SlideShare a Scribd company logo
1 of 1
Download to read offline
Security Industry Association
www.securityindustry.org
SECURITYPROJECTMANAGEMENT
SPM
Rex Allen
Securadyne Systems, Inc.
Bob Brewer
Tyco Integrated Security
Benjamin Butchko
Butchko, Inc.
Anthony Caputo
Hitachi Data Systems
Desiree Carter
SecureXperts Inc.
Keith Cohick
Advanced Digital Solutions, LLC
Ray Coulombe
SecuritySpecifiers
Bob Cullum
Dugmore & Duncan
Mel Gedruj
V2PM Inc.
Fred Harris
Datacom Design Group
John Hopper
Facebook
John Hunepohl
ASSA ABLOY
Tracy Larson
WeSuite
Philip Lisk
Bergen County Sheriff’s Office (NJ)
Rick Molik
Security Control Systems, Inc.
S. Steven Oplinger
Integrated Fire & Security Solutions, Inc.
David G. Patterson
Patterson & Associates International
David Pedreira
ASSA ABLOY
Charlie Pierce
LeapFrog Training & Consulting
Frank Pisciotta
Business Protection Specialists, Inc.
Bill Savage
Security Control Systems, Inc.
Rodger Schmidt
ASSA ABLOY
Aaron Smith
ASSA ABLOY
J. Kelly Stewart
Newcastle Consulting, LLC
Steve Surfaro
Axis Communications
Bethany Taylor
Dakota Security Systems, Inc.
Pierre Trapanese
Northland Controls Systems, Inc.
Darnel Washington
SecureXperts Inc.
Rodney Weaver
ASSA ABLOY
Many Thanks to the SIA Education and
Training Subject Matter Experts
For providing their time and expertise for the development of security project management
curriculum. Your contributions will have a far-reaching and lasting impact on the industry.

More Related Content

What's hot

vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISOStephen Cobb
 
Christopher Getner - Integration of Information Governance With Security - Th...
Christopher Getner - Integration of Information Governance With Security - Th...Christopher Getner - Integration of Information Governance With Security - Th...
Christopher Getner - Integration of Information Governance With Security - Th...ARMA International
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareDomen Savič
 
William gregorian SaltConf19
William gregorian SaltConf19William gregorian SaltConf19
William gregorian SaltConf19William Gregorian
 
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsIBM Security
 
A Perfect Storm: More Security Threats and More Compliance Costs
A Perfect Storm: More Security Threats and More Compliance CostsA Perfect Storm: More Security Threats and More Compliance Costs
A Perfect Storm: More Security Threats and More Compliance CostsTripwire
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Information Security for Business Leaders - Eric Vanderburg - JurInnov
Information Security for Business Leaders - Eric Vanderburg - JurInnovInformation Security for Business Leaders - Eric Vanderburg - JurInnov
Information Security for Business Leaders - Eric Vanderburg - JurInnovEric Vanderburg
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
Security Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesSecurity Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesJoshua Berman
 
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...AugmentedWorldExpo
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantJohn Bedrick
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyTripwire
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 

What's hot (17)

vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
What Makes a Good CISO
What Makes a Good CISOWhat Makes a Good CISO
What Makes a Good CISO
 
Christopher Getner - Integration of Information Governance With Security - Th...
Christopher Getner - Integration of Information Governance With Security - Th...Christopher Getner - Integration of Information Governance With Security - Th...
Christopher Getner - Integration of Information Governance With Security - Th...
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
 
William gregorian SaltConf19
William gregorian SaltConf19William gregorian SaltConf19
William gregorian SaltConf19
 
SolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event ManagerSolarWinds Presents Compliance with Log and Event Manager
SolarWinds Presents Compliance with Log and Event Manager
 
Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
A Perfect Storm: More Security Threats and More Compliance Costs
A Perfect Storm: More Security Threats and More Compliance CostsA Perfect Storm: More Security Threats and More Compliance Costs
A Perfect Storm: More Security Threats and More Compliance Costs
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Information Security for Business Leaders - Eric Vanderburg - JurInnov
Information Security for Business Leaders - Eric Vanderburg - JurInnovInformation Security for Business Leaders - Eric Vanderburg - JurInnov
Information Security for Business Leaders - Eric Vanderburg - JurInnov
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
Security Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory ChangesSecurity Kung Fu: Active Directory Changes
Security Kung Fu: Active Directory Changes
 
