PSA Security Network is dedicated to providing systems integrators with the necessary training to be successful in business, service, system design, installation and deployment. Join PSA in their full track of sessions on Tuesday, April 5th:
Tuesday, April 5, 2016
Taking the Edge Off of Systems Integration
8:30 AM – 10:00 AM
Paul Boucherle, CPP, CSC, Principal, Matterhorn Consulting
Nigel Waterton, Sr. Vice President of Corporate Strategy & Development, Aronson Security Group
Chad Parris, CSC, President, Security Risk Management Consultants, LLC
Wayne Smith, CISSP, CPP, CISM, President, Tech Systems
Integrating multiple security systems in an effort to streamline management and reporting capabilities has great value to the end user, though it isn’t always as easy as it sounds. Having multiple systems tools in place can create sensory overload issues for staff, for instance. Data should be easily accessible to be useful and interoperability must simplify versus complicate your process to make integration worthwhile. Collaborative vendor partnerships are critical to ensure integration engenders cooperation and efficiency. Join a discussion featuring consultants and systems integrators who have established their own winning formula for an end-to-end approach to systems integration.
- Discover how working with the right partners to help consolidate your systems can improve system efficiency without unnecessary complexity.
- Simplify new services and technologies utilizing good program management, such as requirements planning, engineering and architecture, testing and by prioritizing developments for deployment.
- Create new opportunities to become the trusted advisor by acting as the systems integration facilitator that bridges the gap between technical solutions to operational excellence and efficiency.
Video Analytics: The Real Past and the Imagined Future
10:15 AM - 11:15 AM
Bill Bozeman, CPP, President/Chief Executive Officer, PSA Security Network
Matthew Kushner, President and CEO, 3xLOGIC
AJ Frazier, Vice President, Sales for the Americas, Agent Vi
Mahesh Saptharishi, PhD, Chief Technology Officer, Senior Vice President, Avigilon
Join solution providers to discuss the utility of today’s video analytic products for non-security as well as security oriented commercial applications. Networked cameras and video analytics offer new possibilities such as business intelligence and visual communication capabilities. Seasoned industry experts examine the impact on big data and the implications for customer experience, whether past performance disappointments are truly a part of history and predict the prospective value of these technologies for the future.
- Establish the potential for video analytics to enhance the business process productivity of your commercial industrial operations.
- Explore the effect on big data and the implications for customer experience.
- Address challenges meeting customer expectations in the past and forecast the future of video analytics for the typical security program.
The Hottest IT Skills in the Physical Security Space
11:30 AM – 12:30 PM
Eric Yunag, President and CEO, Dakota Security Systems Inc.
Randy Gross, Chief Information Officer, CompTIA
Jerry Bowman, CISSP, CPP, InfraGard National Board of Directors
David Sime, VP of Engineering and Delivery, Contava
Which new IT skills should physical security integrators and manufacturers strive to add to their talent pool? Hear from experts in the IT and physical security industries as they discuss the skills that will net higher payback for employers in the long term and the certifications gaining the most traction on the job. Find out the kind of expertise needed to navigate the top technology trends from cyber security to big data to architecture and applications development. Determine how certifications support the diversity of IT talent while expanding the services portfolio of the physical security integrator and/or manufacturer. Panelists will provide insights to sources to catalog, analyze and classify your choices based on your present and future business needs.
- Establish which IT skills will net more value to the growth of your operation and services portfolio.
- Discover which certifications will insure the kind of expertise that will help you to navigate today’s technology trends affecting your business.
- Recommend industry sources that can help to catalog, analyze and classify your choices based on your present and future business needs.
Cyber Security - How to Ensure Vendors are not Leaving you Vulnerable
1:30 PM – 2:30 PM
Wayne Smith, President, Tech Systems, Inc.
Mark Andrews, Chief Information Security Officer, Group Executive, TSYS
Geoff Povinelli, CHPA, Associate Vice President, System Security, Memorial Hermann
You’re preparing for an upcoming project or service contract and finalizing the RFP. There are important questions you should ask when it comes to cyber security and enterprise resilience tactics. Join experts to determine how to evaluate, qualify and disqualify potential partners based on their cyber security and disaster recovery policies. Discuss key characteristics of a responsible information and network security program, best practices in managing ongoing vendor relationships and red flags in the prequalification process.
- Create a vendor questionnaire template for RFPs.
- Determine a list of op 10 Musts and Must Nots, and a list of resources for future reference and further education.
Are You Ready For the Future? Security Leadership in a Changing Risk Environment
2:45 PM - 3:45 PM
Michael Foynes, Senior Director, Global Security Operations. Microsoft
Jeff Spivey, Resident, Security Risk Management, Inc.
Disruption in the security risk landscape demands new leadership strategies to be relevant and effective for your organization. Are you prepared for the onslaught of additional threats from new technologies, new skills needed in the workforce and the increased cooperation needed between security and all facets of the organization? Join security industry veterans as they bring together leading global security practitioners reshaping the role of security within their organizations as they debate what and who will influence the opportunities and challenges ahead.
- Define ERM and evaluate the kind of protection needed for your enterprise.
- Gain insights from panels on how the boundaries of security are being redrawn to create new value and redefine the security industry.
How to Implement a Life Cycle Management Program
4:00 PM - 5:00 PM
Many organizations have come to the realization that physical security systems require the same level of management and maintenance as any server-based system. The complexity of integrations between software platforms, legacy and newer hardware and edge-devices in the field create an environment that is prone to outages if left alone. A life cycle management program is the best way to ensure longevity of systems, limit outages and their impact, and to have a budgetary plan for this year and 3-5 years down the road. These questions and more will be answered in this presentation by panelists with first-hand experience.
- Determine the elements to implement a LCM program.
- Discern the initial and ongoing steps necessary to effectively manage and maintain integrated systems.
- Establish the impact on network and information security and ensure longevity for your organization.