Tuesday — July 20, 2021

Font, Rectangle

Tuesday, July 20th
SIA Education@ISC West 2021 Sessions

News from the Show

Material property, Font

Tuesday, July 20, 2021

Session Time: 10:00 AM - 10:45 AM

Track: Risk Management & Public Safety

Beware of Sharks: Addressing Legal Issues in Technology Enabled Safety and Security Systems

Speaker: Donald R. Zoufal, J..D., C.C.P. - CrowZ Nest Consulting, Inc. / University of Chicago

The use of digital technology, increasingly powered by analytic tools like artificial intelligence, is a continuing trend in the safety and security industry. However, the applicability of technology to address safety and security problems creates a friction with a growing body of law designed to address personal privacy. The recent experience of technology adoption to address the COVID-19 pandemic offers a dramatic example. Almost as quickly as technology was adapted and introduced to address safety concerns there was the development of law to guard personal privacy. Understanding the legal principles that guide the development of privacy protections is critical to system design and operation. This includes all elements of technologies solutions that form the sensors and information systems that collect data to the artificial intelligence that analyzes it. Failure to properly account for privacy concerns can result in waste though the purchase of technology and systems that either cannot be utilized or create liability concerns. This discussion will be focus on introducing the participants to available tools that assist technology developers, system designers, and end users, in making choices that mitigate privacy concerns and mitigate riskshelping to avoid the sharks that prey on the unwary.

Tuesday, July 20, 2021

Session Time: 10:00 AM - 10:45 AM

Track: Drones & Robotics

Current Capabilities for Drone Use and Drone Defense

Panelist: Jason Cansler - UASidekick LLC

Panelist: Nathan Ruff, MSFS, PIC, RPIC - UASidekick LLC

Panelist: Mark J. Schreiber, CPP, CPD - Safeguards Consulting, Inc.

To educate and cut through the hype of drones (UAS) in the security industry, a panel of specialists will review the current capabilities of drones and counter-drone systems, identify their legal and regulatory operating environments, and discuss practical actions that all organizations can implement to address this disruptive technology. The panel includes a drone operator, a drone industry representative, and a physical security design engineer to give a variety of perspectives. The panelists will review the practical applications, implementation strategy, and impact of drones within a business environment so attendees can leave with actionable information.

Tuesday, July 20, 2021

Session Time: 10:00 AM - 10:45 AM

Track: Access Control & Identity Management

Software is Eating the PSIM World:
Staying Ahead of the Technology Curve

Speaker: Lee M. Odess - Group 337

Co-Presenter: Curtis Hrncirik - Soloinsight Inc.

Software solutions like tenant experience, visitor management, and workplace management are making everyone look and act like a qualified PSIM provider. This session explores the current threats and opportunities arising as a direct byproduct of the technology evolution and software development in the access control space. Speakers will define PSIM and discuss the role actual PSIM experts should be playing in the planning, integration and deployment of next generation access control systems and devices.

Tuesday, July 20, 2021

Session Time: 10:00 AM - 10:45 AM

Track: Cybersecurity & IT

The Cloud and You: Moving to and Operating Applications in the Cloud

Speaker: Christopher Peckham, PhD, PE, CISSP - Ollivier Corporation

The cloud has revolutionized the scale and security of physical security operations, reducing maintenance and provisioning time and redirecting those efforts to the actual practice of security; however, even with the major cloud service providers ramping up security and implementing world class cybersecurity procedures, these back-end practices do not always translate to security on endpoint applications, as standards and APIs must be configured securely by customers. This session will take attendees through the recommended on-premises procedures of deploying a security application securely on the major cloud services.

Tuesday, July 20, 2021

Session Time: 10:00 AM - 10:45 AM

Track: Video Surveillance

Thermal Cameras as a Trending Technology for Perimeter Protection, and Condition Monitoring

Speaker: Daniel Gundlach - FLIR Systems, Inc.

