Security Industry Association (SIA) - Experts & Thought Leaders
Latest Security Industry Association (SIA) news & announcements
At a hearing on Sept. 16, 2025, Brett Feddersen, Chair of the Security Industry Association (SIA) Drone Security Subcommittee and vice president for strategy and government affairs at D-Fend Solutions, testified before members of Congress to discuss increasing risks from the misuse use of drones and give legislative recommendations for implementing a clear and comprehensive framework for the use of counterdrone technologies and operations across the United States. The hearing — “Unmanned and Unchecked: Confronting the Rising Threat of Malicious Drone Use in America” — focused on the growing threat posed by unauthorised and criminal use of uncrewed aircraft systems (UAS) in both domestic and international airspace. Rapid advancement of drone technology As drone technologies rapidly evolve and become ever more affordable and accessible, it is essential that policies limiting access around sensitive sites and events can be enforced and that drones used for legal and authorised purposes can be distinguished from those being used for criminal activity or potentially attacks. Along with the rapid advancement of drone technology, counter-UAS technologies have been evolving to meet these needs. Various detection technologies, such as radar, optical systems, radio communications and acoustics, allow trained security personnel to detect, track and identify drones in their airspace. Barriers to deploying counterdrone technology There are many proven ways of responding using technologies that federal agencies have fielded for many years Once a drone can be clearly identified as safe or a risk, there are many proven ways of responding using technologies federal agencies have fielded for many years; however, unnecessary barriers to deploying counterdrone technology more widely remain due to outdated laws on the books. “By taking decisive action now to modernise our laws, enhance our technological capabilities and strengthen the partnerships between all levels of government, we can ensure that our skies remain safe and that the promise of unmanned technology is never subverted by those who seek to do us harm,” said Feddersen in testimony submitted to the House Judiciary Subcommittee on Crime and Federal Government Surveillance. Awareness of drone activity Current authorities for federal agencies to detect and mitigate malicious drones are set to expire on Sept. 30, 2025, if Congress does not renew them; however, the current regime is fragmented across various federal agencies, creating confusion and potential gaps in response to incidents, especially for state and local law enforcement and trained security personnel protecting critical infrastructure. It is imperative that Congress not just renew but expand the current authorities for all federal agencies, state, local, tribal and territorial law enforcement and trained security professionals in a clear and cohesive framework to ensure that American communities can have complete air domain awareness of drone activity across the United States.
The Security Industry Association (SIA) announces the creation of a new Retail Security Advisory Board and opened a call for SIA member volunteers to join. The expert-led group will advise the association and the SIA Board of Directors on key retail security topics, work to expand SIA’s influence and expertise in this area, and advance members’ learning. Planned initiatives Planned initiatives for the Retail Security Advisory Board include: Developing retail security resources and best practices Fostering collaboration between suppliers and retail security practitioners Providing end-user thought leadership feedback on emerging technologies and related education and use cases Supporting interoperability and the development of open security standards Developing webinars, white papers, fact sheets and conference content Partnering with key retail and security stakeholders The advisory board will be led by chair Mike Dunn of Wachter and vice chair Brit Hehn of Gap. Physical security He is a valued leader at Wachter and part of the business development team Mike Dunn, strategic innovation and business development at Wachter, is an expert in physical security, with a career spanning over 20 years in computer technology, networking, IP video and access control. He is a valued leader at Wachter and part of the business development team. Prior to joining Wachter, Dunn was the chief technology officer at Prosegur, where he was instrumental in driving and executing innovative solutions that cultivated revenue through customer success. A contributor to his success is an open-platform approach to technology and partnering with best-in-class solution providers to maximise the best options for customer outcomes. As a trusted resource, Dunn leverages his expertise to prioritise customised technology solutions that are transformative to meet each client’s unique needs. Vital platform “This new advisory board provides a vital platform to unite retailers, integrators and technology providers around common goals. By fostering collaboration across the retail and security industries, we can advance best practices, explore emerging technologies and build partnerships with major retail organisations that will help us create lasting impact for retailers everywhere,” said Dunn. “I’m honoured to serve as chair and look forward to working with this group to drive practical solutions that strengthen retail security today and in the years ahead.” Asset protection She has been with Gap for 23 years, with 10 spent in asset protection operations Brit Hehn, asset protection director, stores protection, West Zone, at Gap, works with her team to support the 750 most west Gap Inc. stores (Old Navy, Gap, Banana Republic, and Athleta) and serves as the asset protection brand leader for Athleta. She has been with Gap for 23 years, with 10 spent in asset protection operations for the Old Navy brand, where she led AP technology, budgets, AP reporting, AP programs, communication and awareness and strategy, supported Old Navy’s entrance into Mexico in 2015, and led AP field efforts until the business was franchised in 2022. Hehn is a results-driven leader who loves to collaborate to solve challenging business problems, and she and her team are committed to protecting people, assets, and experiences and ensuring Gap is the safest place to work and shop. Retail Security Advisory Board SIA is looking for members and industry pioneers to join the Retail Security Advisory Board. Eligible participants include retail members of SIA’s SPARC community, retail loss prevention and asset protection professionals, security technology manufacturers and integrators, video surveillance and analytics providers, access control and RFID solution companies, and retail operations and facility managers.
