Skip to content
Menu
menu

Strategies for Security—Multiplied.

Global Security Exchange (GSX)—formerly the Annual Seminar & Exhibits—delivers new opportunities to exchange key ideas and best practices, expand global connections and experience innovations. You'll find 500+ exhibitors, 300+ sessions and countless networking opportunities. Plus, you can save $100 on your All-Access pass when you register by 10 August.

If it's essential to global security, it's at GSXRegister now!

ONLINE LEARNING

FEATURED WEBINAR: 
Protecting Soft Targets from Active Shooters | 22 August 2018, 15:00 – 16:00 ET

Soft targets pose many challenges to the security professional. Understanding there isn’t one answer, but a series of answers to the problem, is a critical first step. This webinar will take a fresh approach to the topic of soft target hardening based on the current environment and explore emergent threats and hardening tactics.

Get Certified!

Certified Protection Professional (CPPⓇ)

Board certification in security management. Demonstrates your knowledge and competency in seven key domains of security. Globally recognized as the standard of excellence for security management professionals.

Physical Security Professional (PSPⓇ)

Board certification in physical security. Demonstrates your knowledge in physical security assessments, application, design, and integration of physical security systems, and implementation of security measures.

Certificant Spotlight

Pablo Colombres, CPP

Pablo Colombres, CPP, gradually pivoted into the security world. In 2003, he started his career in the legal department for telecommunications giant Telefónica. When the fraud team he supported was transferred into a new security division in 2007, he followed—and assumed an investigative role himself. While the transition was daunting at times, he did not back down.

“Pursuing my CPP certification was a rewarding challenge, helping me to view the whole picture through the lens of standardized knowledge, and to start talking the same language as the security world.”

Classroom programs

Featured program

Strategy and Tactics in Crisis Management | 10-11 December 2018

You don’t know when a crisis will happen, but you need to be prepared.

This newly revised crisis management workshop will take you from prevention to recovery. Learning sessions and briefing content are built around a tabletop exercise which unfolds in phases starting on the morning of day one and concluding at the end of day 2. 

The exercise scenario increments present you with a national crisis and walk through phases of the crisis in the first person—prevention, response, mitigation, and recovery. 

Learning sessions will be led by industry experts who will share their experience with key strategic and tactical concepts in crisis management. You will be able practice new concepts while also having the opportunity to bring your own practical experience and expertise forward.

ASIS Foundation

The ASIS Foundation supports our members through education, research, and providing scholarship and award opportunities to deserving professionals. Learn more about current initiatives and how you can contribute. 

pan_tool

ASIS Members are entitled to one (1) free download of each standard and guideline—a $2,400 member benefit.

The free member download is for personal use only; not for resale. No part of the publication may be copied, reproduced, duplicated or distributed, in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written consent of the copyright owner.

In This Issue

Striving for Higher Standards

The cannabis industry is full of contradictions. Although more than half of the United States has legalized—and therefore legitimized—some form of cannabis commerce and usage, it remains illegal under federal law. The drug's stringent controlled substance label prevents it from being researched, and banks take a risk if they accept money from cannabis companies. The industry's strict state-by-state regulations mix policy, political influence, and borrowed best practices to create detailed rules that vary vastly by location and can be difficult to interpret and implement, and a lack of overarching guidance can leave organizations vulnerable. 

arrow_upward