TechSec Solutions announces 2010 program
DELRAY BEACH, Fla.—TechSec Solutions, a conference dedicated to the impact of IP technology on the physical security industry to be held here at the Delray Beach Marriott, Feb. 1 and 2, 2010, announced today its seminar program for the upcoming show. Selected from more than 150 submissions by editorial programmer L. Samuel Pfeifle (also executive editor of Security Systems News and Security Director News) following an open call for presentations in June, the program represents a wide spectrum of knowledge, from instructional sessions that get at the very basics of security technology to panel discussions that will shape the industry’s future.
Unlike other conferences in the industry, TechSec makes no distinction between attendees and exhibitors, and closes the conference show floor while seminar programming is in session. The two-day conference brings together the industry’s leading voices, and was the site, in 2008, of the founding of the Physical Security Interoperability Alliance. You can learn more about the conference at www.techsecsol.com or by emailing Pfeifle at firstname.lastname@example.org. The conference is owned by Security Systems News’ and Security Director News’ parent company, United Publications.
The presentations that will be included at the 2010 event are as follows:
Innovation or Confusion? How will High Tech Industries Impact Electronic Security Systems?
The rapid advances in technology can positively or negatively influence you every day as a physical security professional. This session examines 10 of the most promising technologies for our industry, such as HD, SaaS, POE, dashboarding, data visualization, GIS and video analytics and outlines examples of how they will impact physical security. The panelists will offer evaluation and decision-making processes to include, ignore, or postpone deployment of new technologies for your electronic security system. The session discusses how, given two functionally equivalent security systems, the simplest one to manage should be chosen.
Fredrik Nilsson, General Manager Americas, Axis Communications
Charlie Pierce, President, IPC Technologies
Severin L. Sorensen, CPP, President and CEO, Sikyur LLC
How the Virginia Port Authority Put the Control Back in its Control Room
The Virginia Port Authority faced several unique challenges following the terrorist attacks of 9/11. Needing to manage risk at its three marine terminals located on the Southern tip of Virginia from security threats (Norfolk International Terminals, Newport News Marine Terminal and Portsmouth Marine Terminal), it invested $22 million in security upgrades that included 250 IP-based video cameras, new access control software, perimeter fence sensors and other security elements to harden buildings. Now, it needed to provide its police officers and dispatchers in its new command center in Norfolk, with the ability to integrate these devices and electronic access to this data at a moments notice. How did they do it?
Ed Merkle, Director of Port Security and Emergency Operations, Virginia Port Authority
Mike Brewer, Captain, Operations Division Commander, Virginia Port Authority Police Department
Rafi Bhonker, Vice President of Worldwide Marketing and Sales
Bigger Bang for your Buck: Non-Traditional Uses of IP Surveillance
In these uncertain economic times, more than ever before, organizations are looking for a return on investment for their surveillance expenditures. While there have been many attempts to prove the ROI of security based surveillance, this presentation is designed to look at ROI from another perspective. Instead of proving the ROI of security-based surveillance, why not leverage security surveillance infrastructure for non-security applications for which it is much simpler to calculate a clear ROI? These examples include marketing and revenue generation, green initiatives, operations efficiency, and reduced liability and fraudulent insurance claims.
Marc Holtenhoff, CEO, Aimetis Corp.
Bob Nelson, Sr. Mgr. Client Services and Operations, CA Atlantic
Separating Video Wants From Needs—The Essential Questions
This presentation will explore, in detail, the essential questions that the decision maker must answer before contacting anyone—consultant, integrator, or manufacturer—about purchasing a video surveillance system: How will your video system be used? Where do you need surveillance? While it may be nice to have every square foot of your facility covered, can you afford it? What type of video do you need? What is the right technology to use for your application? How can you maximize the investment in your system?
Paul Bodell, Chief Marketing Officer, IQinVision
The Integration of Safe & Green: Insight into the Green Security Movement
Can security and sustainability be aligned with one another? Or are they destined to collide in modern buildings? This presentation will discuss what it means to be “Green” from a security perspective and demonstrate that security and sustainability can function collaboratively within a building. It can appear that Leadership in Environmental and Energy Design certification (LEED) is driving a wedge between sustainability and security. In today’s competitive landscape, however, a corporate sustainability program is quickly becoming as important as a company’s security program. As security professionals, it is crucial to determine how security and sustainability can coexist, and even discover applications in which they can support one another.
Steven Turney, Security Business Manager, TAC by Schneider Electric
Lighting the Way to High-Quality IP Video
One of the most common measures of how well an IP surveillance system is designed is
the quality of images produced. While camera selection is important, the right amount of
light at a scene can dramatically improve clarity of images and the efficiency of the system. In this session, learn how appropriate lighting can lower bandwidth consumption and reduce storage costs for your system and how the use of active infrared technology can optimize video quality for effective 24/7 surveillance.
Dr. Bob Banerjee, Product Marketing Manager, IP Video Products, Bosch Security Systems, Inc.
Jim Coleman, president of Operational Security Systems
Using Retail Traffic Patterns to Enhance Your Bottom Line
For retailers, the pressure on margins has never been greater. Maximizing revenue per square foot and optimizing in-store marketing tools makes additional dollars flow directly to the bottom line. Previously, the tools used to do this were both labor and data-intensive, and expensive to deploy, but advances in technology make it possible to use existing video infrastructure to largely automate this process. The use of retail traffic analysis to better understand the customer experience, how customers react to in-store promotions and advertising, and how long shoppers linger in certain areas of retail stores allows retail operations to gain completely new insights into their business performance in close to real-time. Understanding customer behavior patterns helps retailers reduce loss and improve their bottom line.
