Search by Session Title
Go Back



Start Time Session Title Session #
Friday, September 07, 2012 8:00 AM ASIS Pre-Seminar Program: CPP Certification Review Day 1 (Additional Fee Required) 1000 View
Saturday, September 08, 2012 8:00 AM ASIS Pre-Seminar Program: CPP Certification Review Day 2 (Additional Fee Required) 1001 View
Friday, September 07, 2012 8:00 AM ASIS Pre-Seminar Program: PCI Certification Review Day 1 (Additional Fee Required) 1002 View
Saturday, September 08, 2012 8:00 AM ASIS Pre-Seminar Program: PCI Certification Review Day 2 (Additional Fee Required) 1003 View
Friday, September 07, 2012 8:00 AM ASIS Pre-Seminar Program: PSP Certification Review Day 1 (Additional Fee Required) 1004 View
Saturday, September 08, 2012 8:00 AM ASIS Pre-Seminar Program: PSP Certification Review Day 2 (Additional Fee Required) 1005 View
Saturday, September 08, 2012 8:00 AM ASIS Pre-Seminar Program: Detecting Deception in Verbal and Written Statements Day 1 (Additional Fee Required) 1006 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: Detecting Deception in Verbal and Written Statements Day 2 (Additional Fee Required) 1007 View
Saturday, September 08, 2012 8:00 AM ASIS Pre-Seminar Program: Securing Houses of Worship: Best Practices for 21st Century Protection (Additional Fee Required) 1008 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: Are Your Officers Safe? Security Officer Life Safety (Additional Fee Required) 1009 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: Banking and Financial Services Security (Additional Fee Required) 1010 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: Beyond the Basics in Security Management (Additional Fee Required) 1011 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: Designing a Functionally Integrated Security System (Additional Fee Required) 1012 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: Open-Source Intelligence (Additional Fee Required) 1013 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: Security Program Design: Keys to Success (Additional Fee Required) 1014 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: Successful Security Consulting (Additional Fee Required) 1015 View
Sunday, September 09, 2012 8:00 AM ASIS Pre-Seminar Program: The Moment Has Arrived: A Global Perspective of Assuring Organizational Resilience (Additional Fee Required) 1016 View
Sunday, September 09, 2012 1:30 PM ASIS Pre-Seminar Tour: Federal Protective Service MegaCenter in Philadelphia (Additional Fee Required) 1017 View
Sunday, September 09, 2012 1:00 PM ASIS Pre-Seminar Tour: United States Philadelphia Mint Facility (Additional Fee Required) 1018 View
Saturday, September 08, 2012 8:00 AM (ISC)2 Pre-Conference Education: Cloud Security Program Day 1 (Additional Fee Required) 1019 View
Sunday, September 09, 2012 8:00 AM (ISC)2 Pre-Conference Education: Cloud Security Day 2 (Additional Fee Required) 1020 View
Saturday, September 08, 2012 8:00 AM (ISC)2 Pre-Conference Education: CISSP Day 1 (Additional Fee Required 1021 View
Sunday, September 09, 2012 8:00 AM (ISC)2 Pre-Conference Education: CISSP Day 2 (Additional Fee Required) 1022 View
Saturday, September 08, 2012 8:00 AM (ISC)2 Pre-Conference Education: CSSLP Day 1 (Additional Fee Required) 1023 View
Sunday, September 09, 2012 8:00 AM (ISC)2 Pre-Conference Education: CSSLP Day 2 (Additional Fee Required) 1024 View
Saturday, September 08, 2012 8:00 AM (ISC)2 Pre-Conference Education: Introduction to Digital Forensics (Additional Fee Required) 1025 View
Sunday, September 09, 2012 8:00 AM (ISC)2 Pre-Conference Education: Digital Forensics (Additional Fee Required) 1026 View
Sunday, September 09, 2012 8:00 AM (ISC)2 Pre-Conference Education: CAP and CSSLP Credential Clinic 1027 View
Sunday, September 09, 2012 1:00 PM (ISC)2 Pre-Conference Education: SSCP and CISSP Credential Clinic 1028 View
Sunday, September 09, 2012 8:00 AM ASIS Foundation Pre-Seminar Event: 16th Annual Golf Tournament (Additional Fee Required) 1029 View
Sunday, September 09, 2012 5:00 PM Young Professionals Reception 1030 View
Sunday, September 09, 2012 6:00 PM First-Time Seminar Attendee/New Member Reception (By invitation) 1031 View
Sunday, September 09, 2012 7:00 PM Welcome Reception (Open to all Seminar attendees) 1032 View
Monday, September 10, 2012 7:45 AM Opening Ceremony (Open to all Seminar Attendees) 2000 View
Monday, September 10, 2012 12:00 PM Monday Networking Luncheon (Included in Full Registration and Single Day registration. Additional tickets available for purchase.) 2001 View
Monday, September 10, 2012 7:00 PM President’s Reception at the National Constitution Center (Included in Full Registration package and Monday’s Single Day Registration. Additional tickets available for purchase.) 2002 View
Monday, September 10, 2012 11:00 AM New DoD Standards for Private Security Contractors 2101 View