Thermal cameras have become one of the highest demand technologies in the security industry. Innovations in thermal solutions have led to greater accessibility and rapid adoption across a broader set of applications. Customers looking to safeguard their property from external threats are installing thermal cameras. With their high-contrast images, thermal cameras enable superior image capture in adverse lighting conditions, higher-performing analytics, video verification for alarm events, and early warnings of approaching suspects before they reach the perimeter. Enterprises wanting to enhance asset resiliency and minimize the threat of asset failure are deploying radiometric thermal cameras to monitor mission-critical equipment and ensure any faulty components are identified prior to burnout. This session will explore the intrinsic value of thermal cameras as a trending technology that is seeing increased integration into total solutions. We’ll also discuss thermal camera deployment best practices at the perimeter for intrusion detection, and inside facilities for condition monitoring.

Tuesday, July 20, 2021

Session Time: 11:15 AM - 12:00 PM

Track: Video Surveillance

Anticipate the Future of Video Security

Speaker: Sean Murphy - Bosch Security and Safety Systems

As the world becomes increasingly connected, the Internet of Things (IoT) presents individuals and businesses with new opportunities. To take full advantage, the security industry needs to think differently about how it develops solutions. Adopting an open platform principle is essential for this transformation. In the realm of IP cameras, a single operating system across manufacturers based on an open platform allows application developers to create apps for cameras based on a common language. System integrators can use these apps to customize security solutions for their customers. Through apps, a video security camera can be used as an access controller that operates based on video data. It can become a fire detector that can detect fires early based on video data. It can be optimized to act as a sensor to provide smart data for multiple types of applications, and much more. Attend this session to learn how an open platform concept will enable the industry to imagine, create, and deploy solutions with endless possibilities beyond safety and security.

Tuesday, July 20, 2021

Session Time: 11:15 AM - 12:00 PM

Track: Risk Management & Public Safety

Connecting the Dots: Strategies and Successes to Help Your Organization See 20/20

Speaker: Rick Shaw - Awareity

Thousands of incidents (shootings, workplace violence, other attacks) are taking place across military bases, universities, schools, organizations, government agencies, and communities every year. In response, organizations continue to invest their money, time, and efforts into more deterrents, like locks, metal detectors, cameras, etc. but what happens when attackers are undeterred like we’re seeing today? A different approach is needed to effectively connect the dots in order to prevent these undeterred individuals from executing their plans. This different approach involves identifying the common gaps, silos, and disconnects that allow red flags and warning signs to not make it to the right people until it was too late. This session will reveal not only what these common gaps, silos, and disconnects are but also share extensive research into incidents dating back to Columbine on why prevention failures continue to occur again and again even though more than enough red flags and warning signs existed and more than enough resources were available. The pains and costs of failed preventions are soaring and seemingly the number of “undeterred” at-risk individuals are increasing as well. There is no better time than now to get clear 20/20 vision to start preventing more escalations and more incidents.

Tuesday, July 20, 2021

Session Time: 11:15 AM - 12:00 PM

Track: Drones & Robotics

Counter Unmanned Aircraft Systems (UAS) Operations and Protecting Against the Threat of Small Unmanned Aircraft Systems (sUAS)

Speaker: Daryle Hernandez - Department of Homeland Security

Speaker: Sarah Jacob - Cybersecurity and Infrastructure Security/DHS

Small Unmanned Aircraft Systems (sUAS) are a rapidly evolving technological advancement with many useful and legitimate applications. Although the benefits of UAS have driven its popularity across key stakeholder groups, the nefarious or careless use of UAS poses a significant threat to public safety and national security. Various government and academic entities have classified the UAS threat as “emerging,” but this assertion no longer holds true. The threat is present, potent, and complex. Illegitimate uses of sUAS include hostile surveillance, smuggling, disruption, and weaponization. These actions can be conducted by both nefarious and non-nefarious actors. Increased domestic tensions, targeted violence, and disinformation have made public buildings, critical infrastructure, and mass gatherings vulnerable to sUAS threats. Understanding the current sUAS threat environment, security options for protecting against sUAS threats, and relevant legal landscape is critical for risk management and preparedness efforts. Members from the Cybersecurity and Infrastructure Security Agency’s small UAS Security Program Office and the Interagency Security Committee will provide a holistic view of the challenges sUAS pose and the real-world solutions this threat requires. Their knowledge and lessons learned may be applied to critical infrastructure facilities and buildings accessible to the public including U.S. federal facilities, state, municipal and private sector buildings.

