Each year I am always asked about convergence educational sessions at the ASIS International Annual Seminars and Exhibits event, as well as other educational events.
There are plenty of sessions covering both aspects of security convergence—organization and technical.
[Note: See the Security Technology Executive magazine’s March 2010 issue’s article on technology and organizational convergence, “The State of Converged Security Operations“, to help determine which aspects of convergence are of the greatest value to your current role and future career path.]
Technology and Organizational Convergence
Technology convergence is the result of the more general information technology convergence, and is the impact of computer and network technology being incorporated in security devices and systems. Organizational convergence involves eliminating organizational silos that keep security functions walled off from the rest of the organization in critical ways, and in particular between IT security and physical security.
ASIS 57th Annual Seminar Convergence Sessions
This year marks the highest number of ASIS annual seminar sessions ever that touch on convergence topics: 80 sessions in total, including many sessions on IT security topics that will be of interest to IT personnel. A significant factor is the contribution to this year’s sessions by (ISC)2 – the International Information Systems Security Certification Consortium, Inc. There are more than a half-dozen sessions on all aspects of social media impacts on security, both as a tool and as a risk factor. There is a software applications security track.
Each session time slot holds many convergence-related sessions, so I recommend that you partner up with friends and colleagues to ensure sufficient coverage for your sessions of interest. Since attendees can also by the DVD of all recorded sessions right after the event for just $99, you can still catch up on those you couldn’t see live once you get back home.
I have placed the sessions into one or more of these convergence categories:
- Technology – The incorporation of computers and networking into electronic physical security systems, including “voice/data/video on the same cable”
- Organizational – Eliminating organizational silos that keep security functions walled off from the rest of the organization
- IT Security Topic – An IT security topic such as wireless network security, application security, information systems regulatory compliance, IT security risk assessment, and so on
Session | Title | Date / Time | Convergence Category |
---|---|---|---|
1113 | Pre-Seminar Program: The Successful Security Consultant (Additional Fee Required) | Sunday, Sept 18 8:00 AM – 5:00 PM |
Technology |
1114 | Pre-Seminar Program: CISSP® 2-Day Intensive Education Program Day 2 of 2 (Additional Fee Required) | Sunday, Sept 18 8:00 AM – 5:00 PM |
IT Security Topic |
1115 | Pre-Seminar Program: CSSLP® 2-Day Intensive Education Program Day 2 of 2 (Additional Fee Required) | Sunday, Sept 18 8:00 AM – 5:00 PM |
IT Security Topic |
2101 | ASIS Standards: Auditing for Improvement – Security Risk and Resilience Auditing | Monday, Sept 19 11:00 AM – 12:00 PM |
Organizational |
2105 | Wardriving: Drive Detect and Defense of Wireless Networks | Monday, Sept 19 11:00 AM – 12:00 PM |
IT Security Topic |
2110 | Information Technology Security Council Series: Cloud Computing for the Physical Security Practitioner | Monday, Sept 19 11:00 AM – 12:00 PM |
Technology |
2111 | Seek and Ye Shall Be Sued: Using Social Networking Sites to Manage Risk without Risking Litigation | Monday, Sept 19 11:00 AM – 12:00 PM |
Technology and Organizational |
2117 | Corporate Account Take Over; Online and In the Real World | Monday, Sept 19 11:00 AM – 12:00 PM |
Technology and Organizational |
2180 | Next Generation Cloud Security Compliance | Monday, Sept 19 11:00 AM – 12:00 PM |
Technology |
2182 | Integrating Security Concepts Into System and Application Design | Monday, Sept 19 11:00 AM – 12:00 PM |
Technology |
2183 | Yes, You Can: How to Securely Deploy and Manage Enterprise Mobile Devices | Monday, Sept 19 11:00 AM – 12:00 PM |
Technology |
2185 | Introduction to the Software Assurance Track | Monday, Sept 19 11:00 AM – 12:00 PM |
IT Security Topic |
2203 | Video Quality In Public Safety: First Responder Case Studies | Monday, Sept 19 1:45 PM – 3:00 PM |
