Cybersecurity

 

 

https://adminsm.asisonline.org/Pages/Book-Review---Credit-Card-Fraud.aspxBook Review: Credit Card FraudGP0|#91bd5d60-260d-42ec-a815-5fd358f1796d;L0|#091bd5d60-260d-42ec-a815-5fd358f1796d|Cybersecurity;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-07-01T04:00:00ZJen Grondahl Lee and Gini Graham Scott; Reviewed by Ben Rothke<p>​Rowman & Littlefield Publishers; rowman.com; 264 pages; $36.</p><p>Credit card fraud is a huge issue. It keeps everyone, from banks and merchants to customers and police departments, up at night. Attackers are savvy and think of ways to break new credit card protection mechanisms, often only a few hours after they are implemented.</p><p>While the problem will never go away, in <em>Preventing Credit Card Fraud: A Complete Guide for Everyone from Merchants to Consumers,</em> Jen Grondahl Lee and Gini Graham Scott have written a most valuable guide that can be used by everyone within the credit card lifecycle to better protect themselves. </p><p>The book is written for two different audiences and divided into corresponding sections: "Protecting Yourself as a Consumer or Client" and "Protecting Yourself as a Merchant or Service Provider." Each provides a lot of information and helpful tips readers can put into play to ensure they don't become victims of credit card fraud.</p><p>For customers, the authors describe "free trial" scams, where devious merchants offer a free trial, but with odious terms and conditions. Customers supply valuable credit card information, and by the time they know what has happened, they are often on the hook for hundreds of dollars of worthless products.</p><p>For merchants, there is guidance on knowing your customer to obviate credit card fraud. But the authors don't paint a pretty picture, in that when fraudsters are caught, they rarely face jail time. And even when they do, it's often for insignificantly short sentences. </p><p>The rate of credit card fraud is not slowing down. Small efforts can go a long way toward avoiding becoming a victim. For those looking to put in the effort, Preventing Credit Card Fraud is a helpful and valuable guide..</p><p><em>Reviewer: Ben Rothke, CISSP (Certified Information Systems Security Professional), PCI, QSA (Qualified Security Assessor), is a principal security consultant with Nettitude.</em></p>

 

 

https://adminsm.asisonline.org/Pages/Blockchain-Buzz.aspx2018-07-01T04:00:00ZBlockchain Buzz
https://adminsm.asisonline.org/Pages/On-Premise-vs-the-Cloud.aspx2018-05-25T04:00:00ZOn-Premise vs the Cloud
https://adminsm.asisonline.org/Pages/Book-Review---Mastering-Bitcoin.aspx2018-05-01T04:00:00ZBook Review: Mastering Bitcoin

 

 

https://adminsm.asisonline.org/Pages/Bridging-Worlds.aspx2018-07-01T04:00:00ZBridging Worlds
https://adminsm.asisonline.org/Pages/Attacks-on-the-Record.aspx2018-06-01T04:00:00ZAttacks on the Record
https://adminsm.asisonline.org/Pages/Cyber-as-Statecraft.aspx2018-05-01T04:00:00ZCyber as Statecraft

 

 

https://adminsm.asisonline.org/Pages/Attacks-on-the-Record.aspx2018-06-01T04:00:00ZAttacks on the Record
https://adminsm.asisonline.org/Pages/How-to-Hack-a-Human.aspx2018-01-01T05:00:00ZHow to Hack a Human
https://adminsm.asisonline.org/Pages/A-New-Social-World.aspx2017-12-01T05:00:00ZA New Social World

 

 

https://adminsm.asisonline.org/Pages/Book-Review---Credit-Card-Fraud.aspx2018-07-01T04:00:00ZBook Review: Credit Card Fraud
https://adminsm.asisonline.org/Pages/Artificial-Adversaries.aspx2018-06-01T04:00:00ZArtificial Adversaries
https://adminsm.asisonline.org/Pages/Cyber-as-Statecraft.aspx2018-05-01T04:00:00ZCyber as Statecraft

 

 

https://adminsm.asisonline.org/Pages/Cybersecurity-for-Remote-Workers.aspx2018-02-12T05:00:00ZCybersecurity for Remote Workers
https://adminsm.asisonline.org/Pages/Mobile-Mayhem.aspx2017-10-01T04:00:00ZMobile Mayhem
https://adminsm.asisonline.org/Pages/AI-The-Force-Multiplier.aspx2017-09-01T04:00:00ZAI: The Force Multiplier

 You May Also Like...