Tuesday, July 20, 2021

Session Time: 11:15 AM - 12:00 PM

Track: Access Control & Identity Management

How new Cardless Physical Access Control Technology can cut Access Control Costs By two Thirds

Speaker: Kellen Duke, Proxy

Physical access control is crucial for building security, yet most buildings utilize older proximity card technology that is not only expensive to operate and maintain, but also easy for bad actors to clone. Other companies have opted for proprietary encrypted credentials, which are too costly for most. New cardless options that are primarily software based are helping landlords and tenants improve their security profile while reducing costs by one-half to two-thirds. These new systems rely on smartphone-based identity signals that are owned by the user, who can then give permission for employers and others to read their signal for physical access. Cloudflare recently implemented such a system across nine of its own offices and can provide an inside view.

Tuesday, July 20, 2021

Session Time: 11:15 AM - 12:00 PM

Track: Cybersecurity & IT

Zero Trust Networking – How to Isolate and Contain IoT Security Threats

Moderator: Wayne Dorris, CISSP - Axis Communications, Inc

Panelist: Adi Karisik - Jacobs

Panelist: Pierre M. Bourgeix, BA, BS, MA, MBA,CPP - ESI Convergent, LLC

Panelist: Marianne Meins, PhD Candidate, Critical Infrastructure, MS in Computer Science, CISSP - Onclave Networks, Inc.

Data breaches and threats will always be a part of IoT. As cyber criminals continue to get more sophisticated, so should our cybersecurity tactics. This means evolving to a proactive vs reactive approach to security and that starts with Zero Trust Networking. Zero Trust Networking is a concept that would stop bad actors from moving from device to device once the network infrastructure is infiltrated. Instead, each IT network is separated and requires its own level of verification to be granted access. What this means is that data breaches that happen when a network video device is used as an entry point for a hacker to gain access to the rest of the organization’s network, and therefore their data, would be stopped. In this session, attendees will get a better understanding of Zero Trust Networking and why it should be a part of all security plans. Moderated by Wayne Dorris, business development manager for cybersecurity at Axis Communications, this session will feature a first-hand account of implementing a Zero Trust Network from Marianne Meins, president of Onclave. The panel will also include Adi Karisik, operational technology executive for Jacobs, who will explain the process for designing the Zero Trust architecture and Pierre Bourgeix, CTO and founder of ESI Convergent, who will discuss how this concept can be applied to the security industry as a whole.

Tuesday, July 20, 2021

Session Time: 1:15 PM - 2:00 PM

Track: Video Surveillance

Behavioral Recognition for Realtime Video Intelligence

Speaker: Menashe Rothschild - viisights

In today’s global urban and business environments, businesses and authorities use diverse technologies to keep cities and business areas safe from multiple risks and threats. In order to cope with safety hazards and security threats, governments, municipalities, enterprises and individuals utilize vast amounts of video capturing devices. Their challenge is to highlight crucial events and actions within vast amount of video content, while deploying quick and effective analysis. Legacy video analytics technologies which are based on object detection, whether using old pixel recognition or newer image recognition technologies, are very limited in the value they can provide which is mostly about the appearance and the movement of the object. In this session we will present the most advanced video analytics technology which is capable of understanding and recognizing in a live video stream an object’s behavior, objects interactions and basically describe the story in the video. We will explain the technology challenges, differentiation and what kind of products can be built on top.

