We are taking enhanced health and wellness measures in response to COVID-19. View important details.

2019 SIA Education@ISC Video Recordings

SIA Education@ISC West is now offering a sample of the highest attended educational sessions from our 2019 event that you can download for free at your convenience. Education is an important part of our ISC Events and our inspiring education programs provide critical information on the newest and most relevant technologies in the security industry. Sessions are designed to arm security professionals with the information needed to progress in the ever-changing security landscape. Learn more below with our 2 minute teasers or download the full length session at the buttons below.


Early Identification of Insider Risk

Tom Miller, CEO, ClearForce

Insider risk represent an emerging focus for many companies, who have traditionally invested in physical and cyber security solutions to protect against external threats to the organization. Session presenter will provide context on the scope, significance, and challenge of insider risk and create a framework for the consideration and development of strategies and solutions to effectively manage this risk. Specifically, the focus will highlight opportunities for earlier identification that can enable preemptive action to solve problems before they escalate. Review a spectrum of considerations for developing and executing policy. Gain insights on applicable practices across the many industries that face insider risk, and draw upon updated industry statistics, practical examples and industry leading analysis.

Learning Objectives:

  1. Define the scope and significance of insider threat.
  2. Review the underlying factors that drive and create insider threats.
  3. Develop a working plan for strategy and policy development to mitigate insider risk.
Download Video


Cybersecurity by the Numbers: Maturity Metrics of Successful Security Organizations

Johna Till Johnson, CEO and Founder, Nemertes Research

This session is based on a clear framework and interactive self-assessment that enables end-user participants to quickly and accurately score the maturity of their organizations' cybersecurity initiatives. Session participants will use the handouts provided to rate themselves and their current success based on operational metrics, deployment of key “bellwether technologies”, and organizational and operational best practices. In the final part of the session, session presenters will take questions from the audience to ensure they have the most complete possible understanding of their current cybersecurity maturity, and what to do to improve it going forward. You’ll leave with a plan, having established your organizations level of security maturity based on quantitative metrics.

Learning Objectives:

  1. Assess your company’s current level of cybersecurity maturity.
  2. After drafting an action plan, leave the session with a self-created model that includes concrete recommendations to enhance your organization's cybersecurity.
Download Video


Transition from Being Viewed As An Overhead Cost Center to Value Creator

Lynn Mattice, Managing Director, Mattice & Associates

Corporate security operations have traditionally been viewed as overhead cost centers that are a necessary evil. This presentation will examine how security organizations have evolved over the years. It will also provide a roadmap on how to transition from being viewed as a drag on profits to proven value added methodologies. A review of some real world examples of results oriented security programs will demonstrate how a refocused security department can effectively contribute to enhancing revenue streams and bottom line results for your enterprise.

Learning Objectives:

  1. Conduct a review of their security organizations current structure and operating philosophy.
  2. Illustrate the steps to lead a business alignment review to refocus the security organization to better support business objectives.
  3. Develop new services that support the business and enhance revenue streams for the enterprise.
Download Video


Workplace Violence Prevention and Response

Hector Alvarez, President, Alvarez Associates LLC

This presentation is geared towards security, safety, risk managers or HR staff who are new to threat management/workplace violence, or experienced and seasoned professionals who would benefit from reviewing the foundational steps. Multiple “real world” vignettes will be reviewed including ones that had both negative and positive outcomes. Gain insights to develop specific policies and procedures to mitigate threats and institute standards for workplace violence behavior.

Learning Objectives:

  1. Describe and define sources of workplace violence.
  2. Recognize the warning signs of individual(s) on the pathway towards violence.
  3. Identify a range of intervention and response options to address threatening and concerning behavior.
Download Video


Assessing the Risk of Violence in Today's Workplace Environment

Ben Scaglione, CPP, CHPA, CHSP – Senior Consultant, DVS Security Solutions
David LaRose, CHPA, CPP – System Director Public Safety, Lee Health

A violent incident within your organization can be devastating to employees, clients and business operations. Assessing the risk of violence and implementing preventive strategies is an effective process in the reduction of violent incidents. Traditional methods for violence reduction are not always effective and do not help employees to be engaged in the process. A more strategic and focused approach can identify high risk areas and creates engaging programs that no only reduce the potential for workplace violence but engage employees to be more proactive and responsive to potential threats and incidents.

Learning Objectives:

  1. Review the current state of violence within today's workplace environment.
  2. Assess the risk toward violence within specific areas of their workplace.
  3. Determine methods to reduce the potential for violence through strategic planning, and unit specific assessments and training.
Download Video

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.