-
Recent Posts
Archives
Categories
Doug Levin Gravatar Profile Link
Advertisements
Now, there’s the rub! Is the consultant addressing topics relevant to the client’s perceived need, or just addressing his/her area of expertise? We live in a world where organizations face a diverse array of threats. The daunting task of the … Continue reading
Is this War, or an Opportunity? After taking a short few weeks to investigate the InfoSec space and speak with several ISC2 certified CISSP’s… it would appear the convergence and overlap of Data and Physical Security is creating misconceptions regarding … Continue reading
I had an interesting conversation last year with a Data Security Consultant, Mark Turturo, CISSP. I have been working since then to better understand the mission of these professionals and their relevance to the physical security specialist. I operate in … Continue reading
Professional Services Role in Physical Security I find it interesting to note that most manufacturers in the security industry call their channel partners “Security Integrators”, rather than Security Contractors. It represents a fundamental misunderstanding of system delivery business models. Does … Continue reading
Common Technology Oversights In my experience, there are three very common discoveries when I reach out to new potential partners: A lack of awareness that their existing systems have much more potential functionality than they currently utilize. A realization they … Continue reading
As a Biz Dev Manager in the physical security technology space, Bicsi members are an important emerging channel. This year the trade show was particularly productive. This was a well-attended conference, with a particularly good showing from technology consultants and … Continue reading
The weekend recovery begins, after a long (but productive) ASIS focused week… This year I spent time walking the trade show floor and thinking about larger physical security industry issues and how the ASIS Conference is positioned. End-User Focused Event … Continue reading
As automated building systems become more dependent on shared network infrastructure, I.T. (Information Technology) Directors and CISO’s (Chief Information Security Officers) are beginning to realize these systems are adding significant vulnerabilities and risks to their network and sharing this realization … Continue reading
I spent several hours at ASU SkySong in Tempe, AZ with Jim Cook a couple of weeks ago discussing the broader road map for the data security space. Jim has an interesting job title: ASU Director of Business Development for the … Continue reading
As mentioned in previous posts, all data paths eventually converge via LAN/WAN… so how will physical security evolve to accommodate this reality? Technology has one and ONLY ONE purpose in the physical security space: improving the effectiveness and/or efficiency of … Continue reading