Discover more about CONSULT 2018



sponsored by Boon Edam

Dr. Rita Singh

Dr. Rita Singh

Profiling humans from their voice

Our Keynote Speech will provide a glimpse into the emerging science of human profiling and identification from voice. The human voice is a powerful bio-parametric indicator, carrying information that can be linked to the current (time of recording of the voice) physical, physiological, demographic, medical, environmental and myriad other bio-relevant characteristics of the speaker. This capacity of the human voice to dynamically encode a person's bio-parametric factors as they exist at the time of speaking allows voice to potentially be more effective for profiling humans than DNA or fingerprints. Driven by artificial intelligence and insights into the human voice accumulated over decades of studies by researchers in multiple fields, the science of profiling humans from their voice seeks to uncover extremely fine-level unique, “spoof-proof” micro-signatures related to the speaker's physiology. Its recent breakthroughs include recreating a facial image solely from voice, and it continues to progress towards the generation of the human physical form in 3D, also from voice alone. This technology has major ramifications for security applications with the promise of being a key factor in identification and authentication. Dr. Singh will also mention some cutting-edge AI advances in audio steganography (embedded code in an audio file) which have significant security implications

Dr. Rita Singh is an Associate Research Professor at Carnegie Mellon University's Language Technologies Institute, and (by courtesy) at the Department of Electrical and Computer Engineering. She is an affiliate of the Institute for Strategic Analysis at CMU, and of the DHS Center of Excellence in Criminal Investigations and Network Analysis at George Mason University. At CMU she leads the Forensic Voice Analysis group. She also co-leads the Robust Speech Recognition group and the Machine Learning for Signal Processing groups at CMU. Over the past two decades, Dr. Singh's research has spanned broad areas of the speech and audio processing. She has worked on multiple aspects of automatic speech recognition and audio processing, including ASR in high-noise environments, distant speech recognition, microphone array processing etc. Dr. Singh has authored and co-authored a large number of articles on these subjects, including an edited volume on the topic of Noise Robust Speech Recognition. She holds several patents in the general area of speech and audio information processing. She is the co-lead designer of the CMU Sphinx-4 speech recognition system, which was one of the most popular ASR systems in the world over the past decade. Currently her research focuses on profiling humans from their voice.

Our Session schedule

The following sessions have been compiled with input from both consultants and sponsors, and they are directly targeted at security design consultants without being commercial in nature. Attendees may attend any session of their choosing and do not need to commit to any specific track.
Changes may occur prior to the event.

Saturday (Nov 3) Sunday (Nov 4) Monday (Nov 5) Tuesday (Nov 6)
ASSA ABLOY Training 2:30 - 4:00 PM
Registration 3:00 - 7:00 PM
Cocktail Reception
Sponsored by ASSA ABLOY
5:30 - 6:30 PM
Welcome Dinner
Sponsored by ASSA ABLOY
6:30 - 8:30 PM
Sponsored by PSA Security Network
7:30 - 8:30 AM
Welcome and Introductions 8:30 - 9:00 AM
Keynote Address
Sponsored by Boon Edam
9:00 - 9:45 AM
Break 9:45 - 10:00 AM
General Session
Sponsored by JCI/Tyco Security Products
10:00 - 11:00 AM
Mini Road Map Sessions (4) 11:00 AM - Noon
Sponsored by Windy City Wire
Noon - 1:00 PM
Mini Road Map Sessions (12) 1:00 - 4:00 PM
Free Time 4:00 - 5:30 PM
Depart for General Jackson 5:30 - 6:00 PM
Dinner Cruise
Sponsored by Lenel
6:00 - 10:00 PM
Sponsored by Security Industry Association and ISC Shows
7:45 - 9:00 AM
Track Session #1 9:00 - 10:15 AM
Break 10:15 - 10:30 AM
Track Session #2 10:30 - 11:45 AM
Sponsored by Security Industry Association and ISC Shows
11:45 AM - 1:00 PM
Track Session #3 1:00 - 2:15 PM
Break 2:15 - 2:30 PM
Track Session #4 2:30 - 3:45 PM
Free Time 3:45 - 5:00 PM
Cocktail Reception
Sponsored by Intel Corporation
5:00 - 6:00 PM
Manufacturer Dinners 6:00 - 9:00 PM
7:45 - 9:00 AM
General Session
Sponsored by JCI/Tyco Security Products
9:00 - 10:15 AM
Break 10:15 - 10:30 AM
Extended Manufacturer Time 10:30 - 11:45 AM
Get Away Lunch & Prizes
11:45 AM - 1:00 PM