Monday, September 10, 2012 11:00 AM Integrator Series: Pharmaceutical, Logistics and Supply Chain Purchasing, Projects and Trends 2102 View
Monday, September 10, 2012 11:00 AM Behavior Detection and Assessment at Mall of America 2103 View
Monday, September 10, 2012 11:00 AM Physical Security Practitioner 2022: A Look at the Future 2104 View
Monday, September 10, 2012 11:00 AM Are High Tech Industries Changing Physical Security? 2105 View
Monday, September 10, 2012 11:00 AM Security Manuals and Post Orders 2106 View
Monday, September 10, 2012 11:00 AM Are You Ready for What’s Next? Emerging Federal Regulations and Your Business 2107 View
Monday, September 10, 2012 11:00 AM Effective Crisis Management 2108 View
Monday, September 10, 2012 11:00 AM Watch Us Build an Effective Security Performance Metric, Then Build Your Own 2109 View
Monday, September 10, 2012 11:00 AM Hiring America’s Heroes 2110 View
Monday, September 10, 2012 11:00 AM Conducting Investigations and Background Checks Through Social Media 2111 View
Monday, September 10, 2012 11:00 AM Defense Security Service Reports to Industry 2112 View
Monday, September 10, 2012 11:00 AM High Risk Terminations – Safeguards and Procedures 2113 View
Monday, September 10, 2012 11:00 AM Understanding the Risks and Challenges in Overseas Markets 2114 View
Monday, September 10, 2012 11:00 AM Building a Strategic Response to Trade Secret Theft 2115 View
Monday, September 10, 2012 11:00 AM Maritime Piracy: How to Respond 2116 View
Monday, September 10, 2012 11:00 AM After the Arab Spring: Business as Usual? 2117 View
Monday, September 10, 2012 11:00 AM Keeping Off-site Employees Safe 2118 View
Monday, September 10, 2012 11:00 AM Trends in Extreme Workplace Violence 2119 View
Monday, September 10, 2012 11:00 AM Cyber Bullying in the Workplace 2120 View
Monday, September 10, 2012 11:00 AM CSO Roundtable: CSO’s Guide to New Emerging Markets 2150 View
Monday, September 10, 2012 10:00 AM CSO Roundtable: A Conversation with The Honorable Tom Ridge 2151 View
Monday, September 10, 2012 11:00 AM Avoiding the Storm – A Security Driven Strategy for Transitioning to the Cloud 2180 View
Monday, September 10, 2012 11:00 AM Implementing Practical Risk Management Architectures 2181 View
Monday, September 10, 2012 11:00 AM Software Assurance/SDLC Panel - The Supply Chain is the Weakest Link 2182 View
Monday, September 10, 2012 11:00 AM Social Engineering Threats – Tales from the Trenches 2183 View
Monday, September 10, 2012 11:00 AM E-Discovery & ESI (Electronically Stored Information) – Don't Leave Your Business Unprotected 2184 View
Monday, September 10, 2012 11:00 AM Software Supply Chain Risk Management Enabling Enterprise Cyber Security 2185 View
Monday, September 10, 2012 11:00 AM Defending Against Attacks by Modeling Threat Behaviors 2186 View
Monday, September 10, 2012 11:00 AM The Ages Of Malware And The Future 2187 View
Monday, September 10, 2012 11:00 AM When There’s No Such Thing As Secure – Providing Risk-Based Cyber Security 2188 View
Monday, September 10, 2012 1:45 PM Mass Homicides in the Workplace 2201 View
Monday, September 10, 2012 1:45 PM Integrator Series: Taking the Pulse of Healthcare Security 2202 View
Monday, September 10, 2012 1:45 PM Focus On Three Retail Issues 2203 View
Monday, September 10, 2012 1:45 PM The New Enterprise Security Risk Manager 2204 View
Monday, September 10, 2012 1:45 PM Turning the Community Into Champions for Surveillance 2205 View
Monday, September 10, 2012 1:45 PM Do You Hear What I Hear? Analysing Verbal Statements 2206 View
Monday, September 10, 2012 1:45 PM The Revolution in Security Lighting 2207 View
Monday, September 10, 2012 1:45 PM Enduring Security Concepts or Fleeting Buzzwords? 2208 View
Monday, September 10, 2012 1:45 PM Security On Trial 2209 View
Monday, September 10, 2012 1:45 PM Updates on the Defense Security Service Counterintelligence Program 2210 View
Monday, September 10, 2012 1:45 PM Africa - Open For Business 2212 View
Monday, September 10, 2012 1:45 PM Using Social Networking Sites, Search Engines, and Web 2.0 to Screen Applicants: Caution Advised! 2214 View
Monday, September 10, 2012 1:45 PM Seven Deadly Sins of Executive Protection 2215 View
Monday, September 10, 2012 1:45 PM SESSION CANCELLED - The Evolution of a Terrorist Threat 2216 View
Monday, September 10, 2012 1:45 PM Securing Global Commodities: From Mines to Manufacturers to Markets 2217 View
Monday, September 10, 2012 1:45 PM Brand And Reputation Protection 2219 View
Monday, September 10, 2012 1:45 PM Intimate Partner Violence in the Workplace 2220 View
Monday, September 10, 2012 1:45 PM CSO Roundtable: The Value of Corporate Rebels and Heretics 2250 View
Monday, September 10, 2012 1:45 PM Global Challenges to Cloud Computing and the role of the Cloud Security Alliance 2280 View
Monday, September 10, 2012 1:45 PM Layered Security: Protecting Online Customer Transactions for a Financial Institution 2281 View
Monday, September 10, 2012 1:45 PM Software Assurance in 2012 – a CISO view on the state of practice 2282 View
