2. Counterfeit Currency
Upcoming SlideShare
Loading in...5

2. Counterfeit Currency






Total Views
Views on SlideShare
Embed Views



0 Embeds 0

No embeds



Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

    2. Counterfeit Currency 2. Counterfeit Currency Document Transcript

    • Security Canada Central Conference Sessions Wednesday October 22, 2008 1. Integration Services for the Intelligent Environment The Intelligent Environment implies a fully connected organization - it is how the organization communicates, collaborates, serves its customers and other stakeholders, and protects its infrastructure, information and assets. Using consulting, technology, products and services, today's service providers can enhance the organization's human experience by providing that connectivity which brings people together – voice, video, data and services. Security (including identification) is a key element of this new intelligent design. In this session, the speaker will explore recent trends, experiences and industry offerings. Speaker: John Sheridan, Director, Security Solutions, Nortel Networks Time & Room 9-10am – Pinsent 1 2. Counterfeit Currency Canada’s record as one of the worst industrialized nations for currency counterfeiting is a concern for the Bank of Canada, the RCMP, Police Agencies, Retailers, and Financial Institutions across Canada. The Bank of Canada believes that the best way to fight counterfeiting is with education and awareness. Learn quick and easy tips on how to protect yourself from getting counterfeit currency. Speaker: Manuel E. Parreira, Senior Regional Representative (Currency), Bank of Canada Time & Room 9-10am – Pinsent 2
    • 3. HTCIA The Real CSI: What is digital forensics? (An introductory talk on digital forensics) Each digital forensic investigation involves a set of formal processes; acquisition, analysis, and reporting. This presentation will provide the audience with an overview of what exactly takes place during a typical investigation. The presenters will walk through a fictitious case study in order to demonstrate the various engagement phases, software tools, and investigative techniques commonly used by forensic investigators. Speakers: Joe Coltson, Sr. Manager, KPMG’s Forensic Technologies Services and Joel Bowers, Forensic Technology Consultant, KPMG Time & Room 9-10am – Pinsent 3 4. The Convergence of Physical and Information Security Organizations in Canada are adopting holistic risk management strategies to protect their stakeholders, constituencies, resources and assets regardless of their traditional functional areas of responsibility. No longer does the CSO consider alarm systems, video, application access or network audits in isolation. In response, industry now delivers comprehensive solutions, which address issues, problems and business objectives as opposed to delivering only technology or people-based services. In this session, the speaker will explore recent trends and experiences. Speakers: John Sheridan, Director, Security Solutions, Nortel Networks Time & Room 10:15-11:15am – Pinsent 1
    • 6. Kon-Ver-Jenz otherwise known as Convergence Effective perimeter security is no longer the exclusive domain of the most highly visible elements of critical infrastructure, but increasingly extends to where we work and play. It is essential to find new techniques that enable high levels of awareness without breaking the budget. Multi-layer sensor networks tie existing sensor systems with new systems, to create highly accurate, highly optimized protection network that is scalable and able to communicate with approved stakeholders. This architecture will promote force projection (do more with less) and allow security managers to easily adopt new security technology in the future. Speaker: Rob Welton, Director for Homeland Security, Magal Senstar, Inc. Time & Room 10:15-11:15am – Pinsent 3 7. Networking, DVR Selection and Video Over IP The ever-expanding Security Industry is currently in the midst of an unprecedented technological shift. With the integration of Internet Protocol (IP) products into every aspect of the Industry, from CCTV and audio to access and control, the future is here. Now, more than ever, keeping up with cutting edge technology is paramount to success. Proper training makes sure you stand out to your customers as a future-friendly company, and one that will be able to service their needs. ADI-Burtek is proud to offer the PTSO certification program. Take advantage of our technical expertise, providing you with a much higher level of comfort with IP and networking technologies. Speaker Don Maxey, System Sales Representative, ADI-Burtek Time & Room 11:30-13:45pm – Pinsent 1
    • 8. Best Practices for IP Implementations Organizations are now realizing the inherent benefits of IP Network Video Surveillance systems and implementations are underway. But often questions arise during implementation. This session will reveal best practices for IP implementations, offer tips for success and outline pitfalls to avoid. Key technologies such as Power Over Ethernet (POE), UPS, network security, network topology, video compression and storage will be looked at. This session will also offer insight on the similarities and differences between IP and analog including the physical aspects of both systems and provide attendees an understanding of IP terminology. Speaker: Robert Moore, Axis Time & Room 11:30-12:30pm – Pinsent 2 9. HTCIA The world of Internet: How modern communications tools like Facebook and Instant Messaging have changed the way an investigation is conducted? Social networking sites like Facebook have become huge repositories of data just waiting to be tapped by forensic investigators. A lax privacy setting on a Facebook page makes it a trivial process to obtain all of a suspect’s personal details and social relationship information. The presentation will also discuss how instant messenger logs can be useful in discovering more intimate details about the subject once an overview has been created from the social networking site information. Speaker: Nick Johnston, Forensic Analyst, KPMG Time & Room 11:30-12:30pm – Pinsent 3