The Partner Alliance for Safer Schools (PASS) has released the seventh edition of its Safety and Security Guidelines for K-12 Schools, which offers the most comprehensive information available on nationwide practices specifically for securing school facilities, from subject matter experts across the education, public safety, and industry sectors. The seventh-edition release – including updates to the Safety and Security Guidelines and the School Safety and Security Checklist – improves on previous versions of the PASS guidance to make it more comprehensive, easier to use, and more reflective of K-12 schools’ evolving security needs and challenges. PASS school security The PASS school security and safety guidelines provide school administrators, school boards, and public safety and security professionals with a road map for implementing a layered and tiered approach to enhancing the safety of school environments and a tool to prioritise needs. Provided free of charge, the guidelines have been downloaded by thousands of stakeholders and leveraged in many districts to evaluate and improve security infrastructure and procedures. New to the seventh-edition guidelines are the following features: Introduction of a new Digital Infrastructure Layer: This new layer recognises the importance of cybersecurity and attentive management of digital systems and data. The addition of this layer takes a converged approach to security, dramatically expanding PASS beyond what was primarily a domain of physical security. Unification of the Property Perimeter and Parking Lot Layers into the new Campus Perimeter Layer: PASS’s many volunteer school security experts recognised that these layers are commonly approached from a unified safety standpoint. Detailed guidance on visitor entry: In addition to traffic-flow diagrams and example floor plans, this edition also extensively covers aspects like visitor management processes. Greater content on physical hardening: From topics like door construction to security film and window glazings to reinforcement of classroom walls, the seventh-edition guidelines add greater depth of content than before on aspects of physical hardening. Expanded information on panic alarm systems: As panic alarm systems have continued to prove valuable in school emergency situations, the newest edition increases guidance on this important solution. In-depth coverage of door locks and door devices: Properly locking doors is an essential component within a school, and this version covers the complexities of school-specific lock requirements with great nuance. And more! PASS Guidelines “I’m so proud of our technical committee and the effort that went into the seventh-edition PASS Guidelines – more than a year of discussion and seeking input from school officials went into this revision,” said Chuck Wilson, chair of the PASS Board of Directors. "Integrated security and life safety solutions, combined with cloud and power over Ethernet and wireless technologies, created the need for an entirely new layer titled digital infrastructure.” “Version 7 embraces the emerging technologies while maintaining our fundamental belief that the basic and foundational methods and solutions are necessary. This is our best work yet. The updated guideline and checklist can flow directly into the threat assessment and the school district’s comprehensive safety plan.” School safety topics Since 2020, the PASS guidelines have been included on SchoolSafety.gov Since 2020, the PASS guidelines have been included on SchoolSafety.gov, the federal government’s clearinghouse for best practice information across a range of school safety topics, and in 2019, PASS was recognised by the Federal Commission on School Safety as well as in other state commissions and reports. The guidelines describe approaches within five physical layers for school facilities: districtwide, digital infrastructure, the campus perimeter, the building perimeter and the classroom/interior. Within each layer, the resource outlines key safety and security components, such as policies and procedures, people (roles and training), architectural components, communication, access control, video surveillance and detection and alarms. Latest guidelines These guidelines are designed to provide stakeholders with specific actions that can effectively raise the baseline of security, vetted security practices specific to K-12 environments, objective and reliable information on available safety and security technology, multiple options for addressing security needs, and the ability to distinguish needed and effective solutions from sales pitches or unnecessary products. The latest guidelines are available at no cost on the PASS website along with a matching checklist tool, and PASS encourages education professionals, public safety personnel, and security solutions providers to take advantage of these free resources.
