The ESA Leadership Summit will take place in Texas, from January 31 to February 3
The ESA Summit is offering registration for “Rising Leaders” to gain valuable
leadership skills and business tactics

Leadership Summit presented by the Electronic Security Association (ESA), Irving, Texas, has penned the slogan: “Link. Learn. Lead.” for its 2016 event. Scheduled for January 31 through February 3 at the Wild Horse Pass Hotel & Casino in Chandler, Arizona, the ESA Leadership Summit is a testament to a quickly changing security landscape and the processes executives need to develop to lead their organizations more effectively.

Designed to encourage thought leadership and an exchange of ideas and strategies, the Leadership Summit features keynote speakers, interactive gatherings and networking sessions that encourage a free flow of ideas and new leadership concepts.

This year, the Leadership Summit also offers special registration for executives who want to send their “Rising Leaders” to gain valuable leadership skills as a reward for their hard work and dedication to the organization. Rising leaders can attend with senior management to learn successful new business practices and tactics.

Speakers At The Event Include:

  • Richard P. Farrell, President of Tangent Knowledge Systems, a Chicago sales training company, and the author of the book, “Selling Has Nothing To Do with Selling.”
  • Robert Harris, CAE, who has helped thousands of associations and chambers of commerce in the U.S. in developing best practices to achieve their mission and goals.
  • Gene Marks, journalist and columnist for The Washington Post, Forbes, The Huffington Post, Inc. magazine, FOX Business, Entrepreneur.com and Philadelphia magazine.
  • Matthew H. Meade, co-chair of Buchanan’s Cybersecurity and Data Protection Group, where he provides advice regarding data security breaches, information and records management and other areas regarding privacy.
  • Avish Parashar, who uses his 20-plus years of experience performing, teaching and studying improvisation comedy to show organizations and individuals how to deal with the unexpected quickly, effectively and with a sense of humor.
  • Shelley Row, Shelley Row Associates LLC, who works with leaders, managers and organizations to improve professional decision making by identifying subtle personal behaviours that may hold individuals back.
  • Dennis Snow, whose customer service abilities were honed during 20 years of tenure with the Walt Disney World Company and is currently a full-time speaker, trainer and consultant.

The speaker schedule for the ESA Summit was designed to cover a range of leadership strategies for attendees
Guest speakers will cover a range of expertise, from
cyber security to public relations

In addition, the prestigious Morris F. Weinstock Person of the Year will be announced in honor of outstanding achievement and effort on behalf of the association.

Speakers Show How To Lead

ESA Executive Committee Member Angela White, Vice President/President-elect and General Manager of Central 1 Security in Brookfield, Wisconsin, says guest speakers were strategically selected to engage all attendees, with expertise that ranges from business management and philosophy to cyber security, public relations and a diverse montage of topics. “There are so many facets of leadership that allow for growth both personally and professionally at the Leadership Summit. The speaker schedule was meticulously arranged to allow an attendee to participate in any or all of the presentations with ample time for networking,” White says.

Robert Few, Director, Time Warner Cable-IntelligentHome, Charlotte, North Carolina, who coins himself as a “zealous attendee” of the conference and is a member of the Young Security Professionals (YSP), National Company and Government Relations Committees of ESA,  says the Leadership Summit is a great forum for security companies to meet with existing vendors as well as new ones. There are also opportunities to network with other business owners to share, discover or further develop best practices and receive educational opportunities to either meet CEU requirements or simply learn how to be a stronger and more efficient leader. “I have told many colleagues that if you are going to attend one event, this is the one to go to,” Few says. “The only way you can possibly walk away without feeling empowered and confident about improving your business is if you sleep through it,” he says.


The conference offers the chance to network with other business owners to share, discover or further develop best practices and receive educational opportunities
The valuable networking opportunities at the Summit will allow attendees to
interactwith their peers and share stories and experiences

Few says he is especially excited about YSP’s participation at Summit. “The YSP council will be launching the inaugural class of ESA’s Mentorship program. This program will consist of 25 mentor/mentee pairs and will be announced and recognized during the Summit.”

New Member Finds Fit With Program

Patrick Cusick, Vice President at IQ Life Safety Systems Inc., Waterford, Michigan, is a new ESA member, having attended his first summit last year. Cusick says the networking aspect of the conference alone was valuable, and the keynote speakers and workshops provided actionable takeaways to hone his leadership skills.

“Interacting with peers from around the country, sharing stories and experiences has influenced the decisions I make and will make as a leader of my organization,” he says. “I am looking forward to reconnecting with the people I met last year and meeting new ones. ESA has done a tremendous job of getting speakers with vast experience in different fields. If you attend the presentations and participate in the workshops, you will definitely see a return on your investment.”

White adds that the Leadership Summit continues to evolve strategically to assist the security industry. “There has been an evolution since its inception. Early on, there was more of a concentration on Subject Matter Experts specific to our industry. In time there was recognition that regardless of the nature of the business, we all face the same challenges and celebrations. That acknowledgement has given the advisors more latitude in selecting speakers, which in turn has continually improved the content.”

Discount registration for the event ends December 31, 2015.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Deborah O'Mara Owner, DLO Communications

Deborah L. O’Mara, SourceSecurity.com's dealer/integrator correspondent, is a veteran of the security marketplace, having extensive experience in security, fire alarm technology and integrated systems.

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.