Skip Navigation LinksASIS International / Education & Events / Education Programs / Classroom / Cloud Computing- Security's Transformative Technology

Cloud Computing- Security's Transformative Technology

What are CPE credits?
up to
CPE Credits
24 - 25 October 2013
Hilton Scottsdale Resort & Villas

Get your head in the cloud

Can you name the top ten security applications in the cloud?

The physical security industry is rapidly evolving into an all-IP landscape, complete with managed services. With this shift to connected digital platforms, the ability to leverage cloud computing for security applications affords both practitioners and integrators the opportunity to run aspects of their businesses—from video surveillance, to access control, virtual security guards, and activity tracking— more efficiently and at a lower cost. Yet with at least 50% of practitioners concerned with the cyber security of physical security practices, the industry must set its sights on protecting ALL assets—from tangible ones to personal and business data. This cloud computing marathon will examine the opportunities, benefits, and risks of cloud computing in physical security to provide a toolkit for the coexistence of physical and cyber security's transformative technologies.

Learn the steps to building a winning cloud project team and the standards that should be followed by cloud partners. Benefit from three case studies involving physical and cyber security deployment using both public and private clouds, and discuss ROI of cloud services. By the end of the program, you will be able to identify the top ten security applications in the cloud as well as the top challenges.

Sponsored by the ASIS Physical Security Council and the ASIS Information Technology Security Council

Registration Fees


 Read our Brochure


 Pertinent Information

 Immediate Benefits

  • Physical security program cost reduction
  • Cost effective solutions for remote monitoring
  • Guard force automation and activity tracking
  • Improved cyber security, asset protection, and intellectual property security

 Who Should Attend

  • Physical security professionals in every category
  • IT and cyber security professionals working with or considering deployment in public, private, or community clouds
  • Public safety professionals and first responders
  • Data center designers
  • Physical infrastructure designers
  • Cloud service providers
  • Cloud brokers and resellers

 Hours, Fees, & Hotels

Registration Hours
5:00-6:00 pm

7:00-8:00 am

Program Hours
8:00 am-5:00 pm


Registration Fees

Fees include daily continental breakfast, refreshment breaks, and a networking reception. Hotel costs are not included.
$   895
$   995


Be sure to mention ASIS when requesting the special room rate of $179 single/double (plus tax). It will be honored until the room block is full or September 21. 
Hilton Scottsdale Resort & Villas
6333 N. Scottsdale Road
Scottsdale, AZ 85250
Phone: +1.480.948.7750
Fax: +1.480.948.2232

 Program Overview


Workshop Overview, Introduction, Deliverables Guide
From cloud ROI tools to white papers and standards, we'll deliver a complete menu for your cloud success story. Gain practical understanding of cloud-based applications. Understand where managed services are best used and how to deploy them. Gain actionable insight on technology offerings and learn how these will mold to your program.
Cloud Computing for the Security Professional: Taxonomy, Lexicon, and Ecosystem
Your company is undoubtedly already deploying a private cloud; learn all about how to leverage it for lowering your storage and computing costs. Understand the ROI models for all forms of service-based physical security. Everything from electronic physical access control to communications, virtualization, and service models can move cost centers into profit centers. Enterprise video data virtualization, data analysis, and overall cloud trends will be discussed.
Top Challenges: Cloud Security, Liability, and Service Levels - The Path to a Successful Service Provider
Choose your best, most elastic and compliant service provider. Understand firsthand what criterion is critical in selection—from service delivery to financial stability.
Getting Your Head and Security Program in the Cloud: From SharePoint to Strategy
From security applications to practitioner use, platforms can permit information share and liability. Learn about both.
Navigating the Legal Issues of Cloud Computing
Learn how to use the cloud and stay compliant in your industry!
Video Surveillance as a Service/ROI for the Cloud
The Hosted Video and Managed Video as a Service (MVaaS) models transform video surveillance into a strategic management tool providing practitioners with actionable video data intelligence, video mobility, and advanced forensic review. Learn about all the advances that are helping users across operations, loss prevention, marketing, and human resources. Enterprise video data virtualization and ROI cases in video surveillance as a service will be hot topics.
Emergency Communications, Messaging, and Alerting In the Cloud
Learn how mobility, communications, safety, and first responders are leveraging cloud computing.
Security and Cloud Computing's Top Ten Technologies
Take an entertaining look at cloud computing and security/safety's top ten technologies.

Private and Public Clouds: Case Studies and Best Practices
Where global security operations meet cloud computing: how do you establish a safe and secure cloud computing physical security program?

Big Data, Big Trends, and the Internet of Things (IoT): Global Case Studies

Why does big data get so much attention? How will IoT revolutionize the way you access business intelligence? Review significant trends and get essential answers.

Secure Your Cloud App; Secure Your Devices
The security of security; move from identity management to compliance.
If You Only Knew What Hackers Could Do!
Enjoy an entertaining view into the mindset of today's hacker so you can protect yourself from evolving threats.
Alarm Automation in the Cloud: Reduce Costs and Outsource Safely
Review the path to working with a central station automation provider. Learn unified alarm data processing and how public safety is already working with your provider.
Cloud Computing Case Study: City of Phoenix/Mesa
See how one metropolitan area has benefited from the cloud.


1-10 of 11 results
Mr Shayne P Bates, CPP
  • Mr Shayne P Bates, CPP
  • Principal Consultant
  • Stratum Knowledge LLC
  • Colleagues: 0

Tadas A Eikinas
  • Tadas A Eikinas
  • CTO
  • ELERTS Corp
  • Weymouth MA, UNITED STATES
  • Colleagues: 0

Mr Matt Fleming
  • Mr Matt Fleming
  • CTO
  • I-View Now
  • Henderson NV, UNITED STATES
  • Colleagues: 0

Larry Folsom
  • Larry Folsom
  • I View Now
  • Axis Communications
  • Chelmsford MA, UNITED STATES
  • Colleagues: 0

Mr Brian M. Lohse
  • Mr Brian M. Lohse
  • Dir of Bus Development
  • Secure-i
  • Des Plaines IL, UNITED STATES
  • Colleagues: 0

John M Mallory
  • John M Mallory
  • CTO
  • EMC Isilon
  • Santa Clara CA, UNITED STATES
  • Colleagues: 0

Mr Joseph H McDonald, CPP, PSP
  • Mr Joseph H McDonald, CPP, PSP
  • Chief Security Officer
  • Switch
  • Colleagues: 0

Mr Peter Ocasek
  • Mr Peter Ocasek
  • Founder & CEO
  • Click2Stream
  • Wilmington DE, UNITED STATES
  • Colleagues: 0

Mr Jeffrey A Slotnick, CPP, PSP
  • Mr Jeffrey A Slotnick, CPP, PSP
  • President
  • Setracon Enterprise Security Risk Managment Services
  • Colleagues: 0

Mr Steve Surfaro
  • Mr Steve Surfaro
  • Industry Liaison
  • Axis Communications
  • Colleagues: 0



Team Discount:
Receive a 10% discount when three to five attendees register from the same organization, 15% for six or more. Email for details.

Certification Discount:
ASIS members and nonmembers holding the distinction of CPP, PCI, and PSP receive a $25 discount per classroom program. This discount is automatically applied at checkout.

Rental Car Discount:

Contact Dollar at +1.866.542.2303, extension 2 or; reference code CM0140. FL rentals reference code CMO135.