 

 

https://adminsm.asisonline.org/Pages/July-2018-ASIS-News.aspxJuly 2018 ASIS News<h4>​GSX Promises Vegas Flair</h4><p>World-class networking is a hallmark of the ASIS annual event. In Las Vegas this September, the Society is pulling out all the stops for Global Security Exchange (GSX), formerly the Annual Seminar and Exhibits. From bowling to luncheons to a reception at Drai's Nightclub, GSX offers countless opportunities to forge new connections and cement existing relationships at the industry's premier networking events.</p><p>Kick off the week on Sunday, September 23, by teaming up with friends and colleagues for the ASIS Foundation Golf Tournament at Bali Hai Golf Club, located next to the Las Vegas Strip. Registration includes breakfast, player gifts, and a buffet lunch, with event proceeds benefiting the ASIS Foundation. </p><p>On Sunday evening, the popular Brooklyn Bowl will be transformed into the GSX Opening Night Celebration. Don your bowling shoes and join thousands of peers for a fun-filled night of food, music, and catching up with friends. </p><p>The U.S. Outstanding Security Performance Awards (OSPAs) Luncheon on Monday provides an opportunity to celebrate excellence across the industry—from young professionals to managers to consultants, and more. The deadline to enter for U.S. OSPAs consideration is July 23. Apply at us.theospas.com/enter.</p><p>In addition to opportunities to connect with colleagues in the halls and while perusing the exhibits, the ASIS International Happy Hour on Tuesday on the show floor will celebrate the end of the first day of exhibits. Grab a drink and relive the highlights of the day.</p><p>Close the week in style at the annual President's Reception at Drai's Nightclub. At one of Las Vegas's most exclusive venues, guests will be treated to an evening of live entertainment, food and drinks, networking, and a view of the Strip from the 11th story capstone of the Cromwell hotel.</p><p>Register for an All-Access Pass before August 10 and save $100 on your ticket to these events and more. Visit GSX.org/register to sign up.​</p><h4>SECOND QUARTER GLOBAL EVENTS</h4><p>Excitement is building towards GSX this September in Las Vegas, as evidenced by the energy at the following events that took place in the second quarter of 2018. </p><p><strong>CSO Summit</strong></p><p>Transparency battles. Global rules in flux. Artificial intelligence. </p><p>Global chief security officers and deputies who attended the 11th Annual CSO Summit April 29 through May 1 at Target Plaza Commons in Minneapolis, Minnesota, grappled with how these and other change drivers will affect the security profession. </p><p>While key conversations and experiences—such as a private security tour of U.S. Bank Stadium—were prevalent, at center stage was a forward-looking agenda aiming to make sure security executives adapt and remain relevant to their organizations. </p><p>Futurist and cybersecurity professional Scott Klososky led off the conference by emphasizing that security leaders are responsible for looking into the future and—before anyone else—understanding how the world, their industry, and their businesses are changing, especially with an eye toward future risk. </p><p>For every cutting-edge technology solution or strategic advantage discussed throughout the event, there was equal and appropriate caution regarding unintended consequences. </p><p>For example, artificial intelligence will help security by enabling analysis of logarithmically more data, such as using HR records to identify insider threats, but it has to be implemented properly and with auditability because it can lead to algorithmic bias—that is, it could systematically discriminate against certain groups.</p><p>A common theme across the two days was to define security initiatives in terms of drivers and enablers of business and savings, rather than as sunk costs. Speakers shared examples of strategies they used to calculate the cost savings of implementing new security projects to justify those programs to the C-suite. </p><p>Another common theme was that the path forward for corporate security, and sustainable success in business, requires effective implementation of enterprise security risk management (ESRM), where the organization formally and holistically manages risk. </p><p>This can go hand-in-hand with a DevSecOps approach, where all employees are empowered to contribute to organizational safety and security, especially as it becomes more difficult to centralize response to the growing activities and vast data sources generated by modern business processes and systems.</p><p>CSOs and their deputies will have the opportunity to continue exploring the evolution of these change drivers and attend exclusive educational sessions in the CSO track at GSX in September. </p><p><strong>ASIS NYC</strong></p><p>Thousands of security and law enforcement professionals gathered at the Jacob K. Javits Center May 16 and 17 for the ASIS 28th New York City Security Conference and Expo to dive into networking, education, and exhibits at the Northeast's leading security event.</p><p>The event started with a Security Rocks welcome party at the Hard Rock Cafe on Tuesday evening. Live entertainment set the scene for fun and networking worthy of the Big Apple.</p><p>Conference education began Wednesday morning with a keynote from JPMorgan Chase Crisis Management Head Scott Morrison, who discussed emerging threats and trends. </p><p>The emerging trends theme continued throughout the day, via a panel discussing the legal and practical applications of drone technologies, a crash course on implementing ESRM to earn security a "seat at the table," and a talk from Facebook Chief Global Security Officer Nick Lovrien, who explored the challenges associated with securing Facebook's open office environment.