Monday, September 10, 2012 1:45 PM Employee and User Expectations of Privacy in Mobile applications 2283 View
Monday, September 10, 2012 1:45 PM Solving the Cyber Security Hiring Crisis 2284 View
Monday, September 10, 2012 1:45 PM Why It’s Important To Know Where Your IT Comes From 2285 View
Monday, September 10, 2012 1:45 PM Cloud Software Threats - Are You Forgetting Something? 2286 View
Monday, September 10, 2012 1:45 PM The Future of Malware - A Panel Discussion 2287 View
Monday, September 10, 2012 1:45 PM Securing the Cloud: Evolving from a ‘Benefits’ Mindset to a ‘Security’ Mindset 2288 View
Monday, September 10, 2012 4:30 PM The Value of Security Degrees 2301 View
Monday, September 10, 2012 4:30 PM Integrator Series: Retail Security Trends 2302 View
Monday, September 10, 2012 4:30 PM Data Breach! The Event, The Investigation, The Recovery 2303 View
Monday, September 10, 2012 4:30 PM How CPTED Worked for a Quick Service Restaurant 2304 View
Monday, September 10, 2012 4:30 PM Disaster in the Data Center! Are You Prepared? 2305 View
Monday, September 10, 2012 4:30 PM Reputation Risks: Mitigation Strategies and Techniques 2306 View
Monday, September 10, 2012 4:30 PM The Use of Force: Where Do You Stand? 2307 View
Monday, September 10, 2012 4:30 PM Managing Fraud and Crime Risks in Emerging Markets 2308 View
Monday, September 10, 2012 4:30 PM Identifying and Preventing Active Shooters 2309 View
Monday, September 10, 2012 4:30 PM What Will Help Secure Your Global Supply Chain? 2310 View
Monday, September 10, 2012 4:30 PM SESSION CANCELLED - Truth Matters; How to Detect Deception 2311 View
Monday, September 10, 2012 4:30 PM Protecting America's Electric Grid 2312 View
Monday, September 10, 2012 4:30 PM A Security Management Internship Program: A Great Recruiting Tool For Your Comany" 2313 View
Monday, September 10, 2012 4:30 PM Manage These 10 Career Risks Now 2314 View
Monday, September 10, 2012 4:30 PM A Framework for Managing Crime and Fraud 2315 View
Monday, September 10, 2012 4:30 PM SESSION CANCELLED - Trends in Continuity of Operations 2316 View
Monday, September 10, 2012 4:30 PM Recognizing and Assessing Suspicious Indicators 2317 View
Monday, September 10, 2012 4:30 PM CSO Roundtable: The Wisdom of CSOs: A Panel Discussion with the Editor of Security Management, Digital Edition 2350 View
Monday, September 10, 2012 4:30 PM Proof, Not Promises – Key Steps to Build a Trusted Hybrid Cloud 2380 View
Monday, September 10, 2012 4:30 PM Do We Stand A Chance In The War Against Spear Phishers? 2381 View
Monday, September 10, 2012 4:30 PM How To Predict Software Quality Early In The Software Development Lifecycle And Produce Secure Software 2382 View
Monday, September 10, 2012 4:30 PM Mobile security best practices and residual risks 2383 View
Monday, September 10, 2012 4:30 PM What IT professionals need to know about privacy 2384 View
Monday, September 10, 2012 4:30 PM What can an Acquirer do to prevent developers from make dangerous software errors? 2385 View
Monday, September 10, 2012 4:30 PM Follow my Botnet on Twitter 2387 View
Monday, September 10, 2012 4:30 PM Selecting Authentication Methods for Secure Government Networks 2388 View
Tuesday, September 11, 2012 8:00 AM Keynote Address - Mohamed ElBaradei 3000 View
Tuesday, September 11, 2012 12:00 PM Tuesday Networking Luncheon (Included in Full Registration and Single Day registration. Additional tickets available for purchase.) 3001 View
Tuesday, September 11, 2012 7:30 AM Former FBI Agents Breakfast 3002 View
Tuesday, September 11, 2012 8:00 AM Former Secret Service Breakfast 3003 View
Wednesday, September 12, 2012 7:00 AM Former U.S. Military Breakfast 3004 View
Tuesday, September 11, 2012 6:00 PM International Organization of Black Security Executives (IOBSE) Mixer 3005 View
Tuesday, September 11, 2012 7:00 AM National Association of Security Companies (NASCO) Breakfast 3006 View
Tuesday, September 11, 2012 7:00 AM Christians in Security Prayer Breakfast 3007 View
Tuesday, September 11, 2012 11:00 AM Workplace Violence Prevention and Intervention Standard - Case Study 3101 View
Tuesday, September 11, 2012 11:00 AM Integrator Series: See Something Say Something; Supporting Transit and Transportation Security 3102 View
Tuesday, September 11, 2012 11:00 AM Security Architecture and Engineering, Part 1: Basis of Security Design 3103 View
Tuesday, September 11, 2012 11:00 AM Data Mining and Statistical Measurement in Retail Loss Prevention 3104 View
Tuesday, September 11, 2012 11:00 AM Are You Smarter than Your Video System? 3105 View
Tuesday, September 11, 2012 11:00 AM Nationwide Suspicious Activity Reporting Initiative 3106 View
Tuesday, September 11, 2012 11:00 AM Understanding Islam: History and Radicalization – Part I 3107 View
Tuesday, September 11, 2012 11:00 AM Obama Care and the Contract Security Industry 3108 View