Tuesday, July 20, 2021

Session Time: 1:15 PM - 2:00 PM

Track: Cybersecurity & IT

Cloud Security Made Powerful, Simple and Secure - the True Advantages of a Natively-Developed Cloud Solution

Panelist: Aditya Krishnan - AWS

Panelist: Charlie Erickson - Stanley Security , Stanley Security Integration and Products

Moderator: Steve Lasky - Endeavor Security Media

Customer expectations in commercial security have changed. The simplicity, convenience, and flexibility they are accustomed to from modern consumer devices and smart home technology have transformed their demands for professional video surveillance systems. Now, more than ever, businesses are looking for ways to lower costs, increase productivity, and better serve their customers. New, natively developed for-the-cloud video solutions are uniquely equipped to address these new expectations, growing business challenges, and ever-changing network and data security issues. With easier set up and lower TCO than conventional NVR/DVR systems, more intuitive workflow tools accessible from anywhere/any device, and the ability to scale and operate securely by leveraging the very best cloud technology and infrastructure, customers can spend more time managing their businesses and less time worrying about their surveillance systems. And now Video Solution providers can focus on fully differentiating their offering and truly leveraging the power of the cloud. The value proposition for best in cloud-based video recording and management is comprised of three components: the latest in camera technology, a completely redesigned user experience, and the power of a world-class cloud infrastructure. This presentation will highlight how each component directly addresses the problems and needs of today’s business owner.


Tuesday, July 20, 2021

Session Time: 1:15 PM - 2:00 PM

Track: Unmanned Systems, Drones and Robotics

Drones at Your Facility: The Legal, Law Enforcement, and Security Personal Best Practices

Panelist: Robert T. Tabbara - 911 Security

Moderator: Nathan Ruff, MSFS, PIC, RPIC - UASidekick LLC

Panelist: Vince D’Angelo - Las Vegas

Panelist: Akmal Ali, J.D. - Aluma

They say, it takes a lot of info to assess threats and implement proper responses. Our panel addresses how these phases deliver quick response to undesirable drones. The most challenging part of all this might could be all the regulations and laws. The FFA and FCC issue the Federal Laws that all the states must follow…. but the states can (and do) add more. Do you have a clue where to get a permit for a no-fly-zone over a large, outside event? We will make it easy for you! Attendees leave our discussions inspired and confidently imagining how they can mitigate current and future problems with risky drones.

Tuesday, July 20, 2021

Session Time: 1:15 PM - 2:00 PM

Track: Risk Management & Public Safety

Mass Notification Systems (MNS): What You Need to Know

Panelist: Jonathan S. Leonard - Mercury Notifications

Panelist: Staci Savaglio - Mercury Notifications

This presentation is intended to provide attendees with a clear understanding of the importance of mass notification and emergency communication systems as a way of delivering critical information in a time of crisis. Detailed instructions can save lives and providing this information in a variety of forms and across a variety of platforms is key. This presentation will also provide attendees with a clear understanding of what a mass notification system (MNS) is, how it works, what is important when designing a system, the critical nature of meeting NFPA72 code and UL2572 standard and the importance of integration in creating a streamlined and elegant system.

Tuesday, July 20, 2021

Session Time: 1:15 PM - 2:00 PM

Track: Access Control & Identity Management

Using Technology, People and Process to Close the Biggest Gap in Physical Security: Unauthorized Entry

Moderator: J C Powell - Boon Edam Inc.

Panelist: Nick Miller, LEED BD+C AP - Guidepost Solutions, LLC

Panelist: Jay Oros, CPP - Southwest Airlines

When an unauthorized person enters a facility an organization's risk and liability skyrocket. Can a sophisticated biometric device ensure that doesn’t happen? Not alone. This session is about removing the assumptions that get in the way of securing a facility reliably. We’ll discuss with our panelists what it takes to truly control “who is in the building” by exploring how to plan people, process and technology at the entry. The key is to understand the vulnerabilities of the technology and plan from there. We’ll also share the impacts that COVID-19 has had on physical security planning around the entry at facilities.

