Recent Blog PostsASIS Foundation Now Accepting Applications for Q2 2018 Scholarships and Grants Building a Trusted Relationship with the FBI ASIS Commends STOP School Violence Legislation Federal Data Protection and Breach Notification Bill? Council Resources: Understanding IoT & Hostile Surveillance
Security Management magazineNational Security Physical Security Cybersecurity Strategic Security Security by Industry This Month's Issue
Securing today’s connected enterprise
As boundaries continue to erode between the physical and cyber worlds, between high and low-tech risks, between the human workforce and artificial intelligence, and as the valuation of digital compared to physical assets undergoes radical shifts, ASIS Europe 2018 tackles the most challenging security issues of our time.
Drones & Security | 25 April 2018, 15:00 – 16:00 ET
To educate and cut through the hype of unmanned aerial vehicles (UAS)/Drones in the security industry, a panel of specialists will review multiple “use cases” for drone use and defense by a security enterprise. Consider the perspectives of an Federal Aviation Authority (FAA) licensed drone operator, a drone industry subject matter expert, and a physical security design engineer as they share their perspectives and experience. Follow their views of the practical implementation and impact of drones within a business environment. Explore a range of UAS and drone security applications, from basic through advanced, and even future applications.
On-Demand WebinarsActive Shooter CPTED Cybersecurity All on-demand webinars
Upcoming WebinarsThe Unaddressed Mass Casualty Event Drones & Security All upcoming webinars
Certification ReviewsCPP Online Review PSP Online Review
STAM Interactive CoursesAccess Control Biometric Technology All STAM Interactive Courses
As a triple-certified security professional, Kevin Stranahan, CPP, PCI, PSP considers himself a diversified asset for his organization. “From a security management standpoint, I have a better grasp on how something happening in one department can impact things in another,” he says.
"The knowledge I’ve gained informs my approaches in how I manage people and processes within my role. I’m better able to explain security issues to people who don’t share my security mindset."
Considering starting your own consultancy? Learn how to develop and deliver security consultant services and how to market yourself for success. This popular one-day course is sponsored by the International Association for Security Consultants (IAPSC).
- Learn the key steps for establishing your security consultant practice
- Identify and learn how to avoid the costly mistakes that can sabotage your business
- Gain practical information that will give you an advantage when competing for consulting assignments
April | San Diego, CA
Successful Security Consulting (29 April)
May | Providence, RI
Violence Assessment and Intervention (7-8 May)
Active Shooter (9-10 May)
July | Chicago, IL
Executive Protection (9-10 July)
Facility Security Design (9-11 July)
The ASIS Foundation supports our members through education, research, and providing scholarship and award opportunities to deserving professionals. Learn more about current initiatives and how you can contribute.
ISO Risk Management Document for Review:
ISO/CD 31022: Risk Management – Guidelines for the Management of Legal Risk: This document provides additional guidelines on managing legal risk faced by organizations as a companion standard to ISO 31000. The application of these guidelines can be customized to any organization and its context. Legal risk is partially identical with compliance risk. This document provides a common approach to managing legal risk and is not industry or sector specific. It can be used throughout the life of the organization and can be applied to any activity in the context of legal risk, including decision making at all levels.
If you are interested in providing feedback, please contact firstname.lastname@example.org at your earliest convenience. Comments are due by Friday, 4 May 2018.
The free member download is for personal use only; not for resale. No part of the publication may be copied, reproduced, duplicated or distributed, in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written consent of the copyright owner.
Through observation and action, unarmed guards can help prevent and mitigate deadly attacks.
Also articles on insider threats, maritime security, risk management, and more.