Total Security Summit

Upcoming Event Dates

 

Fit a year's worth of meetings in 2 action-packed days. The event registration is no cost to qualified delegate attendees.

 

Who attends:  This event is specifically designed for Security decision-makers (Manager, Director, or VP), who have projects in the pipeline and are actively sourcing solutions

What you can expect:

  • Meet one-on-one with solution providers specific to your current project needs
  • Attend workshops and sessions
  • Network with peers from leading companies
  • Receive complimentary event registration, hotel accommodations, and meals at a luxury venue

How it works:

  • You select the solution providers you're most interested in meeting
  • Your interests shape your agenda of one-on-ones and sessions
  • We continue to add workshops up until the event
  • We cap our attendance at 50 spots
  • We hold the event twice a year and rotate regionally

Why you should attend as a delegate:

  • It's a more efficient way to source solution providers, and to get custom attention specific to your needs
  • You'll make profitable connections to help further your business goals
  • You'll stay up-to-date about the latest trends and technology advances in your industry

 

Forum Events has 20+ years of experience holding successful events across multiple markets. We're dedicated to providing you with a complete VIP experience from start to finish.

 

For More Information Please Contact...

Cherissa Irvin – Event Manager
(941) 925-7585 x8162  |  email

Rob Muise – Event Manager
(941) 925-7585 x8164  |  email

Brittany Kehrt – Event Coordinator
(941) 925-7585 x8165  |  email

Total Security Summit in Plano, TX
June 25 & 26, 2018

Event Workshops Include...

Active Shooter Response
Presented by Gregory Shaffer, Shaffer Security Group

In a world where your thoughts are rarely focused on such topics, proven, common sense instruction by experienced professionals, may eventually save your life.

Some of the high points that will be discussed are?

  • Avoid, Deny, Defend – Get Off the “X”; Secure Your Location; Improvised Weapons.
  • Pre-Incident Indicators; Looking for the “Abnormal”.
  • Active Shooter Response Plans & Drills – Empowering Your Employees!
  • Case Studies
  • Developing your Survival Mind Set

Taking On Hackers: A Modern Approach To Improving Physical Security
Presented by Terry Gold, Founder of D6 Research

With cyber-attacks and breaches on the rise, organizations are increasing their focus and competency in prevention and remediation. Professional cybersecurity specialists have established and leveraged a variety of effective practices to assess organizational specific threats they face as well as a step-wise process to determine their impact, priority, and measures to minimize their likelihood.

 

With the evolution of 3-tier models, cloud, connected networks and devices, cryptography, and APIs, Physical Security infrastructure has been evolving to resemble IT for the past few years and along with it inheriting the same sets of challenges and risks.  Unfortunately, professionals in the physical security industry, as a whole, have not subscribed to the same methodology and principles as their information security counterparts and as a result, have greater exposure than they realize.

 

In this session, Terry will introduce and review the first detailed threat model that he built for physical security. This area of research contains thousands of permutations of targets, methods and visibility of impact. Focused consideration will also be given to how physical security professionals need to radically change their approach and walk through a new stepwise methodology that’s built to help organizations make the transition.

 

Learning Objectives:

 

  1. 1.     Understand how physical security is targeted, attacked and exploit by professional by competent hackers.
  1. 2.     Uncovering your weaknesses: Introduction to threat modeling.
  2. 3.     Stepwise Methodology from discovery to remediation

 


See Something, Say Something
Presented by Michael Dunn PSP, ACP Regional A&E Manager, Axis Communications

The popular public safety campaign “See Something, Say Something" has acted as force multiplier urging everyone to take an active role in protecting their community. Video surveillance systems play a role in this force multiplier equation as well. But while it excelled as a tool to “see something," historically it lacked the audio capabilities to “say something." Those days, however, are numbered. New audio-augmented systems are significantly increasing the effectiveness of surveillance systems to deter crime, and improve public safety.

In this session attendees will learn about how to increase the effectiveness of video surveillance systems by:
• Increasing the deterrence by adding audio capabilities
• Navigating the legal mine field of adding audio to your systems
• Understanding the technical skills for successful deployment (Hint: you already have them)
• Implementing “Audio Analytics" to proactively identify threats


Low Energy Operators, Exit Devices and Exit Alarms
Presented by Tim Shafer, Marketing Manager, Detex Corporation

This informative course will cover:

   • When and where to specify

   • Understanding requirements of the application

   • What products to use that will give the best value and provide a

      correct and complete installation

   • What will be needed for the designated installation location;

      Recognition of possible installation problems and what will be  needed to overcome            these problems

   • The installation and usage of all other support equipment that may

  be required such as electrified panic hardware, wireless push  button, etc.