Tuesday, September 11, 2012 11:00 AM Creating an Empowered, Effective, Converged Security Team 3109 View
Tuesday, September 11, 2012 11:00 AM Distinctions with Differences: Identifying and Protecting Information Assets 3110 View
Tuesday, September 11, 2012 11:00 AM Lessons Learned from Fukushima 3111 View
Tuesday, September 11, 2012 11:00 AM Creatively Managing Conflict and Agression Through Amazing Communication 3112 View
Tuesday, September 11, 2012 11:00 AM Today's CSO: Tools and Attitudes that Drive Value 3113 View
Tuesday, September 11, 2012 11:00 AM Engaging Social Media in Crisis Management 3114 View
Tuesday, September 11, 2012 11:00 AM Integrating Physical and Cyber Security - Strategies That Work 3115 View
Tuesday, September 11, 2012 11:00 AM Stamping Out Fraud: U.S. Postal Inspection Service 3116 View
Tuesday, September 11, 2012 11:00 AM The Next Generation in Open Source Intelligence 3117 View
Tuesday, September 11, 2012 11:00 AM Using Smart Phones as Campus Credentials 3119 View
Tuesday, September 11, 2012 11:00 AM Trends and Threats in Food Defense 3120 View
Tuesday, September 11, 2012 10:00 AM CSO Roundtable: Distinguished Speaker Series-Mohamed ElBaradei 3150 View
Tuesday, September 11, 2012 11:00 AM CSO Roundtable: Discussion with DHS: Emerging Threats 3151 View
Tuesday, September 11, 2012 11:00 AM A simple way to mature your Cloud Security, Privacy, and Reliability capabilities 3180 View
Tuesday, September 11, 2012 11:00 AM Running a Successful Identity Program 3181 View
Tuesday, September 11, 2012 11:00 AM SQL Injection: A Live, Hands-On Tutorial 3182 View
Tuesday, September 11, 2012 11:00 AM Social Media & Cloud Computing Threats to Privacy, Security and Liberty 3183 View
Tuesday, September 11, 2012 11:00 AM Adoption Strategies for addressing Privacy and Regulations in the Cloud 3184 View
Tuesday, September 11, 2012 11:00 AM The Software Industry’s “Clean Water Act” Alternative 3185 View
Tuesday, September 11, 2012 11:00 AM Advance Persistent Threats (APT) - Analysis and Recommendations 3186 View
Tuesday, September 11, 2012 11:00 AM After the Storm - Lessons Learned in Cleaning up a Malware Incident 3187 View
Tuesday, September 11, 2012 11:00 AM NICE: A High Level Overview 3188 View
Tuesday, September 11, 2012 1:45 PM Implementing the New Physical Asset Protection Standard 3201 View
Tuesday, September 11, 2012 1:45 PM Integrator Series: Cloud Computing Transforms Physical and Cyber Security 3202 View
Tuesday, September 11, 2012 1:45 PM Security Architecture and Engineering, Part 2: Systems Design and Engineering 3203 View
Tuesday, September 11, 2012 1:45 PM What's New On the Floor 3204 View
Tuesday, September 11, 2012 1:45 PM Supply Chain Risk Management Best Practices 3205 View
Tuesday, September 11, 2012 1:45 PM Dignitaries Under Fire: A Guatemala Case Study 3206 View
Tuesday, September 11, 2012 1:45 PM New School Security Risks and Solutions 3207 View
Tuesday, September 11, 2012 1:45 PM Toronto's Public/Private Sector Partnership Collaborates On Major Public Safety Events 3208 View
Tuesday, September 11, 2012 1:45 PM Contrasting Views on Premises Liability 3209 View
Tuesday, September 11, 2012 1:45 PM Career Preparedness: Maximize Your Education and Training 3210 View
Tuesday, September 11, 2012 1:45 PM Duty Of Care: What's The Security Director's Role? 3211 View
Tuesday, September 11, 2012 1:45 PM High Impact Security Education and Training 3212 View
Tuesday, September 11, 2012 1:45 PM SESSION CANCELLED - Security Responds to International Disasters 3213 View
Tuesday, September 11, 2012 1:45 PM Walgreens Emergency Planning & Response Case Study 3214 View
Tuesday, September 11, 2012 1:45 PM Crime and Terror in Latin America and the Caribbean 3215 View
Tuesday, September 11, 2012 1:45 PM Bank Credit Card Fraud 3216 View
Tuesday, September 11, 2012 1:45 PM Physical Security System Performance: The Road to PSIM 3217 View
Tuesday, September 11, 2012 1:45 PM How to Take Your Security Career to the Next Level: Succeeding in a Diverse Global Business Environment 3218 View
Tuesday, September 11, 2012 1:45 PM New Approaches to Mentoring and Careers 3219 View
Tuesday, September 11, 2012 1:45 PM CSO Roundtable: Public Demonstrations: A Security Blueprint for Shareholder Meeting Success 3250 View
Tuesday, September 11, 2012 1:45 PM Up in the Air: Cloud Security and Company Data 3280 View
Tuesday, September 11, 2012 1:45 PM From Geek Speak to Geek Sleek – Creating a Digestible End-User Training Program 3281 View
Tuesday, September 11, 2012 1:45 PM Maintaining Application Security While Leveraging the Use of Open Source Software 3282 View
Tuesday, September 11, 2012 1:45 PM Risk Assessment of Social Media Use 3283 View
Tuesday, September 11, 2012 1:45 PM The Global Privacy Movement and Its Implications for the Modern Compliance Program 3284 View
Tuesday, September 11, 2012 1:45 PM Automation Enabling the Convergence of Enterprise Physical and Cyber 3285 View