Rock & Roll Room

Assa Abloy Logo

Presented by: Donna Chapman and Spiros Pantazis

Demystifying wireless locking solutions for the Security Consultant

We will delve into the wireless world with our technology expert Spiros Pantazis. We will review the integrations, security protocol, encryption, and debunk myths that exist in the marketplace. Be prepared to ask technical questions as this will be an in-depth learning regarding the various solutions available to meet the complex opening needs of your customers. This will be very interactive. The goal is to have you leaving this session with a complete understanding on wireless locking solutions at a much deeper level.
Email: Donna Chapman to sign up or for more information.


sponsored by Johnson Controls/Tyco Security Products

Music City Ballroom

Sunday – Impacting the Manufacturer Roadmap

Moderator: Brian Coulombe, P.E., DVS Security
Manufacturer Panelists: Brian Carle, Salient Systems; Rick Focke, Johnson Controls/Tyco Security Products
Consultant Panelists: Benjamin Butchko, Butchko, Inc.; Charles LeBlanc, IMEG Corp.

How many manufacturers design their products in a vacuum, driven by good ideas from R&D, but lacking solid input from the user community? Carrying this further, how often do security consultants – advisors to many of those same end users and more – get involved in the product planning process? Consultants have the need to understand what's coming down the pike, but they can be a valuable resource for manufactures working to develop a useful product roadmap. Manufacturers who have an organized program of listening and actively engaging with the design professional increase their chances of getting it right from the outset. Hear from manufacturers and consultants alike about their experience with what approaches work…and what don't.

Tuesday – Integrators – Friend or Foe?

Moderator: Bill Bozeman, PSA Security Network
Integrator Panelists: Andrew Lanning, Integrated Security Technologies;
Jim Henry, Securitas
Consultant Panelists: Lorna Chandler, Security by Design; Terry Harless, Burns and McDonnell

The relationship between consultant and integrator can be cooperative, contentious, or even non-existent. Cooperation can extend to understanding what really works in the field, best practices, cost impact, and design feasibility. Integrators look for a level playing field, hope to bid on implementable designs, and seek to have their differentiated value recognized. However, do integrators pose a threat? What are the implications of design build – is there room for cooperation? Why are certain integrators building up internal security design groups? Hear from two noted integrators and two leading consultants as they interact to discuss these opportunities and threats.


sponsored by Altronix

Belmont 1 Room

DZ1. Open Supervised Device Protocol (OSDP)

Moderator: Rodney Thayer, Smithee Solutions
Panelists: Dean Forchas, HID Global; Scott Lindley, Farpointe Data;
David Weinbach, Lenel; Steven DeArruda, Business Protection Specialists

Open Supervised Device Protocol (OSDP) is an access control communications standard developed by the Security Industry Association (SIA) to improve interoperability among access control and security products. OSDP v2.1.7 is currently in-process to become a standard recognized by the American National Standards Institute (ANSI), and OSDP is in constant refinement to retain its industry-leading position. Learn about the significant advantages of OSDP over Wiegand protocol, state of manufacturer and end-user implementation, and its importance in providing a cyber secure installation.

DZ2. Passive Optical Networks

Presenter: Drew Deatherage – Crux Solutions

The demand for network bandwidth has increased 45X since 2012 and will double again by 2020. This constant evolution along with the demands for more efficiency, reduction in capital and operating expenditures, reduction in the number and size of telecom spaces, and the need for the reduction of network-related power and HVAC costs (by as much as 75%) have fueled the demand for deep fiber networks. Gigabit Passive Optical Networking (GPON) and active Ethernet technologies have been around for decades, but their benefits are just now being understood. Fiber-deep networks use dramatically less cabling which leads to less pathway and even the elimination of many telecommunications spaces, and they the support of all applications, including physical security on a single converged network. This session will describe what a fiber-deep network is, create an understanding of the benefits of running a single converged network, and examine case studies where this has occurred successfully.

