ASIS 2013 for Integrators

ASIS 2013 is expected to draw more than 20,000 security professionals from more than 90 countries when it convenes Sept. 24–27 in Chicago. Of course, systems integrators will be among those heading to McCormick Place in search of the latest information, tools, and techniques for protecting people, property, and data.

The four-day event offers more than 200 educational sessions split into 24 tracks that span traditional security, systems integrator-related programs and IT security. Nine of those tracks are dedicated exclusively to systems integrators. Here’s a brief look at a few of the sessions involved in the systems integrator track (check out the full lineup of educational sessions at under the “program” tab):

  1. Partnerships, Projects and Success Stories: What makes up a successful partnership between system integrators and security managers? Actual situations tell the story of how each project team member can prosper even under extreme pressure.
  2. Security, Your Campus, Your Plan, Your Integrator: What makes a successful security deployment in a security campus? What are the most sought after solutions and services provided by today’s security integrator? How does a practitioner merge these technologies into a security master plan? Learn the answers and guidance from both user and provider.
  3. Protecting the Security Investment: What are the most important elements of security to unify and why? How can video surveillance, access control, intrusion detection, fire and RFID assets be managed efficiently, easily and successfully? And what is the difference between unification and integration? Hear critical insights that apply to organizations of any size.
  4. Trends in IP Electronic Security Systems: How to construct non-proprietary IP security system platforms, how to work with internal IT departments to leverage existing infrastructure, and what the key challenges and future trends of IP security systems are.
  5. The Future of Near Field Communication (NFC)-Enabled Mobile Devices: How pilot programs were executed in university and corporate settings, the full breadth of usage, and the lessons learned. Participants will understand what opportunities NFC technology might hold for the future of access control.

Additionally, this year BICSI, the Electronic Security Association (ESA), the International Association for Healthcare Security & Safety (IAHSS), PSA Security Network, and Security Industry Association (SIA) are partnering with ASIS 2013 to provide additional topics of interest to the entire distribution channel.

For more education, (ISC)², the largest not-for-profit membership body of certified information security professionals worldwide, will colocate its third annual Security Congress with ASIS 2013. Reflecting the interdependence of information technology and operational security, sessions in the nine (ISC) ² tracks are open to attendees of both events. The partnership, now in its third year, broadens the scope of educational programs offered and encourages dialogue and collaboration between those on the frontlines of both traditional and IT security. “The lines between departments and functional units, as well as between professions, are blurring as the emphasis on cyber security increases,” said ASIS President Geoff T. Craighead, CPP. “We must work as a team to deal with today’s threats.”

Other ASIS Events

The Exhibit Hall: More than 700 exhibitors will display thousands of cutting-edge technologies, products and services. Attendees can see and compare the latest innovations in person, talk to product experts face-to-face, and do a year’s worth of research in three days.

Keynote Speeches: Co-founder of Apple Computer and Silicon Valley icon Steve Wozniak will deliver the first keynote address on Sept. 25. A unique world-view will be presented Sept. 26 by The Honorable John Winston Howard, the 25th Prime Minister of Australia, who turned around the federal government budget from heavy deficit to free of net debt when he left office in 2007. Sports legend Mike Ditka, the closing luncheon on Sept. 27, will share lessons learned during his time as player, assistant coach, and head coach of the Chicago Bears.

Roundtable Discussions: An International Policy Roundtable, “From Victims to Vigilantes: Cyber Security Strategies Going on the Offensive,” will be presented by (ISC)2 on Sept. 27, followed by “Counterfeiting: From Potions and Lotions to Tractors and Turbines,” and “The Security Professional as a Trusted Advisor.”