Tuesday, September 11, 2012 1:45 PM Counterattack Information Security 3286 View
Tuesday, September 11, 2012 1:45 PM Notes from the Field: Malware Acrobatics 3287 View
Tuesday, September 11, 2012 1:45 PM Good Security on a Government Budget? Federal CISOs Do More with Less 3288 View
Tuesday, September 11, 2012 4:30 PM Conducting Reliable and Repeatable Risk Assessments 3301 View
Tuesday, September 11, 2012 4:30 PM Integrator Series: Campus Safety and Security Purchasing, Projects and Trends 3302 View
Tuesday, September 11, 2012 4:30 PM Security Architecture and Engineering, Part 3: Creating a Well-designed Security System 3303 View
Tuesday, September 11, 2012 4:30 PM Navigating Complex Investigations using Cellular Technology 3304 View
Tuesday, September 11, 2012 4:30 PM BRIC Countries: Navigating The Barriers 3305 View
Tuesday, September 11, 2012 4:30 PM Women in Security Round Table Discussion 3306 View
Tuesday, September 11, 2012 4:30 PM Identifing, Assessing, and Mitigating Targeted Violence Through Partnerships, Communication, and Teamwork 3307 View
Tuesday, September 11, 2012 4:30 PM A Security Director’s Guide to Developing a Workplace Ethics Program 3308 View
Tuesday, September 11, 2012 4:30 PM Enrich Career Development by Partnering with Colleges and Universities 3309 View
Tuesday, September 11, 2012 4:30 PM SESSION CANCELLED - Corporate Manslaughter. Be prepared! 3310 View
Tuesday, September 11, 2012 4:30 PM Civil Disturbances : Trends, Tactics, and Mitigation for Private Security 3311 View
Tuesday, September 11, 2012 4:30 PM Supply Chain Security: The New Normal 3312 View
Tuesday, September 11, 2012 4:30 PM Pre-employment Security Profiling: Preventing the Insider Threat 3313 View
Tuesday, September 11, 2012 4:30 PM PATHcomm - A Platform for Public/Private Interoperability 3314 View
Tuesday, September 11, 2012 4:30 PM Evacuations: Where is Everybody? 3315 View
Tuesday, September 11, 2012 4:30 PM Cruise Ship Safety and Security 3316 View
Tuesday, September 11, 2012 4:30 PM Effecting Positive Change in Public Safety and Security through interoperable communications and inter-agency cooperation 3317 View
Tuesday, September 11, 2012 4:30 PM How to Survive a Day at Work 3318 View
Tuesday, September 11, 2012 4:30 PM CSO Roundtable: Latin America: Open Forum on Security Issues in the Region 3350 View
Tuesday, September 11, 2012 4:30 PM CSO Roundtable: Security Research Roundtable with Professor Martin Gill 3351 View
Tuesday, September 11, 2012 4:30 PM Security assessment in the cloud 3380 View
Tuesday, September 11, 2012 4:30 PM The Security Professional as Data Steward 3381 View
Tuesday, September 11, 2012 4:30 PM The 7 Qualities of Highly Secure Software 3382 View
Tuesday, September 11, 2012 4:30 PM Personal Mobile Devices in the Enterprise: Security & Privacy Issues 3383 View
Tuesday, September 11, 2012 4:30 PM Cybersecurity Legislation and You 3384 View
Tuesday, September 11, 2012 4:30 PM Foundations for Software Assurance 3385 View
Tuesday, September 11, 2012 4:30 PM Actionable Open-Source Intelligence for Emerging Threats 3386 View
Tuesday, September 11, 2012 4:30 PM 2012 Verizon Data Breach Investigations Report Results and Analysis 3387 View
Tuesday, September 11, 2012 4:30 PM Mobile Enterprise Apps: Navigating the Risks and Threats 3387 View
Tuesday, September 11, 2012 4:30 PM Conducting Risk Assessments in an Age of Advanced Persistent Threats: NIST Special Publication 800-30, Revision 1 3388 View
Wednesday, September 12, 2012 8:00 AM Keynote Address - Robert Gates 4000 View
Wednesday, September 12, 2012 12:00 PM Law Enforcement/Military Appreciation Day Luncheon (Included in Full Registration and Wednesday’s Single Day registration. Additional tickets available for purchase.) 4001 View
Wednesday, September 12, 2012 7:00 PM ASIS Foundation Night at the Field House (Additional Fee Required) 4002 View
Wednesday, September 12, 2012 11:00 AM Organizational Resilience Management Standard - Case Studies 4101 View
Wednesday, September 12, 2012 11:00 AM Integrator Series: Design Your Best Physical Security Solution for the Corporate Security Campus 4102 View
Wednesday, September 12, 2012 11:00 AM Elevating Your Game: What the Security Professional Should Know about Strategy 4103 View
Wednesday, September 12, 2012 11:00 AM Understanding Islam: History and Radicalization – Part II, How does it affect YOU? 4104 View
Wednesday, September 12, 2012 11:00 AM Trends in Law Enforcement and Private Security Partnerships 4105 View
Wednesday, September 12, 2012 11:00 AM Guns in the Workplace 4106 View
Wednesday, September 12, 2012 11:00 AM Security Visionaries Explore Best Practices for Today and Plans for Tomorrow 4107 View
Wednesday, September 12, 2012 11:00 AM Current and Future Technologies for Homeland Security Professionals 4108 View
Wednesday, September 12, 2012 11:00 AM Do Homeland Security Measures Undermine Civil Liberties and Civil Rghts? 4109 View
