What Makes Security in a Campus Work; The role Social Media plays in Protecting Students

If you were unable to participate in the webinar presentation ''What Makes Security in a Campus Work; The role Social Media plays in Protecting Students'' presented on Thursday, February 19, 2015.  
For your convenience, the presentation is now available on-demand at: http://w.on24.com/r.htm?e=911824&s=1&k=D0FFAA6EB0E509FD85D1EB8FD43A9D04.  You can view it again or share it with a colleague.


Campus Security & Life Safety, Security Today & Security Products Magazine Hosts a School Safety webinar - Featuring Charlie Howell

What Makes Security in a Campus Work; and Lessons Learned from the Tragedy at Sandy Hook Elementary School
Date: Thursday, February 19, 2015        Time: 2:00 PM (ET), 11:00 AM (PT)


Mr. Howell will speak about security projects where the newest technology has been deployed but did the actual security level increase. It is important to establish an effective security program that connects all security elements together so that they can perform as a cohesive whole.

Chief Miller will address the lessons learned following the devastating shooting at Sandy Hook Elementary School, and how the Dallas ISD took those lessons and implemented them to protect lives in his school district.


Charlie Howell          Principle at Division 28 Consulting

Charlie has been in the security industry since 1989. Originally providing expertise as an integrator, he started as an installer and advanced his way to project engineer. In July of 2001 Charlie was vice president and consultant at a leading security firm in California providing consulting, policy and procedure development and design services for Government, Municipal, and Private Commercial Clients

Craig R. Miller          Chief of Police at Dallas Independent School District

Chief Miller assumed his position as the Chief of Police for the Dallas ISD in October 2011. Prior to this appointment Chief Miller retired as Deputy Chief of Police for the Dallas Police Department after a 30 year career. When Chief Miller retired from DPD he was assigned as the Division Commander over the Crimes Against Person’s Division. In this position he was responsible for all criminal investigations involving murders, sexual assaults, robberies, assaults and the CSI function for 1.3 million people. Prior to this position Chief Miller was a commander over the Narcotics Division, Traffic Division, Tactical Services (bomb squad) and many other DPD divisions. Chief Miller is a Master  Peace Officer with a BA degree from Memphis State University and is a graduate of the Command Management School of the Southwest Legal Foundation.


Saying goodbye to my Mentor and Friend

I think every industry has one ore more elder leaders in it that set the pace for all the younger professionals.  Elliott Boxerbaum was that great mentor in our industry and to me personally.  Elliott taught me more than how to be a consultant but how to work with integrity and honor.  Elliott and Debbie would grace Jenn and I with their time at every event we were in.  It was a couple of years ago when they stopped through California (my home at the time) to let us know of the ALS diagnosis.  I will truly miss this great man.



Two-Factor Authentication tips

Many of us often think about the security of a single key on a door that leads to one of our more critical assets.  The mental question that pops up is “What if that person loses their key and is too embarrassed to report it?”.  This is a common question that those responsible for security typically ask themselves and then the day gets busy, no losses are incurred, and the question fades away.  Fixing a single factor authentication problem is not difficult.  It doesn’t take an Iris Reader or $50,000 deployment per door to obtain a two or three factor authentication.  The simple thought is more what the second type of authentication needed is. First you should break the definition of authentication down into the basics: What you have, what you know, and who you are.  Obtaining a two factor authentication could be as basic as adding a keypad that requires a numeric pin to a keyed lock door and you have two factor authentication.  You can also obtain two factor authentication by putting a biometric and a proximity card on a door.  The Second question now comes into play….”How far do I need to take it?”.  Ask yourself who you are protecting this asset against.  Who is your threat?  The answer to this question will determine the level of two or three factor authentication will be needed to protect that particular asset and whether or not biometrics will need to be used.