</p><p>Thursday's education focused on active assailant attacks, with sessions devoted to emergency preparedness and vehicle-involved attacks. At Thursday's Person of the Year Luncheon, the ASIS New York City Chapter honored His Eminence Timothy Cardinal Dolan for his service to the people of New York.</p><p>On both days, a bustling expo floor provided attendees the opportunity to meet with some of the region's foremost solutions providers.</p><p><strong>ASIS Toronto Best Practices</strong></p><p>ASIS Toronto's largest educational event of the year, the 2018 Best Practices Seminar held on April 19, was its largest ever, with a full house of 200 attendees and speakers. It was the 25th annual seminar for the chapter.</p><p>For the first time, the event was held in the Grand Banking Hall of the Dominion Bank building at One King West in downtown Toronto. Attendees enjoyed a jam-packed day of presentations set against the historic ballroom's dramatic backdrop.</p><p>Themed #SecurityEmerging, the seminar featured topical sessions including hyperloop, ESRM, and cannabis. John Minster, physical security manager, TD Bank, discussed video analytics, demonstrating examples of how to apply basic analytics in a variety of real-world applications, with measurable results to the organization. The day concluded with a panel of experts who discussed the role of the security professional in dealing with workplace sexual assault. </p><p>The 26th Annual Best Practices Seminar will be held on April 11, 2019. Visit asistoronto.org for details.​</p><h4>ESRM: MID-YEAR UPDATE</h4><p>By Tim McCreight, CPP, and Rachelle Loyear.</p><p>The ASIS ESRM Initiative is now at its halfway point for 2018. During the leadership sessions held in Washington, D.C., in January, ASIS made it clear that enterprise security risk management (ESRM) is a priority for the Society today, and into our future. As co-chairs of this important work, we are pleased to share a status report detailing the efforts to infuse ESRM into the Society's programs and services. </p><p>It is with great pride we can say that in the past six months, the ESRM Initiative has accomplished a number of significant achievements. Four value streams were established, each led by a subject matter expert and a representative from the ASIS Board of Directors. </p><p>They focus on Education, Standards and Guidelines, Marketing/Branding, and Maturity Model Tool. We are already seeing the fruits of these groups' labor with the following initiatives well underway:</p><p>•   Education. An ESRM webinar, including definitions and key points, was developed to ensure that all the ESRM presenters at Global Security Exchange (GSX) are "singing from the same songbook." In addition, a draft glossary of terms has been created and an ESRM 101 training will be available by GSX. </p><p>•   Standards and Guidelines. A draft ESRM guideline is on track to be completed by GSX. This document outlines an approach to security program management using risk principles to link an organization's security practice to its mission and goals. The working guideline also describes the concept of ESRM, including its four principal elements, as well as additional steps security professionals can take to strengthen an ESRM effort, bring it to maturity, and maintain it over time. </p><p>•   Maturity Model Tool. Require­ments for the tool have been established and a request for proposal for a supplier has been disseminated. </p><p>•   Marketing and Branding. An ESRM slide deck was distributed to all chapter and council leaders, and several articles have been written detailing the need for security professionals to apply ESRM within their organizations. </p><p>There is a great deal of rigor and project management going on behind the scenes within the ESRM Initiative, and it shows. The value streams are all on track to deliver their key project updates by GSX, and there will be a number of educational sessions at GSX to showcase some of the deliverables, including a pre-conference program workshop.</p><p>Check the GSX program guide to see all the ESRM sessions for 2018, and feel free to contact us at esrm@asisonline.org if you have questions or would like more information on any of the value streams.</p><p>Tim McCreight, CPP, is ESRM Initiative board sponsor, and Rachelle Loyear is ESRM Initiative program manager.​</p><h4>EXECUTIVE PROGRAM</h4><p>Wharton/ASIS Program for Security Executives: Making the Business Case for Security.</p><p>October 21-26.</p><p>Philadelphia, Pennsylvania.</p><p>With so many new threats confronting today's organizations, corporations are challenged by competing security priorities, as well as how to invest their resources wisely. </p><p>How do they best protect their employees and their organizations' networks and data from harm? As a security professional, how do you communicate the security story so leaders fully understand the costs, benefits, and risks of not having a comprehensive strategy?</p><p>Designed for senior security leaders, the Wharton/ASIS Program for Security Executives will enhance participants' business acumen and effectiveness in key areas of strategy, negotiation, critical thinking, and managing change. Attendees will gain the leadership and management skills needed to help them work more effectively and communicate the bottom-line impact of security decisions to the C-suite—so security priorities can be moved forward. </p><p>Through interactive lectures, exercises, and case studies, both in the classroom and in smaller work groups, this custom-designed program will enable participants to create effective security strategies in a fast-changing, global environment. Attendees will come away with a strategic toolbox that will help put these business skills into immediate practice, as well as recognition of their own leadership and communication strengths.