SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

SIA Women in Security Forum: Jackie Bray at ISC East

12 Sep 2024

SIA Women in Security Forum: Jackie Bray at ISC East
Contact company
Contact Security Industry Association (SIA)
icon Add as a preferred source Download PDF version
Related Links
  • How are wearable technologies impacting the security market?
  • What is the most overlooked factor when installing physical security?

ISC East, with its premier sponsor the Security Industry Association (SIA), and in partnership with the ASIS NYC Chapter, announced 2024’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination.

ISC East Keynote Series

  • Day 1 Keynote: Proactive Security Strategies at Navy Pier, Chicago: A Unified Approach to Emergency Preparedness and Response – Brian Murphy, chief operating officer at Navy Pier in Chicago, Illinois, will discuss how the Navy Pier has developed a comprehensive security strategy that emphasises proactive measures and unified emergency preparedness.

This approach integrates advanced technologies, coordinated efforts among various public safety agencies, and continuous training to ensure a safe environment for all visitors.

  • Day 2 Keynote, Presented by the SIA Women in Security Forum: Commissioner Jackie Bray. (Sponsored by Axis Communications) – Join them for an engaging keynote event presented by the SIA Women in Security Forum (WISF), a professional community committed to engaging all security professionals in promoting, recruiting, and cultivating the leadership of women for a stronger and more inclusive industry.

Hear from Jackie Bray, the first female commissioner of the New York State Division of Homeland Security and Emergency Services.

SIA Education@ISC programme

ISC East will also place special emphasis on critical infrastructure protection and addressing the risks

In addition to the Keynote Series, the event will offer its largest SIA Education@ISC programme yet with 70+ sessions and 150 speakers – all carefully curated by the newly formed SIA Education@ISC Advisory Board.

This team of industry experts provides critical guidance on the newest trends and most relevant technologies in the world of security to best inform show programming. ISC East will also place special emphasis on critical infrastructure protection and addressing the risks and vulnerabilities associated with safeguarding the country’s essential service sectors.

Up-to-date programming

“ISC East takes stock of the current safety and security landscape to provide the most up-to-date programming for our attendees and exhibitors,” said Mary Beth Shaughnessy, ISC event vice president.

“With the help of the SIA Education@ISC Advisory Board, we have prepared a dynamic lineup of industry thought pioneers for the Keynote Series and an engaging education schedule highlighting the most innovative topics and solutions in the field. With ISC East two months away, we are eager to present these offerings to our dedicated customers who return to our show year after year to continuously build on their security knowledge.”

Technical training and case studies

“At the SIA Education at ISC East conference, attendees can uncover a robust variety of compelling sessions on the most pressing issues in our industry across public safety, emergency preparedness and response, and homeland security,” said SIA CEO Don Erickson.

“In addition to high-quality keynote presentations from Navy Pier’s Brian Murphy and Commissioner Jackie Bray, the 2024 programme boasts more offerings than ever before and a unique mix of interactive panel discussions, technical training, and case studies to help security professionals advance their careers, their businesses and the industry as a whole.”

Featured SIA Education@ISC Sessions

A Deep Dive Into OT Cybersecurity – Securing the World’s Critical Infrastructure

Tuesday, Nov. 19, 11:00 – 11:45 am. | 1A24

Speakers:

  • Christopher Walcutt, chief security officer, DirectDefense
  • Adi Karisik, division vice president, global strategy and operations – cyber and intelligence, Jacobs
  • Pierre M. Bourgeix, CEO and founder, of ESI Convergent
  • Joey St. Jacques, CEO of Utility Intelligence International, Chair – SIA Utilities Advisory Board

Cybersecurity in the future

The focus will include dealing with AI, utilising AI to protect, and advanced uses for data from these critical systems

This panel will cover a variety of topics surrounding cybersecurity in the future of protecting critical infrastructure. The focus will include dealing with AI, utilising AI to protect, advanced uses for data from these critical systems, and new and different approaches to solving old problems in the critical infrastructure cyber and physical security space.

Panelists will include system designers, integrators, former utility employees, and consultants who actively design and operate defenses in this space.

Lessons From the Frontlines: Cybersecurity Case Studies for the Physical Security World

Wednesday, Nov. 20, 9:30 – 10:15 a.m. | 1A24

Speaker:

  • William Knehr, senior manager of information security and data privacy, i-PRO Americas

Tactics compromise physical security systems

The lines between cybersecurity and physical security continue to blur. In this presentation, he will dive into real-world case studies that expose the tactics cybercriminals use to compromise physical security systems.

Attendees will analyse how these attacks unfolded and explore the devastating consequences for facilities, operations, and even personnel safety.

Security Risk and Return on Investment: Are You Looking at Just the Tip of the Iceberg?

Wednesday, Nov. 20, 10:30 – 11:15 a.m. | 1A06

Speakers:

  • Rachelle Loyear, vice president of integrated security solutions, Allied Universal
  • James Marcella, director of industry relations, Axis Communications

Security risk management

The session will feature insights from an enterprise security risk consultant and expert

This engaging panel discussion will delve into the complexities of security risk management and programme value assessment, emphasising the importance of looking beyond upfront costs to understand the full spectrum of potential risks and long-term expenses.

The session will feature insights from an enterprise security risk consultant and expert and a security technology manufacturer, each providing unique perspectives on risk-led security design.

Keeping the Skies of NYC Safe: Critical Infrastructure Sites Collaborate with NYPD

Thursday, Nov. 21, 11:15 a.m. – 12:00 p.m. | 1A06

Speakers:

  • Jackson Markey, director of U.S. commercial sales, Dedrone
  • Lieutenant James Reilly, Counter Terrorism Division, New York City Police Department
  • Scott Gross, facility security officer, Con Edison of New York

Counter-drone security protocols

New York City has strict drone permitting regulations – developed in response to a growing number of drone incidents in areas like Hudson Yards (not far from the Javits Center) and near Con Edison facilities. 

While the NYPD handles enforcement, private entities also recognise the risks of illegal drones. This session, featuring public and private representatives, will use NYC as a case study to show how different organisations collaborate to create effective counter-drone security protocols and aid in apprehensions.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Fleet surveillance
  • Application security
  • Physical security
  • Security management
  • Security monitoring system
  • Intrusion detection
  • Facility security
  • Green security
  • Integration software
  • Cyber security
  • Cloud security
  • Drones
  • Related links
  • ISC East 2024
  • Axis Communications CCTV software
  • Control Software CCTV software
  • Detection Software CCTV software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Management Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV software
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Events news
About this page

Join the SIA Women in Security Forum keynote at ISC East featuring Commissioner Jackie Bray, highlighting women's leadership in the security industry. Don't miss this empowering session!

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec