What We Need is a Plan: School Security Gets Smarter
Examine the progress school security is making. Learn the top five steps in developing a sound, scalable security master plan beginning with threat assessment. Then link the plan to the most useful systems available, with video surveillance a primary focus. Learn how to deploy, manage, and use the safety and security technology available. Make technology work for you, not the other way around.
First Responder Use Cases in Video
A new Homeland Security website—firstresponder.gov—names six first responder disciplines: EMS, law enforcement, fire, explosives, HAZMAT, and search and rescue. Within these disciples are numerous use cases supported by designs, products and services delivered by security, and safety systems integrators. Law enforcement’s use of video surveillance is extensive and can be categorized into three functions: observation, forensic review, and recognition. They are comprehensively covered as well as new standards.
After Hours Surveillance at Critical Infrastructure (and other) Facilities
Learn comprehensive video surveillance tools for perimeter protection, wide area, and low light imaging. Combined with intrusion detection, these are your first line integration efforts.
Innovation or Confusion: The 15 Most Impactful Technologies in Video Surveillance in 2013
Learn how video surveillance technologies impact safety, security, loss prevention, operations management, and business intelligence. Review how a security program manager successfully adopts a process to include, ignore, or postpone the deployment of new technologies for their electronic security systems. Learn the top 15 technologies, tech trends, and solutions in video surveillance. Explore whether technology truly innovates or potentially adds “confusion” to your program. Learn how to decide what technology complements your program or crisis plan and which solutions fit best and can help you move forward. See how to lead an often difficult discussion to recover from a poor deployment.
ASIS Plugfest Incorporating Cabling Skills Challenge
After a brief design and product selection stage, the action begins. Three intensive, timed, 30-minute challenge stages follow with breaks in between for the exercise reset. The group with the fastest time and a working and compliant result is the stage winner. The second stage includes cable assembly, network switch, and power over Ethernet connection. The third includes camera set up, connection, power, and test. The final stage provisions the camera on the video management system. All participants receive a special ASIS Plugfest Guide to use for labor estimates on various video surveillance systems.
The Great Debate: Protecting Privacy and People in Surveillance Societies
Come for the debate and stay for the education! In this first-ever three-way, moderated debate, complete with timed responses, rebuttals and audience participation, issues concerning the high interest subject of video surveillance in public places, workspaces, and government facilities are actively discussed.
There are three debate participants: a legal counsel representative skilled at physical security will argue the pro-surveillance position and provide accurate fourth amendment and legal precedent interpretation. The pro-privacy rights position is argued by a representative familiar with the A-to-Z’s of privacy often presented by the Electronic Privacy Information Center (EPIC). Our third participant is familiar with the technical aspects of video surveillance, data security, and compliance and policy enforcement.
Business Intelligence and the Revolution in Video Analytics
All current and trending video content analysis (VCA) technologies are presented with use cases and demonstrations. The focus is on the most mature of these technologies including perimeter “trip-wire” detection, people counting, queue management, boundary activation, activity mapping, automatic license plate and number plate capture and recognition. In addition, the rapidly trending “proactive” abnormal detection algorithms and video synopsis and video summarization are part of the experience. Impactful, improving technologies like facial recognition and audio detection complete the comprehensive “round-up.”
Video Management Systems – Selection and Actual Use by Practitioner
After a brief solution overview, the focus rapidly moves into actual uses by security practitioners and facility managers. Exercises comprehensively cover: forensic video investigation, and video verification for alarm events, access control/video audit trail report generation.
Crime Prevention Through Environmental Design (CPTED), Lighting, and Video: The Total Facility Experience
Learn how to unify video surveillance, CPTED, and the latest in lighting technologies.
The Command Center Experience: From Design to PSIM
A favorite of the video workshop, Command Center Design, has been divided into three entertaining parts, each with engaging multimedia content.
1. Design Your Best Command Center
This session exposes the audience to a wide array of designs--from the integration of elements of a global security operations center to incident and crime management.
2. Physical Security Information Management (PSIM): Your Video, Your Command
Learn how a PSIM works with video data and other physical security applications and find out what user problems it solves.
3. Automation, Your Central Station of the Future
Learn what happens when alarm, video, safety, and environmental systems meet in the cloud. Today’s service providers can unify your existing systems in an off-premises process, allowing you to focus on your core business.