Insights & Opinions from thought leaders at Security Industry Association (SIA)
March is Women in Security Month, a time dedicated to celebrating and promoting the contributions of women in the security field—particularly in cybersecurity. This observance aligns with Women’s History Month, providing an opportunity to reflect on the progress made and the work still needed to advance gender equity in security. Evolving role of women in security The security industry has witnessed a steady increase in women's participation. According to ISC2 Research in its “Women’s Role in Filling the Workforce Gap” report, women make up an estimated 20 to 25 percent of the security industry. Promisingly, younger generations are entering the profession at higher rates, with 26 percent of working professionals under 30 identifying as women. The security industry has witnessed a steady increase in women's participation The research tells us that women are thriving in a variety of roles, from engineering and system administration to sales, marketing, and project leadership. Key factors driving this transformation include mentorship programs, male allies advocating for gender equality, and cultural shifts recognising the unique perspectives and strengths women bring to security challenges. These efforts are fostering more inclusive environments and ultimately strengthening the industry. The value of diverse perspectives in security Security is not a one-size-fits-all industry—each organisation and facility has unique needs that require varied perspectives. Greater representation of women has introduced fresh approaches to problem-solving, fostering collaboration and driving innovation. By integrating diverse viewpoints, security professionals can create more effective solutions that better address end-user needs. Industry support for women’s professional growth SIA's WISF offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER Organisations like the Security Industry Association (SIA) and ASIS International have established networking platforms and initiatives to support women in security. Events such as the Security LeadHER Conference provide valuable professional development and networking opportunities. Companies are also investing in science, technology, engineering, and mathematics (STEM) initiatives, hands-on training, and recruitment programs to attract more women into the field. Additionally, SIA's Women in Security Forum (WISF) offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER, which provide pathways for engagement and growth. Challenges women in security face Despite progress, challenges remain. Many women still feel it necessary to repeatedly prove their expertise, take on additional informal responsibilities, or carefully navigate workplace dynamics. Imposter syndrome can be another hurdle, even for accomplished professionals. However, women in security are addressing these challenges by setting boundaries, advocating for themselves, and supporting one another through mentorship. By excelling in leadership and technical roles, women are reshaping outdated perceptions and advocating for more inclusive workplace policies. Steps industry pioneers can take To further support women in security, industry pioneers could: Provide targeted professional development and career advancement opportunities. Foster strong, supportive communities that recognise and mentor women. Implement structured mentorship programs that connect experienced professionals with newcomers. Promote workplace flexibility to help employees balance personal and career commitments. Actively challenge biases and advocate for meaningful change within organisations. Advice for women entering the security field Here are key pieces of advice for women considering a career in security: Own Your Expertise – Have confidence in your knowledge and skills. Seek Out Mentors & Allies – Connect with supportive professionals who can guide your career. Build a Strong Network – Join organisations like ASIS Women in Security, SIA Women in Security Forum, or Women in CyberSecurity (WiCyS), and attend industry events to expand your connections. Speak Up & Take Space – Confidently share your ideas and challenge outdated norms. Develop Resilience & Advocate for Yourself – Push past biases, demand the respect you deserve, and negotiate for fair salaries and promotions. Keep Learning & Stay Ahead – Continually build your expertise to stay competitive in the evolving security industry. The future of women in security As the security industry evolves with technological advancements and global changes, opportunities for women will continue to expand. Women are not just participating in the industry’s growth—they are shaping its future. With growing mentorship programs, male allies advocating for gender equality, and ongoing cultural shifts, the focus is no longer just on breaking barriers but on building bridges to new opportunities.
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally, that experience fits well with your business. Any enterprise experience is a plus, but local, state, and federal regulations create precise yet very different rules for securing a utility instead of a hospital. That's also true for university campuses, manufacturing facilities, and many other operations. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing Look for certifications indicative of an integrator's commitment to staying on top of industry changes. Organisations such as ASIS International and the Security Industry Association offer certifications showing an integrator's team members have mastered security principles and skills. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing. Also, ensure an integrator sells and services equipment that integrates with your current security systems. Using multiple systems for the same function is less efficient. Project update meetings Go beyond an integrator's slick brochures and websites to ask tough questions about previous experience. How would the integrator handle a hypothetical situation in one of your facilities? Ask the integrator if there will be one project manager for all jobs. And ensure that person handles all interactions with security subcontractors. Ask if the integrator provides regularly scheduled project update meetings. It's frustrating to wonder how your project is progressing. Ask if the integrator's team can work during the hours and days that result in the least interference to your daily operations. Ask for onsite system training to save time and eliminate travel costs. Gathering sensitive data Look for an integrator with proven experience working with an enterprise IT department A malfunctioning component may be more than an inconvenience – it may be a severe security threat. You need to know how quickly your integrator can respond when things go wrong. Ask about available service plans. And consider the embedded staff approach in which the integrator places employees on your site full time to handle day-to-day and emergency activities. Much of the security equipment – video, access control, intercoms, visitor management, and more – is wireless and dependent upon networks operated by your IT department. Network-based devices provide more opportunities for hackers to gather sensitive data or cause critical equipment to malfunction. Don't trust your security operations with an Integrator unfamiliar with at least basic cybersecurity principles. Look for an integrator with proven experience working with an enterprise IT department. At a minimum, ensure the integrator can set and change security device IP addresses and port locations. Certifications from providers such as Cisco, Microsoft, and IBM indicate an understanding of various IT technologies. Potential security partners Knowledgeable integrators work with the well-encrypted Open Supervised Data Protocol (OSDP), now an internationally recognised standard. Run from any integrator who suggests operating an access control system with used Wiegand technology offering no encryption between cards and readers. It's easy for hackers to capture data and clone a working credential. Technology moves at a rapid pace. Your modern system of a few years ago may be long-of-tooth. You need an integrator capable of bringing new and innovative ideas to the table. You want an integrator who conducts in-house testing of new products, not relying solely on a manufacturer's claims. You want an integrator capable of thinking outside the box to solve a complex security problem. These ideas are just a start in assessing an integrator's value to your enterprise operation. However, they will help you sort through potential security partners to find one that best meets your needs.
Artificial Intelligence in Security
DownloadElevating security through multi-sensing solutions and large-scale AI
DownloadOpen credential standards and the impact on physical access control
DownloadCombining security and networking technologies for a unified solution
DownloadWhat is a universal RFID reader?
Download