Wednesday, September 12, 2012 11:00 AM Building an Effective Information Systems Security Program 4110 View
Wednesday, September 12, 2012 11:00 AM The Evolving Role of the CSO 4111 View
Wednesday, September 12, 2012 11:00 AM Security's Role in Enterpise Risk Management 4112 View
Wednesday, September 12, 2012 11:00 AM How to Conduct Travel Security Training for Your Employees 4113 View
Wednesday, September 12, 2012 11:00 AM Reinventing Security at the Pentagon 4114 View
Wednesday, September 12, 2012 11:00 AM Best Practices for Cybervetting and Open-source Intelligence 4115 View
Wednesday, September 12, 2012 11:00 AM Regional Planning for Catastrophies 4116 View
Wednesday, September 12, 2012 11:00 AM Military and Law Enforcement Transitions: Strategies for Success 4118 View
Wednesday, September 12, 2012 11:00 AM The Federal Protective Service: A Partner in Private Sector Security 4119 View
Wednesday, September 12, 2012 11:00 AM Information Technology Security Council: Key Components of Enterprise Security Risk Management 4121 View
Wednesday, September 12, 2012 10:00 AM CSO Roundtable: Distinguished Speaker Series - Robert Gates 4150 View
Wednesday, September 12, 2012 11:00 AM CSO Roundtable: You're the New CSO - Now What? 4151 View
Wednesday, September 12, 2012 11:00 AM Architecting and Building a Trusted Cloud 4180 View
Wednesday, September 12, 2012 11:00 AM Data Loss Prevention (DLP): Things to Consider Before you Deploy 4181 View
Wednesday, September 12, 2012 11:00 AM Software Assurance in the Mobile Cloud 4182 View
Wednesday, September 12, 2012 11:00 AM The Perils and Pitfalls of BYOD - A Panel Discussion 4183 View
Wednesday, September 12, 2012 11:00 AM European Data Privacy Rules: What Your Need to Know 4184 View
Wednesday, September 12, 2012 11:00 AM Tokenization - Challenges and Impact on PCI Compliance 4184 View
Wednesday, September 12, 2012 11:00 AM Under-Utilized Methods for Mitigating the Insider Threat 4186 View
Wednesday, September 12, 2012 11:00 AM Leveraging the Social Network as an Attack Platform 4187 View
Wednesday, September 12, 2012 1:45 PM Auditing for improvement: Security, Risk, and Resilience Audits 4201 View
Wednesday, September 12, 2012 1:45 PM Integrator Series: Consult and Collaborate for Success! 4202 View
Wednesday, September 12, 2012 1:45 PM What Have You Done For Us Lately? Using a Process to Deliver Valued Results – Now! 4203 View
Wednesday, September 12, 2012 1:45 PM Dangerous Territory: The Consumerization of Physical Security and IT Services 4204 View
Wednesday, September 12, 2012 1:45 PM I Hacked Your Network : Assessing Risks and Applying Standards 4205 View
Wednesday, September 12, 2012 1:45 PM How to Think Like a Vulnerability Assessor 4206 View
Wednesday, September 12, 2012 1:45 PM Human Trafficking: Your Role in the Private Sector Response 4207 View
Wednesday, September 12, 2012 1:45 PM Hospital Emergency - Officers Down! 4208 View
Wednesday, September 12, 2012 1:45 PM Anatomy of a Bombing: How One Business Responded 4209 View
Wednesday, September 12, 2012 1:45 PM Supervisory Inertia: A Key Component Leading to Aggressive & Violent Behavior in the Workplace 4210 View
Wednesday, September 12, 2012 1:45 PM Threat Detection: Prevention vs. Mitigation 4211 View
Wednesday, September 12, 2012 1:45 PM Decoding Mexico: Understanding The Risks Facing Business Travelers 4212 View
Wednesday, September 12, 2012 1:45 PM Strategies for a Catastrophic World 4213 View
Wednesday, September 12, 2012 1:45 PM Interviewing in the Corporate World 4214 View
Wednesday, September 12, 2012 1:45 PM Cyber Proxies, Hacktivists, and Militia 4215 View
Wednesday, September 12, 2012 1:45 PM Community Based Policing: How Law Enforcement and Neighborhood Watches can work together to Build Safer Communities 4216 View
Wednesday, September 12, 2012 1:45 PM From Field to Fork: Defending the Global Food Supply Chain 4217 View
Wednesday, September 12, 2012 1:45 PM Your Business Only Better: Leveraging Video Infrastructure to Increase Customer Engagement, Maximize ROI, and Grow Your Business 4218 View
Wednesday, September 12, 2012 1:45 PM Information Technology Security Council Series: Using Mobile Devices and Wireless Access in Physical Security 4221 View
Wednesday, September 12, 2012 1:45 PM CSO Roundtable: Where Organizational Resilience Meets Crisis Management 4250 View
Wednesday, September 12, 2012 1:45 PM The SOC in the Sky 4280 View
Wednesday, September 12, 2012 1:45 PM Talking With Lawyers About Information Security 4281 View
Wednesday, September 12, 2012 1:45 PM Penetration Testing Demystified 4282 View
Wednesday, September 12, 2012 1:45 PM Enterprise Insecurity: Personal Mobile Devices Collide with the Cloud 4283 View
Wednesday, September 12, 2012 1:45 PM Legal processes as infrastructure attacks- script kiddies with law degrees 4284 View
Wednesday, September 12, 2012 1:45 PM Security Threat Intelligence: Evaluation And Response 4286 View