Tuesday, July 20, 2021

Session Time: 2:30 PM - 3:15 PM

Track: Video Surveillance

Artificial Intelligence (AI)-Powered Security Monitoring – Reality or Hype?

Speaker: Uday Kiran Chaka, B.Tech, MBA - Sentry AI

AI, short for Artificial Intelligence, is a buzzword these days. Artificial Intelligence (AI) is mysterious, scary and a panacea, all at the same time. Are machines replacing humans in the near future? What does AI mean for security monitoring? How are enterprises and monitoring centers navigating the AI hype and squeezing out practical solutions to make their operations more efficient and cost-effective? Join our session to clear up the most common misconceptions about AI and get ready to transform security monitoring in the AI era. Learn more about the latest AI technology applications in security monitoring, such as recognizing people, vehicles, weapons, loitering, and such suspicious behaviors accurately. We will walk you through the step-by-step guidelines to implement AI technologies for your current video monitoring systems.

Tuesday, July 20, 2021

Session Time: 2:30 PM - 3:15 PM

Track: Cybersecurity & IT

Converged Edge Technology and The Future of the Correlated Incident/Event Tracking Model

Moderator: Pierre M. Bourgeix- ESI Convergent, LLC

Panelist: Gary Nestler - Priority5

Panelist: Jim E. Henry - Securitas Electronic Security, Inc.

Panelist: Bhavesh Patel - Sanofi

Over ten years our world has seen the evolution of technology and the absolute need for open architecture that has enabled the security industry to see greater unification across Information Technology, Operational Technology and Physical Security (IT, OT, PS). This session will incorporate aspects of open architecture and technology that has exponentially improved operational and deployment efficiencies within secured identity, secured communication, secured cloud, and secured entry which correlate to all three domains of people, process, and technology. Our session will also focus on the reduction and elimination of middleware when applying edge and cloud-based technologies and the beneficial and urgent use for work from home and remote operations because of the COVID-19 pandemic. We will review how technology is being used to track threats and vulnerabilities as well as mitigate these threats with the use of greater machine learning and deep learning AI solutions and tools. We will also review how to bring stakeholders to the table by explaining the value and cost savings of edge technology and the correlated incident/ event tracking model.

Tuesday, July 20, 2021

Session Time: 2:30 PM - 3:15 PM

Track: Drones & Robotics

Networking Expanded: The Key to Comprehensive Situational Awareness for Man & Machine

Moderator: Alice DiSanto - Rajant Corp

Panelist: James Laney - Ghost Robotics

Panelist: Craig Tedrow - Rajant Corporation

Panelist: John Lettow - Vorbeck

Nothing is more profound than to envision man and machine seamlessly communicating together on behalf of public safety and security. Teams of autonomous robotic platforms - air, land, and sea - working collaboratively in vast swarms and having uninterrupted connection to frontline responders using wearable communication devices provide comprehensive situational awareness and “force” multiplicity. Continuous, uninterrupted communication to, from, and between all of these mobile contributors offers critical insights to isolate an urban or industrial security objective. Whether that objective is responding to a disaster, fortifying a perimeter against intrusion, or providing added layers of security for a special event, the wireless network connecting all of these systems is key to their fail-safe, continuous connectivity to deliver audio, video, sensing and position information. Moreover, it is the “between” communication capability that stands as the most significant differentiator. Success and failure are network dependent, so knowing how to select the network to future-proof your growing mobility and autonomy needs is mission-critical.

Tuesday, July 20, 2021

Session Time: 2:30 PM - 3:15 PM

Track: Access Control & Identity Management

Next Generation of Access Control: How AI, Biometrics, and Rich User Experiences at the Edge Will Drive Tech Evolution and Adoption

Speaker: Lee M. Odess - Group 337

Panelist: Colin DePree - Salto Systems

Panelist: Sarah Muzquiz - Alcatraz Ai

In this session, attendees will discover the macro trends shaping the future of access control. You’ll leave with a better understanding of the details behind those macro trends and an ability to pinpoint the important attributes and horizontal drivers behind the trends, such as privacy, data and connectivity, and see through the jargon. Participants will walk away with three actionable next steps for helping to shape the future of access control.

