Total Security Summit
Upcoming Event Dates
Now, more than ever, you need to be sourcing security services, products and solution providers that offer the best value for your money. We can help you find them quickly and efficiently.
98% of our delegates say that our events are "an easier, more efficient way to find out about potential service providers than any exhibition". Here's why...
The Total Security Summit is specifically organized for VPs, Directors, and Managers of Security who are directly concerned with their facility’s security and safety operations.
For More Information Please Contact...
Cherissa Irvin – Delegate Manager
(941) 925-7585 x107 | email
Bonnie Passalacqua – Event Coordinator
(941) 925-7585 x114 | email
Liz Parsloe – Delegate Coordinator
(941) 925-7585 x103 | email
Total Security Summit in Houston, TX
June 1 & 2, 2015
Event Workshops Include...
“Surviving an Active Shooter”
Presented by Stephen Daniel, Senior Community Liason - Houston Police Department
In a world where your thoughts are rarely focused on such topics, proven, common sense instruction by experienced professionals, may eventually save your life.
Some of the high points that will be discussed are?
- A historic overview of Active Shooting in America.
- Active Shooter profile
- Police response
- Run, Hide, Fight
- Priority of Life Scale
- Emergency Response Plans
- Case Studies
- Developing your own unique Survival Mind Set
Also presented are the films “Run, Hide, Fight” and “Last Resort Active Shooter Survival Measures” and the “Florida School Board Shooting”.
Can You See and Hear Me Now - Using the Power of Social Media and Security Technologies
Presented by Steve Surfaro, Industry Liaison, Axis Communications Chairman, Security Applied Sciences Council, ASIS International Vice Chair, Security Industry Standards Council
Social media powers a myriad number of virtual communities in the discussion of a wide scope of topics. Those conversations have implications for a range of organizational functions including security operations. Understanding and reacting to those conversations can improve intelligence and provide security personnel with valuable information to assist in securing persons, property, and assets. This session will also provide case studies of security successes through use of trending security technologies, mobility and Internet of Things.
Access Control Evolution: Card and Reader Technology
Presented by Terry Gold, Founder of IdAnalyst LLC
This session will review how physical access control systems, cards and readers work and where the market is heading. We will cover general concepts but then get into depth so the audience understands, in very simple terms, how the technology works and differs from one another to improve their ability to assess their current systems, future requirements and proposed technologies.
It will also cover the current landscape of technology, vendors ad their related offerings in context of key selection criteria while also looking toward the future of what is around the corner, how to prepare, avoiding common mistakes, and strategies for making the migration without breaking the bank.
Your Physical Access is Broken
Presented by Terry Gold, Founder of IdAnalyst LLC
Physical Security programs are in place to protect people and assets that are part of an organization. There are many systems as part of these environments -from cameras to alarms, to control systems to credentials. While organizations have systems that “work”, the majority of the time they increasingly fail to be effective against attacks and being undetected in the process.
As enterprises become more operationally driven for scale, standardization, and automation as they deliver products and services to their customers, the instructions of “best practice” from certifications we are taught are becoming obsolete as attackers become more sophisticated themselves.
This session will introduce the physical security and facilities professional to how attackers think, what they look for, and how they creatively break corporate defenses to impact intellectual property, critical infrastructure controls, and operations. We will also review real-world examples, common pitfalls by end user and integrators, and how to fundamentally realign security programs while remediating current vulnerabilities.
Why Security Incidents are Different from IT Incidents
Presented by Patrick Hayes, certified Enterprise Security Architect and PCI-DSS QSA
Data breaches spiked to record levels last year and continue to grow. Most of them were avoidable, yet many organizations didn't have the right security controls in place. Offense is always the best defense, but even the most comprehensive security isn’t 100%. Security incidents may still occur. And if they do, you must have a response plan ready to react at a moment’s notice. One of the key factors of an effective response plan is knowing the difference between a security incident and a standard IT incident. That knowledge can protect your organization and customers from a loss of critical information, stolen revenue, and even legal actions.
In this workshop, Patrick Hayes, Managing Director of Seccuris, will discuss how to recognize a security incident, evaluate the associated risks, and determine the most effective approach before, during, and after an attack.
During this workshop, participants will learn:
• What makes a security incident more dangerous from IT incidents.
• The most effective way to detect security incidents.
• Why security incident response shouldn’t follow the same methodology as IT incidents.
• How to best integrate the outcome of an incident response into your change control processes.
JW Marriott Houston
June 1 & 2, 2015
- Access Control Alarm Systems, Biometrics, Building Management Systems, Card Readers, Cash Handling, Exit Alarms, Exit Devices, ID Card Printers, ID Systems & supplies, Key Holding, License Plate Recognition , Locks & Locking Systems, Security Doors and Windows, Smart Cards & ID Cards
- Business Continuity & Risk Management Business Continuity, Crisis Management, Disaster Recovery, Emergency Planning, Fire Risk Assessment, Health & Safety
- CCTV Cameras, CCTV Maintenance, Digital Video Recorders, IP Cameras, Mega Pixel Cameras, Multiplexers, Remote Video Monitoring, Surveillance & Monitoring, Thermal Imaging, Video Analytics
- Fire Solutions Emergency Lighting, Fire Alarms, Fire Doors, Fire Safety Equipment
- IP/IT Security Audit Security, Computer Network Security, Data security, Information Security Management, IP Networks, IP/TCP/Ethernet Systems, Networked Storage Systems, Video Servers, Visitor ID Systems, Wireless Access Control, Wireless Applications
- Lone Worker Security Close Protection, Guard Tour Verification, Manned Guarding, Mobile Communications
- Perimeter Security Barriers & Turnstiles, Cages/Enclosure, Fencing & Gates, Glazing Solutions, Intrusion Detection, Maintenance, Secure Lobbies, Shutters & Grills
- Specialist Concealed Weapons Detection, Crime Risk Assessment, Incident Management, Integrated Systems, Lockdown Solutions, Low Voltage Products, Mass Emergency Notification, Safes, Security Consultants, Security Resource Planning
- Transit Security Armored Vehicle, Maritime Security, Tracking Systems, Transmission Equipment, Vehicle Cameras, Vehicle Security
Latest Press Releaseposted by Yasmin Parsloe on Tuesday May 19, 2015
Patrick Hayes (SCF, QSA) is a confirmed speaker at the Total Security Summit taking place in Houston, Texas on June 1 & 2, 2015. Hayes will host the “Trust Modeling for Cloud Outsourcing” seminar which will give insight into current and relevant issues impacting organizations and threatening the security landscape. Hayes is a certified Enterprise Security Architect and PCI-DSS QSA...