Technology |
2206 | Information Technology Security Council Series: Who Are You, and Why Should I Trust You? Current Trends In Identity and Access Management | Monday, Sept 19 1:45 PM – 3:00 PM |
Technology |
2209 | What It Takes to Be a Security Executive Today | Monday, Sept 19 1:45 PM – 3:00 PM |
Organizational |
2213 | Cyber Jihad – Use of the Virtual World | Monday, Sept 19 1:45 PM – 3:00 PM |
IT Security Topic |
2217 | Security’s Role In Managing Successful Events | Monday, Sept 19 1:45 PM – 3:00 PM |
Organizational |
2218 | Crisis Management and Social Media – the New Opportunity | Monday, Sept 19 1:45 PM – 3:00 PM |
Technology and Organizational |
2280 | Using the Cloud Security Alliance GRC Stack to Attest Vendor Compliance | Monday, Sept 19 1:45 PM – 3:00 PM |
IT Security Topic |
2281 | Managing Privacy and Security: The CISO/CPO Dialogue | Monday, Sept 19 1:45 PM – 3:00 PM |
Technology and Organizational |
2282 | Software Security: IS OK Good Enough? | Monday, Sept 19 1:45 PM – 3:00 PM |
IT Security Topic |
2283 | How to Use Mobile Devices Correctly – Setting up Security Guardrails | Monday, Sept 19 1:45 PM – 3:00 PM |
Technology |
2285 | Measure Software Security | Monday, Sept 19 1:45 PM – 3:00 PM |
IT Security Topic |
2306 | Information Technology Security Council Series: Forensics and E-Discovery | Monday, Sept 19 4:30 PM – 5:30 PM |
Technology and Organizational |
2307 | Generate Cash by Uninvesting In Security Equipment Services | Monday, Sept 19 4:30 PM – 5:30 PM |
Technology |
2309 | Information and Data Security While Away From the Office | Monday, Sept 19 4:30 PM – 5:30 PM |
Technology and Organizational |
2313 | Advanced Internet and Social Network Investigations and Background Checks | Monday, Sept 19 4:30 PM – 5:30 PM |
Organizational |
2317 | Security Excellence – Tools to Enhance Security’s Mission | Monday, Sept 19 4:30 PM – 5:30 PM |
Organizational |
2320 | Protecting America’s Electric Grid | Monday, Sept 19 4:30 PM – 5:30 PM |
Technology |
2380 | Cloud Incident Response | Monday, Sept 19 4:30 PM – 5:30 PM |
Technology and Organizational |
2381 | Cyber Security and the Socio-Political Landscape – Going Beyond the Technology | Monday, Sept 19 4:30 PM – 5:30 PM |
Technology and Organizational |
2382 | The Economics of Failure | Monday, Sept 19 4:30 PM – 5:30 PM |
Organizational |
2385 | Why Do Developers Make These Dangerous Software Errors? | Monday, Sept 19 4:30 PM – 5:30 PM |
IT Security Topic |
3101 | ASIS Standards: Conducting a Risk Assessment – the Foundation for Successful Risk Management | Tuesday, Sept 20 11:00 AM – 12:00 PM |
Organizational |
3105 | Setting the Standard: A Roundup of the Physical and Logical Technology Standards Affecting the Security Industry | Tuesday, Sept 20 11:00 AM – 12:00 PM |
Technology |
3112 | Information Technology Security Council Series: Cyber Security | Tuesday, Sept 20 11:00 AM – 12:00 PM |
Technology |
3117 | Countering Business/Industrial Espionage In a Global Marketplace | Tuesday, Sept 20 11:00 AM – 12:00 PM |
Organizational |
3120 | Disaster In the Data Center! Are You Prepared? | Tuesday, Sept 20 11:00 AM – 12:00 PM |
Technology and Organizational |
3180 | Architecting and Building A Secure Virtual Infrastructure and Private Cloud | Tuesday, Sept 20 11:00 AM – 12:00 PM |
Technology |
3181 | Data Integrity Debate | Tuesday, Sept 20 11:00 AM – 12:00 PM |
IT Security Topic |
3182 | Security App-Titude | Tuesday, Sept 20 11:00 AM – 12:00 PM |
IT Security Topic |
3183 | The ABCs of Global Mobile Enterprise Compliance | Tuesday, Sept 20 11:00 AM – 12:00 PM |
Technology and Organizational |
3185 | Improve Your SDLC with Capec and Cwe | Tuesday, Sept 20 11:00 AM – 12:00 PM |
IT Security Topic |
3206 | Security Architecture and Engineering, Part 2: Systems Design and Engineering | Tuesday, Sept 20 1:45 PM – 3:00 PM |
Technology |
3208 | Information Technology Security Council Series: Is the Power Infrastructure Secure? Utility and Smart Grid Security | Tuesday, Sept 20 1:45 PM – 3:00 PM |
Technology |
3216 | Integrated Operational Risk Management: A Look Inside Westinghouse | Tuesday, Sept 20 1:45 PM – 3:00 PM |
Organizational |
3219 | Caution Advised! the Use of Social Networking Sites, Search Engines and Web 2.0 to Screen Applicants | Tuesday, Sept 20 1:45 PM – 3:00 PM |
Technology and Organizational |
