Download PDF version Contact company

Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. 

Topic: Cloud Systems And Video Surveillance As A Service (VSaaS)

Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m.

Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually.

IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m.

How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics.

How participants can leverage AI and machine learning with existing customers to grow their business
One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers

Topic: Artificial Intelligence (AI) In Video And Other Systems

The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m.

Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business.

Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. 

Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms.

Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets

Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m.

Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets.

Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimize operational and cost efficiencies, April 11, 3:45 to 4:45 p.m.

How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realize other operational and performance efficiencies.

Topic: Robotics And Autonomous Devices

Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon

The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present.

Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices

How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m.

Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities.

Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m.

Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure.

Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m.

Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program.

The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m.

“Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too.

Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall
Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present

Topic: Mobile Credentials Finding Their Place In Access Control

How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m.

At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics.

Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m.

Growing user demand is driving new open platform approaches and the adoption of interoperability standards

Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment.

Topic: Facial Biometrics In Professional Solutions

How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m.

Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realize a more secure future.

Topic: Voice Control In The Smart Home Environment

Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m.

With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.

Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...