Skip to content
Menu
menu

Communities

Interested in broadening your knowledge of a particular area of security? ASIS Subject Area Communities allow members to connect on their specific security topic of interest. Join to ask questions, share resources, and build professional relationships all while ensuring you’re informed on latest issues and trends surrounding your fields of interest.

Explore the ASIS Communities today and connect with your communities of interest! Open communities for each subject area will be launching by July 2020 on ASIS Connects. Stay tuned for your chance to join the conversation and learn from all of your fellow ASIS members!

Banking and Financial Services Investigations
Commercial Real Estate Law Enforcement Liaison
Crime Prevention Military Liaison
Crisis Management and Business Continuity Petrochemical, Chemical, and Extractive Industry Security
Cultural Properties Pharmaceutical Security
Defense and Intelligence Physical Security
Enterprise Security Risk Management (ESRM) Professional Development
Executive Protection Retail Asset Protection
Fire and Life Safety School Safety and Security
Food Defense and Agriculture Security Security Applied Sciences Ad Hoc
Gaming and Wagering Protection Security Architecture and Engineering
Global Terrorism, Political Instability, and International Crime Security Services
Healthcare Security Supply Chain and Transportation Security
Hospitality, Entertainment, and Tourism Security Utilities Security
Human Threat Management Women in Security
Information Technology Security Young Professionals
Intellectual Property Protection Critical Infrastructure Working Group

The Latest from ASIS Councils

Security on the Internet of Things: An ESRM Perspective

IT Security Council, 2018

According to the paper, “The uses of the IoT to build this Smart World are convenient and bring a new level of mobile management to every aspect of consumer and business activities. However, the IoT brings with it, not just convenient access for users of the things, but also convenient access for those wanting to exploit those things. More access points provide more opportunities for attackers to get in. More communication provides more online traffic to siphon information from. More control provides more ability to hijack that control.”

arrow_upward