</p><p>ASIS members save $1,000 (and CSO Center members qualify for an additional discount) on the regular program fee—which includes all meals and accommodations. Visit asisonline.org/wharton to learn more and apply.​</p><h4>IT SECURITY COUNCIL SPOTLIGHT</h4><p>"Cybersecurity is like painting a bridge," says ASIS Information Technology Security Council Vice Chair Robert Raffaele, CPP. "As soon as you decide on a practice and implement it, it's time to start over again. The technology advances so rapidly that documented best practices can quickly become obsolete."</p><p>The IT Security Council carries the unique burden of sharing its members' world-class information security expertise in forms that won't be outdated by the time they reach their audience.</p><p>Earlier this year, the council published Security on the Internet of Things: An Enterprise Security Risk Management Perspective, a white paper examining risks security professionals need to keep in mind as today's devices become more and more connected.</p><p>Given the nature of IT security, the council emphasizes person-to-person knowledge-sharing—timely advice delivered when it's needed most. This September, the council will sponsor  11 education sessions at GSX. These sessions will cover topics like cyber terrorism, mobile device security, cybersecurity for physical security professionals, emerging technologies, safe cities, and more.</p><p>The council also offers itself as a yearlong resource, connecting security professionals with the appropriate council members and trusted industry experts needed to tackle real-time IT security problems.</p><p>"In security, trust is such a big factor," says 2018 Council Chair Jeff Sieben, CPP. "It's so much easier to rely on a particular process when that process has been vetted by someone you trust. As a council, we're happy to be that bridge between members and the reliable, immediate information they need."</p><p>Sieben says the council's role is to be a consultative body of subject matter experts. </p><p>"This council's greatest asset is members who stay current and are available to talk about current topics," he says. "Our members are plugged into the greater IT security sphere, contributing to ISACA, ISSA, SIA, (ISC)2, and more."</p><p>To consult with the IT Security Council, email council leadership or message a council member on ASIS Connects. The full council roster can be found on the council's community page. Search "Information Technology Security Council."​</p><h4>ASIS LIFE MEMBERS</h4><p>ASIS congratulates Eduardo Martinez Fulgencio, CPP; Leonard A. Rosen; and H. John Bates, CPP; who were granted lifetime ASIS membership.</p><p>Fulgencio served as an ASIS assistant regional vice president for many years. He also held the positions of chapter newsletter chair, chapter chair, treasurer, and chapter program chair for the Philippines Chapter of ASIS. He has been a member of ASIS for more than two decades.</p><p>Rosen and Bates were automatically honored with the lifetime award for their continuous membership of more than 50 years. ASIS is grateful for their loyalty for more than half a century.  ​ </p><h4>MEMBER BOOK REVIEW</h4><p><em>Private Security and the Law, Fifth Edition</em>. By Charles P. Nemeth. CRC Press; crcpress.com; 739 pages; $89.95.</p><p>As the security profession makes strides in education and training, there is a concurrent need for books that light the path. Dr. Charles Nemeth has written such a book: <em>Private Security and the Law. </em>This fifth edition is a big one, both in size and what it has to say. The author has significant experience as both a security practitioner and a scholar. In this book, he nimbly toggles between the two worlds, presenting a viewpoint that is unbiased and comprehensive.  </p><p>Nemeth acknowledges the tension between public policing and private security, while showing how the two can work symbiotically. The first chapter presents the historical underpinnings of the profession, giving a rich history of private security protection. </p><p>The next chapters focus on regulation and licensing; the law of arrest, search, and seizure; civil causes of action; criminal culpability and the private security industry; and evidentiary issues. These chapters help the reader understand how complex areas of the law relate to the security profession.  </p><p>As both an attorney and a professor of security management, I would refer to this book because it presents statutory and common law elements and legal explanations in a straightforward manner, while also presenting case law and helpful study questions. I appreciate the standout inserts that allow readers to update their knowledge, as well as the citations of websites, handy tables, charts, and sample forms sprinkled throughout the book.</p><p>Bringing it all together are Chapter 7, a model for cooperation between public and private law enforcement, and Chapter 8, a compilation of seminal case law. Nemeth has this to say about the roles of public policing and private security: "Factionalism is surely not a fixed state for either side of the policing model. What appears more likely on the horizon is the recognition that these are two armies operating under one flag."