    • 10. The True Cost of Ownership of an IP-Based Solution A Cost Analysis of Deploying an IP Access Control Solution vs. an Analog System. Software-as-a-Service (SaaS) over traditional server licensing has swept through numerous sectors of the economy, and is producing substantial savings for a wide variety of users in physical security. Integrators and end users should evaluate the SaaS option in IP-based access control over traditional server- based systems. This presentation provides a detailed comparison between a SaaS and a server-based access control system, showing that the SaaS solution offers a 70%+ long-term cost advantage over a server-based system. Speaker: Steve Van Till, President and COO, Brivo Systems, LLC Time & Room 12:45-13:45pm – Pinsent 2 11. Power Solutions When the Power Goes Out No Power = No Security. To ensure your security systems continue to operate when you need them most, during power outages or power fluctuations; uninterruptible power supplies (UPS) and backup power solutions should be a key component in every system. From indoor UPS solutions and ruggedized outdoor solutions for harsh environments to solar energy integrated and hybrid solutions, Alpha Technologies has a power solution to meet your requirements. Speaker Rob Moore, Regional Sales Manager, Alpha Technologies Ltd. Time & Room 12:45-13:45pm – Pinsent 3
    • 12. Surveillance Upgrades: How to Strategically Deploy IP without replacing all of your Existing Analog Systems While the advantages of IP-based video systems are clear, the risk and cost of a complete replacement are forcing security managers to resort to piecemeal upgrades. Strategic deployments over time can help reduce, rather than increase, system complexity and ensure a smooth transition throughout the infrastructure. Speaker: Paul Zsbedics, Director of Business Development for American Dynamics, Tyco Fire & Security Time & Room 14:00-15:00pm – Pinsent 1 13. Making ROSI Rosier Return On Security Investment (ROSI) is often cited as a way for IT professionals to justify expenditures on IT security solutions. While the concept is sound in theory, in reality it too often relies on guesswork and estimation which ultimately undermines its value. To bring real value to the concept of ROSI, standardized values, akin to the actuarial tables used by insurance companies, are needed. Achieving this will require commitment from vendors, clients and standards bodies but the value of the output is easily worth the initial expenditure of effort. Speaker: James Quin, Senior Research Analyst, Info-Tech Research Group Time & Room 14:00-15:00pm – Pinsent 2
    • 14. The Impact of New Security Legislation and Regulation The Private Security and Investigations Services Act, 2005 (PSISA) was proclaimed on August 23, 2008, and is now law in Ontario. The purpose of this new act is to strengthen the professional requirements and to enhance public safety. Previously unlicensed security guards and private investigators employed by the in-house sector now have to obtain their licenses. To see how the University Health Network is coping with all the change Todd Milne addresses the impact to in-house programs. Speaker: Todd Milne, Senior Manager of Security, University Health Network Time & Room 14:00-15:00pm – Pinsent 3 15. The New Economics of Deploying High Definition Video The application of High Definition technology to the security industry revolutionizes the way that security professionals are able to analyze surveillance footage. High Definition display technology allows users to realize the full benefits of High Definition (megapixel) cameras. The most recent generation of High Definition technology breaks down the barriers, which to date, have prevented economical High Definition recording and display from becoming a reality. This newly emerged technology can now resolve the barriers to adoption in the market place. Speaker: Mark S. Provinsal, Vice President of Strategic Marketing and Products, Dedicated Micros, Inc. Time & Room 14:00-15:00pm – Pinsent 4
    • 16. The Changes to S561 Amendment #2 and how this will impact AHJs, End Users, and ULC Listed Companies CAN/ULC-S561-03 has had some changes to the scope of the Standard that will impact the industry in how ULC Certificates will be issued by ULC starting Jan. 2009. Once Amendment #2 is published it will allow existing and new companies to continue to issue ULC Certificates on Fire Alarm/Sprinkler Alarm Systems monitoring installations as Level 1 or Level 2 Service. An explanation of how this works will be discussed during this presentation. Speaker: Alan N. Cavers, Area Manager, Fire & Security Systems Group, Underwriters’ Laboratories of Canada Time & Room 15:15-16:15pm – Pinsent 1 17. Why is Everyone Migrating to Intelligent IP Video Surveillance: Technology, Security, Cost The presentation will review the technological advantages of IP video surveillance, why non-proprietary open architecture systems are important, video analytics and the value of intelligent video delivery, and the implications for scaling and managing large video surveillance systems. The presentation will emphasize the enhanced security and reduced costs enabled by intelligent IP video surveillance, and realized throughout an implementation. It will also speak to the migration path IP provides, preserving existing investment, and the value delivered as IP systems provide the opportunity to maximize and integrate new technologies in the future. Speaker: Jason Glover, Regional Sales Manager, OnSSI Time & Room 15:15-16:15pm – Pinsent 2
    • 19. Reduce Shrinkage & Drive Profitability through Video Surveillance Shrinkage can have severe impacts on retail profitability, potentially representing a loss of up to 2% of total gross sales. With an Open IP-based system, retailers can integrate third-party applications, leverage existing install bases, improve overall operational efficiency, and ensure the safety of customers and personnel, while protecting company assets. Speaker: Michel Chalouhi, Director of Product Management, Genetec Time & Room 15:15-16:15pm – Pinsent 4