Tuesday, July 20, 2021

Session Time: 2:30 PM - 3:15 PM

Track: Risk Management & Public Safety

Smart Cities, Safe Cities

Speaker: Rick Taylor - Genetec

People are flocking to the city. Urban planners, municipal governments, and businesses welcoming this influx must make important decisions about safety and security as such a population boom places growing pressures on infrastructure and the environment, increasing demand for smarter solutions. Safe cities attract businesses, foster innovation, and provide countless opportunities. By working collaboratively, both public and private sectors can contribute to a foundation for the success of these great cities and their citizens. But how do we construct and manage cities so that everything, and everyone, flows smoothly today and in the future? In short, how can we ensure that our cities will continue to succeed as they grow? After all, a city that works is a city you want to be in. A key indicator of success is a city’s resilience. We know that the ability to get back to normal as quickly as possible following an incident, unplanned event or emergency is essential as it makes citizens feel safe and allows businesses to continue to thrive. And, since cities are seen as hubs of commerce and leisure, heightened levels of crime—or even the fear of crime—can call the very nature of urban life into question. The challenge then is how do we put systems and processes in place that will keep our cities safe while allowing them to adapt and grow as populations increase and technology advances? How do we ensure that our cities continue to be resilient even as their make-up changes?

Tuesday, July 20, 2021

Session Time: 3:45 PM - 4:30 PM

Track: Risk Management & Public Safety

Activism in the Modern Era: Trends, Tactics & Troubles

Speaker: Harris Stephenson, MSS - Welund

Speaker: Kristen Worosz - Welund

Quickly emerging as one of the preeminent physical security and reputational risks for corporations in the modern era, activism - in various forms on both the left and right - is often misunderstood and improperly addressed. This session will provide attendees with an understanding of the issues, tactics, structures and goals of activism campaigns and how to prepare for them, as well as understand and address them to limit impacts to projects, personnel and reputation.

Tuesday, July 20, 2021

Session Time: 3:45 PM - 4:30 PM

Track: Drones & Robotics

Case Studies from the Future: How AI, Drones and Robotics Drive Program Success at Leading Companies

The FedEx facility in Memphis is a hub of national and international shipping, making round-the-clock security essential. To enhance situational awareness and bolster its manned guard force, the company integrated security robots. This session will examine the benefits of automated security, along with the challenges – both technological and cultural – that must be overcome along the way.

Learning Objectives include: 1. Learn what robots can contribute to security programs. 2. Understand the importance of employee buy-in and how to achieve it. 3. Identify key logistical questions that must be addressed in order to ensure a successful deployment.

Tuesday, July 20, 2021

Session Time: 3:45 PM - 4:30 PM

Track: Cybersecurity & IT

Navigating the 3G/CDMA Sunset: How to Retain Customers and Generate new Business

The LTE CAT M1 (abbreviated LTE-M) network offers a lot of promise – it connects a variety of devices, combined with better coverage, low power consumption, low latency, and better penetration of radio waves. However, switching to LTE-M could be a daunting task for installers as it will involve the replacement of millions of cellular IoT devices in a short timeframe. As a result, most installers will likely face (and are already facing) at least several challenges: the upfront costs of purchasing LTE-M hardware for many of their accounts, the need to convince reluctant customers to upgrade for a second time in less than 4 years, the respective overhead from the customer visits; all of this could lead to an unwanted spike in customer churn. At the same time, switching to just LTE technology might result in nothing more than a quick fix. The hype of 5G is very real and operators will soon be moving towards the next – 4G/LTE - sunset. Therefore, choosing the right solution now could prevent installers from going through the same process within the next five years.


July 19-21, 2021 • www.iscwest.com