Wednesday, September 12, 2012 1:45 PM Sharing information about Malware with MAEC and CybOX 4287 View
Wednesday, September 12, 2012 1:45 PM Mobile Security and the Collision of Federal Compliance Standards 4288 View
Wednesday, September 12, 2012 3:30 PM Integrator Series: Build Your Best Project Team: The Art of Critical Decision Making in Security 4302 View
Wednesday, September 12, 2012 3:30 PM SESSION CANCELLED - No Badge? Preparing For a Transition to the Private Sector. 4305 View
Wednesday, September 12, 2012 3:30 PM The 2012 Republican National Convention: Creating a Successful Private and Government Partnership 4306 View
Wednesday, September 12, 2012 3:30 PM Critical Incidents in Higher Education: The Case for an Intelligent Response 4308 View
Wednesday, September 12, 2012 3:30 PM Creating a Security Conscious Corporate Culture 4309 View
Wednesday, September 12, 2012 3:30 PM White Collar Crime and Espionage – Victimless Crimes? 4310 View
Wednesday, September 12, 2012 3:30 PM Enterprise Level Situational Awareness: Convergence and Response in the Workplace 4311 View
Wednesday, September 12, 2012 3:30 PM Countering Competitive Intelligence: Going Beyond Locks and Firewalls 4312 View
Wednesday, September 12, 2012 3:30 PM Strategies For Combating Boko Haram in Nigeria 4313 View
Wednesday, September 12, 2012 3:30 PM The Role of Due Diligence in Selecting Data Service Providers 4314 View
Wednesday, September 12, 2012 3:30 PM Developing A Corporate Aviation Security Plan 4315 View
Wednesday, September 12, 2012 3:30 PM Information Technology Security Council Series: Digital Forensics 4321 View
Wednesday, September 12, 2012 3:30 PM Cloud Control: Assurance in a Massively Scalable World 4380 View
Wednesday, September 12, 2012 3:30 PM Enterprise Security Architecture 4381 View
Wednesday, September 12, 2012 3:30 PM A Practitioners Guide to Quantifying IT Risk. 4381 View
Wednesday, September 12, 2012 3:30 PM Application Security - Defense in Depth 4382 View
Wednesday, September 12, 2012 3:30 PM Mobile Security (not MDM) - Understanding the Real Risk 4383 View
Wednesday, September 12, 2012 3:30 PM Software Security Risk Rises Along with Android 4383 View
Wednesday, September 12, 2012 3:30 PM Checklist for Addressing Compliance Mandates 4384 View
Wednesday, September 12, 2012 3:30 PM Cyber Threat Intelligence Value; The Paradigm Has Shifted 4386 View
Wednesday, September 12, 2012 3:30 PM Beyond Signatures: Heuristics and Non-Persistence 4387 View
Wednesday, September 12, 2012 3:30 PM Is the US Already Engaged In Cyber War 4388 View
Thursday, September 13, 2012 8:00 AM Creating Value Through Collaboration of Traditional and Information Security 5000 View
Thursday, September 13, 2012 9:30 AM Inside Politics: The White House and the Race to 2012 5001 View
Thursday, September 13, 2012 10:45 AM The Challenges of Social Unrest: Identifying and Preparing for Threats 5002 View
Thursday, September 13, 2012 12:00 PM Closing Luncheon with Dr. Neil deGrasse Tyson 5003 View
Monday, September 10, 2012 10:00 AM Presentation Park Demo: AK9I PD01 View
Monday, September 10, 2012 11:00 AM Presentation Park Demo: K2 Solutions, Inc. PD02 View
Monday, September 10, 2012 12:00 PM Presentation Park Demo: Stapleton Group PD03 View
Monday, September 10, 2012 1:00 PM Presentation Park Demo: AK9I PD04 View
Monday, September 10, 2012 2:00 PM Presentation Park Demo: Stapleton Group PD05 View
Tuesday, September 11, 2012 10:00 AM Presentation Park Demo: AK9I PD06 View
Tuesday, September 11, 2012 11:00 AM Presentation Park Demo: K2 Solutions, Inc. PD07 View
Tuesday, September 11, 2012 12:00 PM Presentation Park Demo: Stapleton Group PD08 View
Tuesday, September 11, 2012 1:00 PM Presentation Park Demo: AK9I PD09 View
Tuesday, September 11, 2012 2:00 PM Presentation Park Demo: Stapleton Group PD10 View
Wednesday, September 12, 2012 10:00 AM Presentation Park Demo: AK9I PD11 View
Wednesday, September 12, 2012 11:00 AM Presentation Park Demo: K2 Solutions, Inc. PD12 View
Wednesday, September 12, 2012 12:00 PM Presentation Park Demo: Stapleton Group PD13 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: Protecting Hospital Staff, Patients and Visitors with a Mobile Duress Alarm System PP01 View
Wednesday, September 12, 2012 1:45 PM Poster Presentation: Deciphering Camera Specifications PP02 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Training Programmers on Secure Coding in the Enterprise PP03 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: The New Politics of Background Checks: How Legislation, Social Policy, and the Courts Are Changing the Way You Screen PP04 View
Wednesday, September 12, 2012 1:45 PM Poster Presentation: Securing Remote Substations for a Smarter Grid: A New Approach to Situational Intelligence and Incident Response PP05 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Detection and Interdiction of Wireless Threats and Vulnerabilities PP06 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: The Convergence of Physical and IT Security PP07 View
