SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

SIA-sponsored Connected Security Expo @ ISC West to highlight leading authorities on physical and cyber security

icon Add as a preferred source Download PDF version
Related Links
  • SIA-sponsored Connected Security Expo @ ISC West announces Conference Advisory Board
  • PSA Security Network announces sponsorship of Connected Security Expo @ ISC West 2016
  • SIA sponsored Connected Security Expo @ ISC West announces leading IT security practitioners as keynote speakers
Connected Security Expo is designed to help security leaders keep pace with IT security trends while helping secure critical data
The session will also explore how to evaluate the privacy risks around IoT deployments
Connected Security Expo @ ISC West, sponsored by the Security Industry Association (SIA), will highlight some of the security industry’s leading authorities on physical and cyber security during its two-day educational programme, being held April 6-7, 2016, at the Sands Expo Center in Las Vegas. Focused on the latest trends in physical and cyber security, Connected Security Expo is designed to help security leaders keep pace with IT security trends while helping secure critical data, people, physical assets and supply chains across a more connected world.

Focusing on technology driven solutions

The conference sessions will appear in two tracks: People and Process, and Technology. The former features sessions on navigating the relationship between information security officers and physical security directors, engaging boards in cyber security discussion and risk evaluation, and building a collaborative framework to address information risk. The latter focuses on technology-driven solutions to address threats within the secure enterprise, reducing time to detect threats and building effective response plans. 

“A conference centered around the convergence of the cyber and physical security worlds is long overdue, as we see new threats appearing every day that make us question data protection levels,” said Jeremy Brecher, Senior Vice President, Technology, and Chief Information Officer, Securitas Electronic Security, Inc. “Today’s innovations and processes are enabling the complete mobilisation of the secure data centre without limiting functionality, but without coupling that capability with complete protection, data can be easily compromised. A dialogue must be had to help today’s IT leaders gain greater knowledge of how to work together to ensure data protection.”

Brecher will lead the panel, “What Does the Internet of Things Really Mean for Enterprise Information Security?” which will discuss the real level of cybersecurity risks that are introduced as enterprises increasingly adopt the Internet of Things (IoT). Speakers will recommend how information should be controlled on the IoT and who should be responsible for that information. The session will also explore how to evaluate the privacy risks around IoT deployments and how organisations can meet privacy and security standards in a more connected world.

Panel topics and keynote speakers

Other panels include, ”The Evolving Relationship Between the CISO and CSO in the Cyber-Physical Age,” “Engaging the Board in Cyber Security,” “Mitigating Cyber Security Attacks on Physical Security Systems,” and “The Command Centre Experience: From Design to IoT,” and many more. 

“Coordination between physical and IT security systems is critical to improving our security posture when organisations are faced with an attack or threat of an attack — whether the attack comes from dedicated hackers, nation states or terrorist groups,” said Herb Kelsey, Chief Architect, Guardtime. “Multiple studies on breaches and attacks on infrastructure show most could be deflected by using simple, well-known security measures. Industry leaders must be able to communicate with multiple departments to identify vulnerabilities and work collaboratively to address these challenges — and this conference is leading the way in launching this discussion.”

Kelsey will serve as the opening keynote speaker, presenting on, “Reducing the Time to Detect Tamper – Physical Security’s Mission Against Cyber Threats.” The presentation addresses the vulnerabilities derived from the IoT, as well as the need for enterprise IT teams to converge to understand when their environments have been tampered with to quickly restore breaches. 

“We have a robust group of educational sessions that address some of today’s most pressing topics related to the protection of assets,” said Ed Several, Senior Vice President and General Manager, ISC Events. “We have recognised the need within the industry to help facilitate the discussion about cyber security threats and strategise ways that these threats can be mitigated before serious problems arise. We hope this conference, and the panels and presentations we’ve selected will create a continued dialogue on these issues.” 

The Connected Security Expo is co-located with ISC West, the largest physical security event in the Americas.

Find out about secure physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Physical security
  • Security camera systems
  • Cyber security
  • Related links
  • ISC West 2016
  • Related categories
  • CCTV cameras
  • Access control systems & kits
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Events news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec