Remove Asset Management Remove Cybersecurity Remove Strategic Remove Technology
article thumbnail

Security Industry Association Announces Winners of the 2023 SIA Women in Biometrics Awards

Security Industry Association

The 2023 awardees, who will be honored at SIA GovSummit , SIA’s annual government security conference, are: Larisa Boyko, Director, Quality Assurance, Advanced Recognition Systems, NEC Corporation of America Larisa Boyko is a seasoned information technology professional with over 20 years of experience in the software development life cycle.

article thumbnail

Security Industry Association and ISC West Call for Entries for the 2024 SIA New Products and Solutions Awards at ISC West

Security Industry Association

The SIA NPS Awards Committee is proud to collaborate on this program each year and looks forward to celebrating the most innovative new technologies on the market during ISC West 2024.” Since its inception in 1979, SIA NPS has been the security industry’s premier product awards program.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIA and ISC West Open Call for Entries for the 2023 SIA New Products and Solutions (NPS) Awards at ISC West

Security Industry Association

“The SIA NPS Awards Committee looks forward to recognizing the best cutting-edge technologies on the market during ISC West,” said SIA NPS Committee Chair Josh Heisler, global head of tech and tools for Amazon.

article thumbnail

Details Revealed for 2022 SIA New Products and Solutions (NPS) Awards at ISC West

Security Industry Association

Participating in the SIA NPS Awards – the leading awards program at the security industry’s largest converged security trade show – is a fantastic opportunity for companies to present their security offerings,” said SIA CEO Don Erickson.

article thumbnail

ISO 27001 Requirements Checklist: Steps and Tips for Implementation

Reciprocity

An ISMS is a standards-based approach to managing sensitive information to assure that the information stays secure. The core of an ISMS is rooted in the people, processes, and technology through a governed risk management program. 8 – Asset Management. Asset Management, Annex A.8