Subscribe to RSS - Cybersecurity

Cybersecurity

CSAA names speakers for 2015 annual meeting

 - 
05/06/2015

SONOMA, Calif.—CSAA announced three of the speakers for its 2015 Annual Meeting, to be held here Oct. 10-14, with the keynote speaker, Stan Stahl, Ph.D, discussing cybersecurity.

ASIS announces speakers for this year

 - 
04/02/2015

ANAHEIM, Calif.—Experts on physical security, cybersecurity and terrorism will be keynote speakers at the ASIS show, which will take place here Sept. 28 to Oct. 1.

SIA Government Summit takes on convergence of cybersecurity, physical security, law enforcement tech trends and more

 - 
03/27/2015

WASHINGTON—The convergence of cybersecurity and physical security, funding for safe schools and law enforcement technology trends, including body-worn cameras, will be among the topics featured at the SIA Government Summit in June.

News Poll: Cybersecurity is becoming a physical security matter

Though, some readers say more ‘definition’ is needed
 - 
03/25/2015

YARMOUTH, Maine—As cybersecurity becomes a common topic of conversation among physical security systems installers, Security Systems News asked its readers whether they’re concerned about cybersecurity threats and what their companies are doing to safeguard themselves and their customers.

PSA-TEC tackles cybersecurity with education, spotlight sessions, new certification at annual event

Special educational sessions include ‘Adapt or Die’ integrator panel discussion
 - 
03/13/2015

WESTMINSTER, Colo.—“Think, explore, connect” is the theme of PSA-TEC, PSA Security Network’s annual education and training event that will take place here May 3-8.

Security fundamentals can be strong weapons against cyberattacks

Integrators need to be able to do more than just bring in the IT people
 - 
02/18/2015

YARMOUTH, Maine—The recent security crisis at Anthem Blue Cross and Blue Shield reaffirms that the constant threat of cyber hacks is the new normal. Business as usual in the security industry doesn’t exist anymore. So what kinds of proactive steps are integrators and central stations taking to prevent cyberattacks?

Pages