</p><p>I highly recommend this book for the classroom, the security practitioner seeking to know more about the law, and the lawyer representing a security provider as a client. This fifth edition is a monumental work, deserving of space in the libraries of students, lawyers, and security professionals.</p><p><em>Reviewer: Lydia R. Wilson, CPP, is an attorney admitted to practice law in Virginia, New York, and Florida. She is a member of the ASIS Information Asset Protection and Pre-Employment Screening Council.</em></p>GP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://adminsm.asisonline.org/Pages/July-2018-Industry-News.aspxJuly 2018 Industry News<h4>​</h4><h4>A NEW BALL GAME</h4><p>When the Great American Ball Park, home of the Cincinnati Reds, needed to upgrade its visual systems, it turned to integrator Nor-Com. The state-of-the-art video distribution system would enable the ball park to distribute HD video to a range of sources throughout the venue. Nor-Com outfitted the ballpark with the intelligent Ultra HD Over IP platform from Just Add Power (J+P).</p><p>The platform has kept pace with changing video distribution requirements, progressing through the extensive upgrades around the stadium. As a result, new video spaces continue to be brought online and updated for a seamless video experience. Most recently, Nor-Com used J+P's 2G and 3G transmitters and receivers within the redesigned Scouts Club, Champions Club, HandleBar, and Reds Connect Zone. The team can distribute transmissions from multiple sources throughout the facility, including HD tuners for the game feed, Blu-ray players, the scoreboard feed, laptop and PC inputs for digital signage, social media feeds, and a press feed. </p><p>In each space, users can control and switch any source via an iPad, with minimal training. The modular approach to video distribution allows the team to build upon its existing infrastructure and keep pace with evolving video content requirements and standards.​</p><h4>PARTNERSHIPS AND DEALS​</h4><p>ASSA ABLOY announced partnerships </p><p>with Averics, BluB0X, Dot Origin, Identiv, and Viscount. Also, AccessNsite, Lenel, Open Options, and RS2 are the first partners to integrate with ASSA ABLOY's PIV-enabled solutions. </p><p>Anchore and stackArmor announced a strategic partnership to deliver enhanced container security and compliance solutions. </p><p>Integrating Arteco Video Event Management Software with Paxton's access control platform gives users insights into potential risks or incidents.  </p><p>Auth0 was selected by National </p><p>Geographic Partners, LLC, to centralize identity for its properties around the world.</p><p>BlackRidge Technology International, Inc., is collaborating with Marist College to develop a blockchain application to eliminate fraud from philanthropic contributions. </p><p>Bold Technologies integrated its ManitouNEO with the CHeKT video monitoring platform to enable alarm-based video.</p><p>The Cambridge Pixel Video Security Display system was selected for a military mobile protection program in the Middle East, partner Defense Integrated Solutions Security Systems.</p><p>Captis Intelligence signed a national dealer agreement with NAVCO. </p><p>FST Biometrics installed its In-Motion Identification solution at the Wellington College Health & Fitness Club in the United Kingdom.</p><p>A surveillance system provided by Hikvision Canada Inc. was installed by Off Grid Surveillance Platforms for Ajax Hyundai in Ontario, Canada.</p><p>Invixium is working with integration partners Galaxy Control Systems, RS2 Technologies, Honeywell, Genetec, Gallagher Security, Paxton Access, Siemens, Remsdaq, and S2 Security.</p><p>Interactive and home automation features from Alarm.com can now be controlled by iotega.</p><p>JCB Co. Ltd. is testing its latest JCB Biometrics Card with fingerprint authentication. The payment solution is provided by IDEMIA, and Toppan Printing is personalizing the cards.</p><p>Kentec Electronics Ltd. supplied its Taktis fire detection and alarm technology to Scotland's Dumfries Baptist Church.</p><p>Manything signed on three new distribution partners: Brooklyn Low Voltage Supply, DSG Distributors, and Tristate Telecom.</p><p>Milestone Systems' open platform IP video management software is helping Carrasco Lakes in Uruguay provide better security control. The networked solution, executed by Foxsys, allows ongoing expansions, including more than 30 new cameras from Hikvision and Arecont Vision.</p><p>MOBOTIX is partnering with ClearSite Communications, Inc., to provide a platform that allows cameras and sensors to be deployed at remote locations. </p><p>The National Fire Protection Association and ASTM International created a joint working group to create "use-case scenarios" for law enforcement and first responders using drones in operations. </p><p>NETSHIELD Corporation is partnering with ZON Digital Insurance to include cyber insurance coverage bundled with its suite of cybersecurity solutions for small and medium enterprises.</p><p>Nozomi Networks Inc. and SecureLink are working together to broaden SecureLink Germany's delivery of services to customers across Germany, Austria, and Switzerland. </p><p>Nuvias signed a pan-European distribution agreement with FireEye.</p><p>Overland-Tandberg announced that ABP Tech now offers its SnapServer Network Attached Storage integrated with ABP Tech's Mx-MSP remote video surveillance monitoring software.</p><p>The Quantum video surveillance storage portfolio is now available through Convergint Technologies.</p><p>Transition Networks partnered with ScanSource, Inc., to expand delivery of its edge connectivity solutions with a focus on physical security networks.