intelligence and visual communication capabilities. Seasoned industry experts examine the impact on big data and the implications for customer experience, whether past performance disappointments are truly a part of history and predict the prospective value of these technologies for the future.

Learning Objectives:

  • Establish the potential for video analytics to enhance the business process productivity of your commercial industrial operations.
  • Explore the effect on big data and the implications for customer experience.
  • Address challenges meeting customer expectations in the past and forecast the future of video analytics for the typical security program.

The Hottest IT Skills in the Physical Security Space

11:30 AM – 12:30 PM

Eric Yunag, President and CEO, Dakota Security Systems Inc.
Randy Gross, Chief Information Officer, CompTIA
Jerry Bowman, CISSP, CPP, InfraGard National Board of Directors
David Sime, VP of Engineering and Delivery, Contava

Which new IT skills should physical security integrators and manufacturers strive to add to their talent pool? Hear from experts in the IT and physical security industries as they discuss the skills that will net higher payback for employers in the long term and the certifications gaining the most traction on the job. Find out the kind of expertise needed to navigate the top technology trends from cyber security to big data to architecture and applications development. Determine how certifications support the diversity of IT talent while expanding the services portfolio of the physical security integrator and/or manufacturer. Panelists will provide insights to sources to catalog, analyze and classify your choices based on your present and future business needs.

Learning Objectives:

  • Establish which IT skills will net more value to the growth of your operation and services portfolio.
  • Discover which certifications will insure the kind of expertise that will help you to navigate today’s technology trends affecting your business.
  • Recommend industry sources that can help to catalog, analyze and classify your choices based on your present and future business needs.

Cyber Security - How to Ensure Vendors are not Leaving you Vulnerable

1:30 PM – 2:30 PM

Presenter(s): TBD

You’re preparing for an upcoming project or service contract and finalizing the RFP. There are important questions you should ask when it comes to cyber security and enterprise resilience tactics. Join experts to determine how to evaluate, qualify and disqualify potential partners based on their cyber security and disaster recovery policies. Discuss key characteristics of a responsible information and network security program, best practices in managing ongoing vendor relationships and red flags in the prequalification process.

Learning Objectives:

  • Create a vendor questionnaire template for RFPs.
  • Determine a list of op 10 Musts and Must Nots, and a list of resources for future reference and further education.

How to Implement a Life Cycle Management Program

2:45 PM - 3:45 PM

Presenter(s): TBD

Many organizations have come to the realization that physical security systems require the same level of management and maintenance as any server-based system. The complexity of integrations between software platforms, legacy and newer hardware and edge-devices in the field create an environment that is prone to outages if left alone. A life cycle management program is the best way to ensure longevity of systems, limit outages and their impact, and to have a budgetary plan for this year and 3-5 years down the road. These questions and more will be answered in this presentation by panelists with first-hand experience.

Learning Objectives:

  • Determine the elements to implement a LCM program.
  • Discern the initial and ongoing steps necessary to effectively manage and maintain integrated systems.
  • Establish the impact on network and information security and ensure longevity for your organization.

Case Study: Rolling Out Business Intelligence with Superior ROI

Terra Walker, MBA, Manager of LP & Investigations, Murphy USA
Matthew Kushner, President and CEO, 3xLOGIC

Retailer Murphy USA is in the midst of a planned nationwide deployment of intelligent surveillance systems at 1,344 convenience store locations across 32 states. The new systems are comprised of IP and hybrid appliances, cameras and business intelligence software integrated into a customized solution. Discover how Murphy USA adopted a strategic approach to surveillance system usage and organizational accountability and efficiencies. In partnership with their systems integrator, they designed a solution that integrates POS, cameras, audio, analytics, time and attendance that will utilize the best-in-business intelligence software pulling data into an easy-to-use dashboard accessible anywhere users have an Internet connection. Ultimately, the goal is to have all organization departments utilize system data to improve operational efficiencies. Hear how the flexibility the design, combined with mobile accessibility and the hybrid IP and analog capabilities were compelling selling points for the solution.

Learning Objectives:

  • Discover best practices for a year-long loss prevention system deployment to 1300+ retail locations.
  • Determine state-of-the art business intelligence software capabilities and measureable benefits across the retail organization.
  • Gather specific market examples to achieve improved operations and profitability.

Workshop – Finding Danger from Within: Developing an Insider Threat Program

3:30 PM – 5:00 PM

John A. Wetzel, President, Securas Consulting Group

From Brutus betraying Caesar to Bradley Manning and Edward Snowden, insider threats are an inevitable challenge to any organizational security program. The National Counterintelligence Executive lists insider threat as one of the top three greatest security challenges of today, alongside cyber threats and supply chain risk management. For the Nation’s cleared contractor community, 2015 welcomes new mandates to establish an insider threat program and designate an Insider Threat Awareness Officer, but many companies have not dealt with insider threats in a systematic way.

This discussion provides corporate leaders and security managers with a roadmap for establishing an insider threat program, utilizing counterintelligence techniques already used at the nation’s cleared laboratories, military installations and defense companies. It provides guiding principles for program development, highlights legal landmines, addresses the formation of an insider threat working group, and walks you through the 10 steps to an effective insider threat program.

Learning Objectives:

  • Define insider threats by type and examples.
  • Identify indicators and risk factors for insider threats.
  • Outline 10 steps to form an insider threat working group.
  • Identify compliance requirements and legal “landmines” when implementing an insider threat program.

Are You Ready For the Future? Security Leadership in a Changing Risk Environment

4:00 PM - 5:00 PM

Ray O’Hara, CPP, Executive VP, AS Solution
Jeff Spivey, Resident, Security Risk Management, Inc.
Mike Foynes, Senior Director, Global Security Operations Centers, Microsoft

Disruption in the security risk landscape demands new leadership strategies to be relevant and effective for your organization. Are you prepared for the onslaught of additional threats from new technologies, new skills needed in the workforce and the increased cooperation needed between security and all facets of the organization? Join security industry veterans as they bring together leading global security practitioners reshaping the role of security within their organizations as they debate what and who will influence the opportunities and challenges ahead.

Learning Objectives:

  • Define ERM and evaluate the kind of protection needed for your enterprise.
  • Gain insights from panels on how the boundaries of security are being redrawn to create new value and redefine the security industry.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.