Construction & Security Trends in 2018 and Beyond…’Learn how these business segments are evolving with technology’
Presented by Kevin Hendershot, PSP Director of Strategic Integrator Partnerships of Assa Abloy

Learn about:

 

  • The changing construction world…operating more efficient.
  • LEED & Sustainability…how is security becoming involved?
  • Cell Phones, Credentials and Access Control

Mobile Access Credentials: Dissecting The Hype And Getting To The Truth
Presented by Terry Gold, Founder of D6 Research

This session will review newly released in-depth neutral research regarding mobile security credentials, based on a three-year study in working with some of the largest companies to model technology, policy and outcomes in real-world environments.

 

This session will break down the state of industry, how vendor approaches, general architecture and approaches, spectrum of features, and trade-offs. Most important perhaps, we’ll take the audience through a decision tree to add clarity as to how best to develop their unique requirements and understand what their best approach might be. Included in the discussion considerations as to impact to security effectiveness, potential introduction of new threats, operational, process and policy changes, current-state design defects, pitfalls and areas for significant outcome improvement. A neutral viewpoint of the vendor landscape will be reviewed.

 

Learning Objectives:     

  1. Distinguish differences between the myriad of offerings by being able to identify within four fundamental architecture models and how they apply to given circumstances.
  2. Coordinate best practice approach to assessment project and determine who to involve and what existing policies may need to be changed or created to accommodate mobile.
  3. Gain visibility into a broad spectrum of use cases and outcomes that can be achieved beyond authentication to improve security, user experience, and productivity.

 


The Complex Role of Corporate Security in Today’s Corporate World
Presented by Tracy Reinhold, Vice President/Chief Security Officer of Everbridge

  1. How to enhance your brand within the organization
  2. Leveraging technology in advancing security
  3. Building your business case for the capital expense of modernizing your security system
  4. Building executive sponsorship for your program
  5. Effective communications with the core business…how to avoid “security speak” and gain traction in the company

Venue

Dallas/Plano Marriott at Legacy Town Center

7121 Bishop Road
Plano, TX 75024
972-473-6444

Website  |  Map & Directions

Plano, TX

June 25 & 26, 2018

Areas Covered

  • Access Control
    Access Control Power Solutions, Alarm Systems, Biometrics, Building Management Systems, Card Readers, Cash Handling, Exit Alarms, Exit Devices, ID Card Printers, ID Systems & supplies, Key Management/Key Holding, License Plate Recognition , Locks & Locking Systems, Security Doors and Windows, Smart Cards & ID Cards
  • Business Continuity & Risk Management
    Business Continuity, Crisis Management, Disaster Recovery, Emergency Planning, Fire Risk Assessment, Health & Safety
  • CCTV
    Cameras, CCTV Maintenance, Digital Video Recorders, IP Cameras, Mega Pixel Cameras, Multiplexers, Remote Video Monitoring, Surveillance & Monitoring, Thermal Imaging, Video Analytics
  • Cyber/IT Security
    Audit Security, Backup Data Storage/Solutions, Biometric, Computer Forensics, Computer Network Security, Contingency Planning, Data security, Firewalls, Hackers, Identity Management, Incident Response/Management, Information Security Management, Information Security Management, Intrusion Protection, IP Networks, IP/TCP/Ethernet Systems, Malware, Media Protection, Mobile Security, Network Access Control, Network Behavior Analysis, Network Security, Networked Storage Systems, Remote Access, Risk Assessment, Security Policy, Threat analysis, Video Servers, Virus detection, Visitor ID Systems, Wireless Access Control, Wireless Applications
  • Fire Solutions
    Emergency Lighting, Fire Alarms, Fire Doors, Fire Safety Equipment
  • Lone Worker Security
    Close Protection, Guard Tour Verification, Manned Guarding, Mobile Communications
  • Perimeter Security
    Barriers & Turnstiles, Cages/Enclosure, Fencing & Gates, Glazing Solutions, Intrusion Detection, Maintenance, Secure Lobbies, Shutters & Grills
  • Specialist
    Access Control Managed Power Solutions, Asset Protection, Concealed Weapons Detection, Corporate Threat Assessment & Management, Crime Risk Assessment, Executive Protection, Incident Management, Integrated Systems, Lockdown Solutions, Loss Prevention, Low Voltage Products, Mass Emergency Notification, Physical Protective Security, Safes, Security Consultants, Security Resource Planning
  • Transit Security
    Armored Vehicle, Maritime Security, Tracking Systems, Transmission Equipment, Vehicle Cameras, Vehicle Security

Confirmed Vendors

Latest Press Release

Chance Heads Up New IT Security Sector at Total Security Summit

posted by Yasmin Parsloe on Tuesday Mar 8, 2016

The Total Security Summit is launching an IT/Network Security sector as part of the 2016 event program headed by Event Manager and Specialist Xavier Chance. By adding IP and IT security to the list of areas covered, the Total Security Summit will become a more inclusive event focusing on topics ranging from physical security to IT, including audit security, computer network security, data security...