Wednesday, September 12, 2012 1:45 PM Poster Presentation: Understanding Full Incident Management PP08 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Information Assett Protection PP09 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: Postal Inspection Service: Delivering Trust, Delivering Justice - 2012 and Beyond PP10 View
Wednesday, September 12, 2012 1:45 PM Poster Presentation: Protecting Sensible Data in Public Cloud Enviroments PP11 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Premises Liability: A Trial Lawyer's Hints for the Security Professional PP12 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: Enhance Your Leadership Skills PP13 View
Wednesday, September 12, 2012 1:45 PM Poster Presentation: So You Want To Teach: Life After Retirement PP14 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: Call in the SWOT Team! PP16 View
Wednesday, September 12, 2012 1:45 PM Poster Presentation: Enterprise Security in the World of WikiLeaks PP17 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Securing Big Data in the Cloud PP18 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: Guard of the Future - A Reality Check PP19 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Global Screening and Compliance: An Eyes Wide Open Approach to Global Screening Best Practices PP20 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: An Introduction To Homeland Security PP21 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Begin With The Auditors In Mind PP22 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: How to Do Classified Work for the U.S Government - Parkway Patriots or Beltway Bandits PP23 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Out of the Boardroom, into the Classroom: Information Security in Higher Education PP24 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: Psychological First Aid: Addressing the Human Aspect of Crisis PP25 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Engineering Reality with Emerging Technology - Simulations for Security and Resiliency PP26 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: Security Officer Deployment: Strategies for Maximizing the Effectiveness of Security Personnel PP27 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Data-Driven Decision Making for Security PP28 View
Tuesday, September 11, 2012 1:45 PM Poster Presentation: Multidisciplinary Risk Management Implementation Strategies That Work PP29 View
Monday, September 10, 2012 1:45 PM Poster Presentation: Performance on the Edge: The Role of Megapixel Technology in Designing More Intelligent Video Surveillance Systems PP30 View
Wednesday, September 12, 2012 1:45 PM Poster Presentation: Mobile Applications for Smartphones PP31 View
Monday, September 10, 2012 10:00 AM Solutions Theater: Detect, Assess, and Respond with PSIM+ ST101 View
Monday, September 10, 2012 11:00 AM Solutions Theater: Locking Opportunities In The Healthcare Market ST102 View
Monday, September 10, 2012 1:30 PM Solutions Theater: Virtualizing Safety and Security Solutions ST103 View
Monday, September 10, 2012 2:30 PM Solutions Theater: Alerts And Analytics: Face Recognition Technology for Video Screening and Operational Intelligence ST104 View
Tuesday, September 11, 2012 10:00 AM Solutions Theater: Wireless Communications for Security, Surveillance, and Situational Awareness ST201 View
Tuesday, September 11, 2012 11:00 AM Solutions Theater: MOBOTIX: The HiRes Video Company ST202 View
Tuesday, September 11, 2012 1:30 PM Solutions Theater: Media Services Proxy for IP Surveillance Deployments ST203 View
Tuesday, September 11, 2012 2:30 PM Solutions Theater: Unified Incident Management ST204 View
Tuesday, September 11, 2012 3:30 PM Solutions Theater: The Locking World Converges with Access Control: A Growth Strategy ST205 View
Wednesday, September 12, 2012 9:00 AM Tech Talk: Federal Credentialing Standards and You TT01 View
Wednesday, September 12, 2012 9:30 AM Tech Talk: PSIM: Managing your Physical Security Data TT02 View
Wednesday, September 12, 2012 10:15 AM Tech Talk: Welcome to the Matrix: Command Center and Central Station Management through Automation TT03 View
Wednesday, September 12, 2012 10:45 AM Tech Talk: Managing your assets and entries: High Assurance Credentialing and Authentication TT04 View
Wednesday, September 12, 2012 11:15 AM Tech Talk: Facial Recognition and Mobility TT05 View
Wednesday, September 12, 2012 1:15 PM Tech Talk: Synopsis and How to Overcome Unconventional Threats TT06 View
Wednesday, September 12, 2012 1:45 PM Tech Talk: Advanced Video Analytics and Recognition Technologies for Security TT07 View
Wednesday, September 12, 2012 2:30 PM Tech Talk: Shrinking Physical Security Costs: Managed Video as a Service TT08 View
Wednesday, September 12, 2012 3:00 PM Tech Talk: Advanced Video Management: Making the Content Work for You. TT09 View

Content