3280 | Forensics and the Cloud – What Is the Meaning of This? | Tuesday, Sept 20 1:45 PM – 3:00 PM |
Technology and Organizational |
3282 | Picking the Right Tool for the Job: Using Vendor Tools to Aid In the Development of Secure Code | Tuesday, Sept 20 1:45 PM – 3:00 PM |
IT Security Topic |
3283 | Mobile Applications: Managing Enterprise Risk and Exploitation | Tuesday, Sept 20 1:45 PM – 3:00 PM |
IT Security Topic |
3284 | Putting Your House In Order – Business Intelligence Gathered From 100+ Sustainable It-GRC Implementations | Tuesday, Sept 20 1:45 PM – 3:00 PM |
Technology and Organizational |
3290 | CSO Roundtable: Social Media Risks and Rewards (Open to CSO Members Only) | Tuesday, Sept 20 1:45 PM – 2:45 PM |
Technology and Organizational |
3304 | Innovation or Confusion? How Will High Tech Industries Impact Electronic Security Systems? | Tuesday, Sept 20 4:30 PM – 5:30 PM |
Technology |
3305 | Security Architecture and Engineering, Part 3: Creating and Communicating the Security System | Tuesday, Sept 20 4:30 PM – 5:30 PM |
Technology |
3306 | Information Technology Security Council Series: Federal Information Security | Tuesday, Sept 20 4:30 PM – 5:30 PM |
IT Security Topic |
3312 | Protecting Your Brand Online: Success Stories On How to Tame the Internet | Tuesday, Sept 20 4:30 PM – 5:30 PM |
Organizational |
3315 | Requesting, Obtaining Approval and Implementing Technology Upgrades | Tuesday, Sept 20 4:30 PM – 5:30 PM |
Technology and Organizational |
3317 | How Vulnerable Is Your Data? Cost-Effective Best Practices to Safeguard Against Data Breaches | Tuesday, Sept 20 4:30 PM – 5:30 PM |
Technology |
3381 | Psychological Principles In Social Engineering | Tuesday, Sept 20 4:30 PM – 5:30 PM |
Technology and Organizational |
3383 | Impact of Social Networking On Security Threats | Tuesday, Sept 20 4:30 PM – 5:30 PM |
Technology and Organizational |
3385 | Software Assurance Panel Wrap-up | Tuesday, Sept 20 4:30 PM – 5:30 PM |
IT Security Topic |
4111 | Information Technology Security Council Series: Legal and Compliance Aspects of I.T. | Wednesday, Sept 21 11:00 AM – 12:00 PM |
Technology and Organizational |
4118 | Social Networking: New Challenges of Managing Stalking In the Workplace | Wednesday, Sept 21 11:00 AM – 12:00 PM |
Technology and Organizational |
4180 | Building Trust, Visibility and Resilience in Government Networks and the Cloud | Wednesday, Sept 21 11:00 AM – 12:00 PM |
Technology and Organizational |
4181 | The Reality of Cyber-Centric Terrorism | Wednesday, Sept 21 11:00 AM – 12:00 PM |
IT Security Topic |
4182 | Integrating Security Into the SDLC: Enterprise Success Stories | Wednesday, Sept 21 11:00 AM – 12:00 PM |
IT Security Topic |
4183 | Identify, Assess and Mitigate Security Risks Associated with New Mobile Devices and Applications | Wednesday, Sept 21 11:00 AM – 12:00 PM |
Technology |
4203 | Becoming a Trusted Advisor to the CSO | Wednesday, Sept 21 1:45 PM – 2:45 PM |
Organizational |
4204 | Integrator Track: Critical Infrastructure Security Solutions (Energy, Water, Gas) | Wednesday, Sept 21 1:45 PM – 2:45 PM |
Technology |
4206 | The Virtual Security Officer – Are You Getting the Most From Your Cameras and Guards? | Wednesday, Sept 21 1:45 PM – 2:45 PM |
|
4209 | Private Sector Investigations – When (and if) to Involve Law Enforcement | Wednesday, Sept 21 1:45 PM – 2:45 PM |
Technology |
4280 | The Cloud and Security – A Practical Case Study | Wednesday, Sept 21 1:45 PM – 2:45 PM |
Technology |
4281 | The Renaissance Security Professional | Wednesday, Sept 21 1:45 PM – 2:45 PM |
Organizational |
4282 | The Unintended Consequences of Well-Intentioned Requirements | Wednesday, Sept 21 1:45 PM – 2:45 PM |
IT Security Topic |
4283 | Sponsor Session Mobile Track | Wednesday, Sept 21 1:45 PM – 2:45 PM |
Technology |
4307 | Building An Effective Information Systems Security Program | Wednesday, Sept 21 3:30 PM – 5:00 PM |
Technology |
4309 | Web 2.0: Risk From Social Media | Wednesday, Sept 21 3:30 PM – 5:00 PM |
Technology and Organizational |
4312 | Building a Corporate or Municipal Security Operations Center | Wednesday, Sept 21 3:30 PM – 5:00 PM |
Technology and Organizational |
5170 | The CSO in the Future | Thursday, Sept 22 8:00 AM – 9:00 AM |
Technology and Organizational |
5172 | Security and Social Networks | Thursday, Sept 22 10:45 AM – 12:00 PM |
Technology and Organizational |