</p><p>TrapX Security is collaborating with Check Point Software Technologies Ltd. to provide a real-time visibility, threat detection, and rapid threat containment solution.</p><p>TÜV Rheinland and SecurityMatters announced a strategic partnership to help worldwide industrial services clients detect and remediate cybersecurity threats.</p><p>Virsec entered into an alliance with Raytheon to help defend government and critical infrastructure entities from advanced cyberattacks.​</p><h4>GOVERNMENT CONTRACTS</h4><p>Kent Police and Essex Police will deploy Axon cameras, along with licenses on Evidence.com.</p><p>Dedrone announced a partnership with Defense Innovation Unit Experimental, a U.S. Department of Defense organization, to experiment with technology for assessing, measuring, and responding to adversarial unmanned aircraft systems.</p><p>Ellipse Global will supply mobile base camps to support field operations under a contract with the U.S. General Services Administration. </p><p>ESO announced that its Electronic Health Record and Fire Incidents software platforms were chosen by the Indianapolis Fire Department to collect and analyze data and comply with reporting requirements for the National Emergency Medical Services Information System and the National Fire Incident Reporting System.</p><p>Uruguay's Ministry of the Interior worked with the Uruguayan Football Association and H&O Tecnología to implement Herta facial recognition technology for three major football venues. </p><p>The U.S. Department of Homeland Security Science and Technology Directorate's Silicon Valley Innovation Program awarded a contract to iProov to help U.S. Customs and Border Protection improve the passenger entry operation process.</p><p>MSA Safety Incorporated will provide G1 self-contained breathing apparatus and accessories to the Metropolitan Fire Brigade and Country Fire Authority in Victoria, Australia.</p><p>NC4 announced that the Lansing Police Department chose the NC4 Street Smart solution to support community-based, problem-oriented, and data-driven policing strategy.</p><p>Neurotechnology completed a multibiometric voter registration deduplication project for the Democratic Republic of the Congo, working directly with the Independent National Electoral Commission. It compared 46.5 million multibiometric facial and fingerprint voter records in less than two months and identified more than 5.3 million duplicates.</p><p>The United Kingdom's Serious Fraud Office is using OpenText Axcelerate to expedite its investigations by automating document analysis.</p><p>QinetiQ North America was selected for the engineering and manufacturing development phase of the U.S. Department of Defense Common Robotic System (Individual) program. </p><p>A Sielox layered security solution is securing New Jersey's Upper Township School District.</p><p>Israel Police selected Siklu wireless links to secure the Gay Pride Parade in the City of Jerusalem.</p><p>The U.S. Transportation Security Administration chose Unisys to secure, operate, maintain, and protect screening equipment in U.S. airports.</p><p>VirTra, Inc., received a purchase order for its training simulators under a contract with the U.S. Department of State.</p><p>WidePoint Corporation received an award from U.S. Customs and Border Protection for cellular wireless managed services.</p><p>Spokane Valley City Hall in Washington has integrated video surveillance, access control, and intrusion systems, specified by Coffman Engineers and configured and installed by EVCO Sound & Electronics.​</p><h4>AWARDS AND CERTIFICATIONS</h4><p>Mission 500 presented its Corporate Social Responsibility Award to Altronix Corporation. </p><p>Amika Mobile announced that its Amika Mobility Server platform for critical and emergency communication was selected as the Best Emergency Communication Solution by Security Products and Security Today Magazine for the fourth year in a row.</p><p>Attivo Networks and Exabeam were among the 2018 Best Places to Work listed by the San Francisco Business Times and the Silicon Valley Business Journal. </p><p>Bates Security won a SAMMY award for Integrated Installation of the Year for a school security project. The project involved Sonitrol of Lexington, Bates Security, and 3xLOGIC collaborating on an advanced access control system for Frederick Douglass High School in Lexington, Kentucky.</p><p>Camden Door Controls received UL 294 listing for its new electric strikes.</p><p>The Texas Committee for Employer Support of the Guard and Reserve recognized Delta Risk with the Pro Patria Award in the Small Business category.</p><p>Essence Smart Care was awarded the 2018 SilverEco & Ageing Well International Award for its Care@Home Smart Alerting solutions. </p><p>HGH Infrared Systems won the SECONA Shield 2018 Award in the category Innovative Product of the Year - Hardware CCTV.</p><p>Middle Atlantic Products was recognized with two Stellar Service Awards by the readers of Systems Contractor News for its Middle Atlantic website and design services.</p><p>Milestone Systems announced that Soko Aoki won its Milestone Community Kickstarter Contest 2018 for integrating XProtect VMS with 360-degree enabled cameras and a head-mounted display.</p><p>Pivot3 won multiple technology awards for the latest version of its critical video surveillance software platform. The honors include a 2018 MVP Award from Security Sales & Integration, a 2018 Government Security Award from Security Today, and a 2018 Secure Campus Award from Campus Security and Life Safety. </p><p>Safe-T Group Ltd. announced that its Reverse-Access Technology was granted a patent from the U.S. Patent and Trademark Office.