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
Tony Hodgson (Brainwaive): Your Enterprise is Under Attack: Cyber Security Es...
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being Compliant
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security Literacy
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 

Similar to SIA-SDI AD

Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportRamona Kohrs
 
TECHEXPO 2011
TECHEXPO 2011TECHEXPO 2011
TECHEXPO 2011cdinzes
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesCarlo Pelliccioni, CISSP
 
Hacktive Security - IT Security Services
Hacktive Security - IT Security ServicesHacktive Security - IT Security Services
Hacktive Security - IT Security ServicesFrancesco Mormile
 
The Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
The Core Enterprise Infrastructure Vision for Delivering DX Value at ScaleThe Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
The Core Enterprise Infrastructure Vision for Delivering DX Value at ScaleYokogawa1
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseTechSoup
 
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile DevicesDecrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile DevicesBlueboxer2014
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityAnthony Dials
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency SolutionsAnthony Dials
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business SolutionsAnthony Dials
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Deloitte-fast-500-2014-winners'-brochure-121114
Deloitte-fast-500-2014-winners'-brochure-121114Deloitte-fast-500-2014-winners'-brochure-121114
Deloitte-fast-500-2014-winners'-brochure-121114Yaphett Powell
 

Similar to SIA-SDI AD (20)

Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
 
TECHEXPO 2011
TECHEXPO 2011TECHEXPO 2011
TECHEXPO 2011
 
Tets2012
Tets2012Tets2012
Tets2012
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Hacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking ServicesHacktive Security - Ethical Hacking Services
Hacktive Security - Ethical Hacking Services
 
Hacktive Security - IT Security Services
Hacktive Security - IT Security ServicesHacktive Security - IT Security Services
Hacktive Security - IT Security Services
 
The Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
The Core Enterprise Infrastructure Vision for Delivering DX Value at ScaleThe Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
The Core Enterprise Infrastructure Vision for Delivering DX Value at Scale
 
Tets 2010
Tets 2010Tets 2010
Tets 2010
 
TECHEXPO 2012
TECHEXPO 2012TECHEXPO 2012
TECHEXPO 2012
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
TMA brochure-EN
TMA brochure-ENTMA brochure-EN
TMA brochure-EN
 
Emc World Keynote Tucci
Emc World Keynote TucciEmc World Keynote Tucci
Emc World Keynote Tucci
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile DevicesDecrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent Cybersecurity
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Deloitte-fast-500-2014-winners'-brochure-121114
Deloitte-fast-500-2014-winners'-brochure-121114Deloitte-fast-500-2014-winners'-brochure-121114
Deloitte-fast-500-2014-winners'-brochure-121114
 

SIA-SDI AD

  • 1. Security Industry Association www.securityindustry.org SECURITYPROJECTMANAGEMENT SPM Rex Allen Securadyne Systems, Inc. Bob Brewer Tyco Integrated Security Benjamin Butchko Butchko, Inc. Anthony Caputo Hitachi Data Systems Desiree Carter SecureXperts Inc. Keith Cohick Advanced Digital Solutions, LLC Ray Coulombe SecuritySpecifiers Bob Cullum Dugmore & Duncan Mel Gedruj V2PM Inc. Fred Harris Datacom Design Group John Hopper Facebook John Hunepohl ASSA ABLOY Tracy Larson WeSuite Philip Lisk Bergen County Sheriff’s Office (NJ) Rick Molik Security Control Systems, Inc. S. Steven Oplinger Integrated Fire & Security Solutions, Inc. David G. Patterson Patterson & Associates International David Pedreira ASSA ABLOY Charlie Pierce LeapFrog Training & Consulting Frank Pisciotta Business Protection Specialists, Inc. Bill Savage Security Control Systems, Inc. Rodger Schmidt ASSA ABLOY Aaron Smith ASSA ABLOY J. Kelly Stewart Newcastle Consulting, LLC Steve Surfaro Axis Communications Bethany Taylor Dakota Security Systems, Inc. Pierre Trapanese Northland Controls Systems, Inc. Darnel Washington SecureXperts Inc. Rodney Weaver ASSA ABLOY Many Thanks to the SIA Education and Training Subject Matter Experts For providing their time and expertise for the development of security project management curriculum. Your contributions will have a far-reaching and lasting impact on the industry.