Alex Johnson, Director of Sales Enablement for Verint Systems
Security Director, Major US Retailer
Physical and Logical Security Collaboration: The Team Approach to Lowering Costs and Decreasing Risk
With the advent of IP-based technology and the consolidation of physical and logical security on the same network, IT and physical security departments are, for the first time, looking at how best to share critical information and knowledge to provide better security. This panel will discuss the technology that is spawning a new way of thinking about converged Physical/Logical Security, the ability to use this technology to lower risks and operational costs at the same time, and the role “Security as a Service” might play in delivering an integrated solution.
Dave Fowler, Senior VP Marketing & Product Development, VidSys
Jim Crim, Vice President, Federal Information Technology, Coleman Technologies, Inc.
Laurie Aaron, Vice President, Government and Alliances, Quantum Secure
How Security Systems, Data Centers, SCADA, and data itself are at risk from device born intentional electromagnetic interference
In this session, attendees will get background information on the threat of intentional electromagnetic interference threats against civilian and non-military government facilities, mission critical systems and data assets, hear about the business impact on industry, and discuss remediation strategies. With multi-disciplined expertise and threat testing programs, speakers will also share information from their work with Congress and standards organizations toward remediation of issues these threats represent to various areas of critical infrastructure. One granular example is the effect of these devices upon data, changing the data state, which is a non-network borne cyber attack, as well as a physical threat.
Gale Nordling, CEO, Emprimus
Jim Danburg, Director of Security & Continuity, Emprimus
How the Partnership Between Physical and IT Security Integration Can Benefit the Industry
As security integration becomes more complex and increasingly converges roles traditionally taken on by both physical security and IT departments, it is crucial that physical security integrators and IT integrators partner to deliver in tandem better products and services. A successful partnership benefits everyone from the manufacturer on down to the end user: We’ll show you how to make it work.
Bill Bozeman, CEO and president, PSA Security
Paul Cronin, Chairman, 1nService
Mobile SaaS meets the demand for Eyes Everywhere
IP cameras that are easy, affordable and effective are available on a subscription basis to the untapped market of SMB’s, homeowners and now to those end-users demanding mobile professional surveillance. What will it take for integrators to embrace this opportunity for new customers and increased revenue through recurring monthly revenue? Will IT and cellular companies swoop in and grab market share from the existing security professionals because of their level of comfort with IP technology? Or will the security community step up and reestablish their dominance in the security realm? There is a gap in the market and the question is “who will capture the market in the gap”? Who will be the early adopters of this use of mobile IP technology and who will be the laggards?
Brian Lohse, Director of Business Development, Secure-i
Mark A. Sousa, Director of Transit, City of Nashua, NH
Josh Gervey, Managing Consultant, National Practice Director Enterprise Management Services, CompuCom
Paul Pierce, Lund University of Economic Research
Navigating the Sea of Government Programs
There are several new governmentally regulated security programs that span different markets and areas and put an emphasis on the newest IP-based technology. Attendees will be able to differentiate and grasp the primary concepts of each of the following programs, and recognize the current status of each:
• TWIC (Transportation Workers Identification Credentials)
• CFATS (Chemical Facility Anti-terrorism Standards)
• ICE (U.S. Immigration and Customs Enforcement)
Attendees will walk away with resources and tips to implement in their day-to-day operations that will help expedite compliance with these programs.
Misty Stine, Senior Director, Critical Infrastructure, Adesta
Extending Trust and Security to Networked Physical Security
The session will examine pervasive security and the role of existing standards, including those from Trusted Computing Group. Attendees will learn about the role of trust in converged networks and implementing trust. They also will gain an understanding of specifications including the IT industry’s leading network access control architecture and the metadata access protocol, which lets many devices communicate so that policies and remedies can be implemented from the door to the employee cubicle to the factory floor.
Robert Beliles, Vice President of Enterprise Business Development, Hirsch Electronics
Cold Disk Technology for Video Storage and Archiving
Two well known “green” technologies that have helped revolutionize IP-based video solutions include structured cabling systems (SCS) and Power over Ethernet (PoE); however, a third technology has emerged – Cold Disk Technology (CDT). Unlike other video storage arrangements that use constantly running disk drives for storing video, CDT dynamically routes data to multiple hard disk drives providing a distributed approach to video storage. This technology is new to the video surveillance industry and represents a revolutionary shift in how video will be stored in the future.
Dale Gigandet, P.E., CPP, Director of Business Development, Xtralis
Video Analytics Round-Table
Perhaps the most hotly debated area of the security industry is that of video analytics, their utility and failings, their implementation and sale. In this roundtable, prominent executives from the leading analytics manufacturers discuss what’s fact and what’s fiction in their worlds.
John Whiteman, President, ioimage
Doug Marman, CTO, VideoIQ
Eric Eaton, CTO, BRS Labs
Bob Cutting, Vice President of Product Management, ObjectVideo
Moti Shabtai, Executive VP of Business Development & Strategy, NICE Systems
Moderated by L. Samuel Pfeifle, Executive Editor, Security Systems News and Security Director News