</p><p>Sectra's encrypted smartphone was approved by the European Union for the communication of information at the RESTRICTED security level. </p><p>The Security Industry Association (SIA) announced winners of the SIA New Product Showcase Awards Program. IPConfigure was recognized with the Best New Product award for its Orchid Core VMS for AXIS Camera Application Platform. The Judges' Choice Award was presented to Allegion for its Von Duprin Remote Undogging and Monitoring Kit. The judges presented awards in a total of 29 product and service categories. Find the full list of winners at www.iscwest.com/SIANPS/. </p><p>Security Innovation won eight Info Security Product Guide Global Excellence Awards, including a Grand Trophy prize.</p><p>Securonix announced that its Next Gen SIEM solution was recognized as the top security information and event management solution in the 2018 SC Magazine Trust Award for the Best SIEM Solution.</p><p>Sielox LLC named Milsk Company Inc. as its 2017 manufacturer's representative firm of the year. </p><p>Trillium Secure, Inc., took home the grand prize at CyberTech Asia 2018 for its SecureIoT cybersecurity suite and cybersecurity as a service business model.</p><p>The University of Ryerson granted Privacy By Design Certification to the Vision-Box Identity Management Platform Orchestra. </p><p>VITEC announced that its EZ TV video wall processor won the Best of Show Award at the 2018 NAB Show from Sound & Video Contractor magazine.​</p><h4>ANNOUNCEMENTS</h4><p>Ben-Gurion University of the Negev and University of Washington researchers have developed a new method to detect fake accounts on most types of social networks, including Facebook and Twitter.</p><p>Bold Technologies introduced its new learning and training platform, BoldU.</p><p>Camden Door Controls launched an enhanced switch-selection wizard on its website.</p><p>Clery Center and StopHazing partnered to develop a data-driven Hazing Prevention Framework based on principles of prevention science and findings from the Hazing Prevention Consortium. The partners released the Hazing Prevention Toolkit for Campus Professionals.</p><p>Corporate Investigative Services is celebrating 30 years in business.</p><p>Critical Start completed the acquisition of Advanced Threat Analytics.</p><p>Datavant acquired Universal Patient Key, a provider of HIPAA-compliant de-identification services for healthcare data.</p><p>Memphis-based Electronic Security Specialists purchased required commercial fire alarm accounts from neighboring Frase Protection. </p><p>The Gaming Standards Association launched its new Blockchain Committee.</p><p>The California Hotel and Lodging Association partnered with Guardian Group to provide all hotel members with the Guardian Seal Recognition and Response Training to prevent human trafficking.</p><p>Honeywell opened an industrial cybersecurity center of excellence in Asia, with the support of the Singapore Economic Development Board.</p><p>InfoArmor, Inc., unveiled a new brand identity, with a redesigned website, an updated logo, and an improved user experience.</p><p>KPMG acquired cybersecurity firm Egyde to help clients with cybersecurity risks.</p><p>Mavin Technologies is offering Mavin Prime, a free edition of Mavin's Security Management Platform that supports up to eight readers.</p><p>NuState Energy Holdings, Inc., changed its name to Visium Technologies, Inc., to reflect the company's primary focus on technology and cybersecurity. </p><p>OnSSI released The Hardening Guide for Networked Video Surveillance Systems. The free downloadable guide provides specific recommendations for applying cybersecurity measures to protect systems from potential threats.</p><p>PDFPageLock.com released free security software utility PDF Page Lock, which enables users to lock or hide selected pages of a PDF document with a password encryption.</p><p>PeopleFacts and SNH Capital Partners I, LP, acquired TRAK-1 to create a leading competitor in the U.S. background screening market.</p><p>Polaris Alpha recently opened a new laboratory designed to help federal agencies understand the impact of the Federal Communications Commission's auctioning of communications spectrum.</p><p>Qualys, Inc., acquired the software assets of 1Mobility of Singapore.</p><p>RapidDeploy installed its computer-assisted dispatch platform in the testing laboratory at the Internet2 Technology Evaluation Center at Texas A&M University.</p><p>ShotSpotter published the 2017 National Gunfire Index.</p><p>Spearfish West Africa opened in Abuja, Nigeria, as a subsidiary of Spearfish Security. </p><p>Tourism Malaysia announced the launch of My Tourist Assist, a mobile app to support safe travel for tourists in the country. The app was developed by UST Global and managed by Jana Tiga Holdings Sdn Bhd.</p><p>VirtualArmour International Inc. established the VirtualArmour Academy, a new institution for cybersecurity education and training.</p><p>VOTI Detection opened new global headquarters in Montreal to produce leading-edge x-ray security scanning systems.</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465
