Securing Critical Infrastructure in an Evolving Threat Environment
View in a browser

 
 

The Strain of Climate Change

A new analysis by the International Military Council on Climate and Security warns of the compounding security threats posed by the convergence of climate change and other global risks, like COVID-19. But there is still time for security personnel, including the defense industrial complex, to act to become more resilient to these future threats. This and more are explored in the August Critical Infrastructure issue of Security Technology.

Read More

.

Sponsored Content

 
Alternate text

HID Signo Readers – Performance You Can Count On

Future-proof your access control strategy today with the signature line of access control readers from HID Global. HID Signo™ Readers deliver unparalleled performance, OSDP support out of the box, as well as supports the widest range of credential technology. What does this mean for you? Out-of-the-box mobile access capabilities, easy migration from Wiegand to OSDP and the ability to upgrade at your own pace. 

Learn More

.

An Increasingly Connected ICS

Organizations shifted how they conduct business in 2020 to include an increasingly connected industrial environment, Dragos, Inc., found in its Year in Review.

Read More

 

Building a More Secure Federal Enterprise

To raise the bar of cybersecurity across the U.S. federal government, CISA launched the Cyber Shared Services Marketplace.

Read More

Sponsored Content

 
Alternate text

Tired of FALSE Motion Alarms? Speco is!

Speco’s Vehicle & Human Detection ignores false triggers and only alerts you to motion that matters! Speco’s analytic cameras and recorders with Vehicle and Human Detection can notify you of people, cars, trucks, and bikes in the scene and ignore everything else such as animals and precipitation. Alarms can be triggered if the selected detector enters the view or a predefined region. Alarms can also be tailored to trigger upon entrance or exit of region.

Learn More

.

The Next Target: The Agriculture Supply Chain

Cyberattacks on the agriculture supply chain, like that against JBS, can cause prices to soar, demand to increase, and supply to wane.

Read More

 

Protecting the Bulk Power System

The North American power grid is a network of networks that encompasses power generation, transmission, and distribution. Protecting it from cyber and physical attacks is an around-the-clock responsibility.

Read More

Sponsored Content

 
Alternate text

How Old Is Your Access Control System?


Maintaining a legacy access control system is time-consuming and expensive. And while it continues to protect your people and assets, it exposes you to new threats, such as cyberattacks, and can’t keep up with your organization’s changing needs.

Learn more

.

Key Lessons from the Colonial Pipeline Attack

Long-standing assumptions about air-gapping can make Operational Technology networks vulnerable.

Read More

 

Toasting with Caution

Adulterated liquor is a major problem. Here’s how Europol and INTERPOL are working to combat it.

Read More

 

Help Wanted to Secure Critical Infrastructure

There is a growing need for young professionals in the critical infrastructure sector.

Read More

Facebook LinkedIn Twitter Instagram YouTube

ASIS International

Unsubscribe

If you have questions, please contact Member Services at asis@asisonline.org or +1.703.519.6200 (Monday - Friday 9:00 am - 5:00 pm ET) or via 1625 Prince Street, Alexandria, VA 22314 USA.

ASIS International values the privacy and integrity of our members, partners, attendees, exhibitors, and sponsors, and we do not sell, nor do we provide it to third-party vendors for distribution. View privacy Policy.