https://adminsm.asisonline.org/Pages/Scanning-the-Schoolyard.aspxScanning the Schoolyard<p>​Relationships between students and campus law enforcement have been key to establishing an environment of safety and security at Delaware Valley School District, which encompasses 200 square miles in northeastern Pennsylvania.</p><p>"Kids have come to the police officers…and told them about potential threats that we've been able to curtail before they've happened," says Christopher Lordi, director of administrative services for the district.</p><p>About eight years ago, the rural district decided to employ its own sworn police force and hired five officers, including a chief of police. It has since added a sixth.</p><p>"Having a police force not only gives us a presence of an armed person to counteract any issues that we may have, but it also allows us to create relationships with students," Lordi says.  </p><p>The officers are a presence on the three campuses that make up the district. They may be found teaching and conducting Internet safety classes and anti-drug programs. </p><p>"Not only are they our first line of defense, but they're also relationship builders, and they create positive environments where kids will feel comfortable to come and tell them things," Lordi says.​<img src="/ASIS%20SM%20Callout%20Images/0618%20Case%20Study%20Stats%20Box.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:246px;" /> </p><p>Still, the officers and faculty can't be everywhere at once when incidents do occur, which is why the district installed a camera and video management system (VMS) about 10 years ago. </p><p>"It doesn't matter how many administrators you have, how many teachers you have, how many officers you have," Lordi notes. "They can't be everywhere at once, so the cameras allow us to be in those places when somebody can't." </p><p>As the original cameras and VMS were becoming outdated, Delaware Valley's board was supportive of purchasing a new system. The district worked with integrator Guyette Communications of Plymouth, Pennsylvania, and chose the Vicon Valerus VMS system, as well as approximately 400 cameras, also from Vicon. Installation began in March 2017 and ended just before the new school year began in August. </p><p>The cameras, the majority of which are the 3 megapixel IQeye Alliance dome model, were installed inside and outside of the district's eight buildings. The Vicon Cruiser domes with 30x optical zoom were purchased for the parking lots to better read license plate numbers. Campus police have access to a license plate database, so no license plate recognition software is needed, but Vicon does integrate with such software should customers need that feature. </p><p>In addition to feeding into a central video server at a district-wide monitoring station, each building has its own local recording capability and stores video for a set number of days. </p><p>Delaware Valley is expanding a career and technical education wing, which includes 25,000 square feet of classrooms and workspace. The school plans to install more cameras there.  </p><p>The district police force is responsible for managing the VMS, and each officer has a hardwired PC monitoring station to view video feeds. Campus police also have access to footage via iPhones purchased by the district and use them to see what's going on at their campuses. </p><p>"When we need to view something quickly our officers can go right on their iPhones and view it right from there, which is handy if you don't have the ability to get back to your computer," Lordi says. </p><p>Giving all officers access to the entire district's camera feeds was also crucial. "We did that for backup purposes," he says. "If anything were to happen on one of the campuses, all of the officers—after they secure their buildings—can go on and be the eyes and ears for our officers on those other campuses."</p><p>Soon after the cameras were installed, the new system led to the capture of a thief. In the spring of 2017, when a laptop went missing, the video was reviewed in the general time frame that the incident occurred. It revealed an employee going into an administrative office with a garbage bag, then coming back out. </p><p>"We could zoom in, and you could see that the bag was significantly larger when the employee came out," Lordi notes, adding that the old camera system would not have been clear enough to identify the culprit. The footage was turned over to local police, who apprehended the employee. That person has since resigned. </p><p>The detail captured by the cameras also helped solve an incident in the parking lot. Lordi notes that the main campus is in a high-traffic area, which can attract unwanted activity. </p><p>"We were able to pull the license plate from one person that had an incident on campus...and track the person down," Lordi explains. "It just provides another layer of security, so we know who's on the campus and what time they leave the campus."</p><p>While the district currently hands footage over to law enforcement after the fact, it's working on a memorandum of understanding with local police and hopes to establish a network that allows police to view video from the campuses live. "We're currently working on a strategy to get them involved beforehand," Lordi says. </p><p>With the combination of its police force and the camera system, Delaware Valley has seen a significant reduction in incidents on campus. </p><p>"When our officers first started we had something like 200 to 250 incidents that our administrators were dealing with; I think last year we had 36," he says. </p><p>The Valerus VMS and cameras give campus police and administrators peace of mind about their ability to solve incidents, and ultimately keep students safe. </p><p>"It allows us to feel secure knowing that it's going to be on camera if someone doesn't view or witness it live," Lordi says. "We can always view it on the cameras later."  </p><p><em>For more information: Dee Wellisch, dwellisch@vicon-security.com, www.vicon-security.com, 631.952.2288. ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465