DZ3. Cabling Practices for Video

Presenter: Matt Peterworth, PE, RCDD, PAE Consulting Engineers

As video technology has evolved over the years, so too has the supporting cabling and infrastructure technology. This session will delve into a number of issues and best practices for specifying structured cabling for electronic security, including:

  • What kind of Cat-rated cable is best?
  • Speed vs POE++
  • NEC Code Requirements
  • Cable selection for Plenum, Riser, Wet and Damp locations
  • "Unlisted" entrance cables and the "50-foot rule"
  • New in the 2017 NEC – "LP" cable types (for PoE++)
  • Modular Patch Panels
  • Fiber optic termination types and testing requirements
  • Certified Contractors
  • 20+ year Advanced System Warranty

DZ4. Credentialing: Smart Cards or Mobile?

Moderator: Mark Schreiber, Safeguards Consulting
Panelists: Dean Forchas, HID Global; Scott Lindley, Farpointe Data; Allegion; David Weinbach, Lenel; Garrett Guess, Heritage Medical

Which technology should consultants specify for future identification needs? Both technologies may operate in a proximity mode via NFC or Bluetooth. Both may communicate in an encrypted fashion and incorporate other means of authentication including biometric. But which of these provide a higher level of security? More flexibility? Less risk of obsolescence. Get perspective from several different manufacturers and learn where these technologies will work better – now, and in the future.


sponsored by Salient Systems

Ryman 1 Room

SP1. Working with Architects

Moderator: Chad Parris, Securty Risk Management, LLC
Panelists: Philip Santore, DVS Security; Frank Pisciotta, Business Protections Specialists; Donna Chapman, ASSA ABLOY; Laura Schween, GHP Environmental + Architecture

The discussion of working with architects has several elements. First, there is the frequent conflict between aesthetics and security (beauty vs. brains?). But there is the also the opportunity to work collaboratively with the architect in building design to make it an important element of the overall security design. Then, there is the business element where architects can be an important entrée for the security consultant into projects, as well as facilitating (or hindering) coordination on the job for effective security. Hear multiple viewpoints on how this relationship can be used to provision the best security possible.

SP2. Electronic Door Hardware (Div 08 – Div 28)

Moderator: Ed Chandler, Security by Design
Panelists: Phil Aronson, Aronson Security Group (ADT); Eric Wagner, SSOE; Ron Couch, CIH (Central Indiana Hardware)

MasterFormat 2018 once again implements changes in the classification of electrified door hardware, distinguishing between "non-integrated" and "integrated". Does this change help or confuse how this equipment should be best specified? Should it be specified in Division 08 or Division 28? What are the implications for the security consultant? How will this affect the integrator and project coordination among the trades? Hear several different perspectives on this issue and what further changes, if any, should be recommended to CSI.

SP3. Exploring the Gap between Security System Design and Successful Operation

Moderator: Brian Carle, Salient Systems
Panelists: Tom McCoig, CPP, ABS Group;
James Francis, CPP, CFSO, LFJ Consulting Services
Mark Powers, Catalent Pharm Solutions

Security system design aims to match the designer's best ideas of security technology and product solutions to the perceived client needs and security risks. However, in practice for many, successful operation remains an elusive result. Why? Too much technology? Inadequate user skill set? Or are those who manufacture, design, and install such systems not taking steps to insure they will operate as intended? Discuss this important issue with experts from both the design side and the client side and understand what steps could be taken to close the gap.

SP4. The P3 Invasion – Are you prepared?

Presenters: Fernando Neto and Philip Chong, Arup

Description: Public-Private Partnership's (P3's) have become an established procurement method for complex projects in Canada and Europe and are starting to gain adoption in the U.S. The Security consultant's role differs in design/compliance and design/implementation within the P3 structure. Learn about this alternative procurement method, the consultant's role, project examples, as well as the associated challenges and how to mitigate them.


sponsored by Veracity

Belmont 2 + 3 Room

CY1. Consultant's Cyber Liability

Presenter: Mark Waldeck, CRC Insurance

This topic was introduced at CONSULT 2017 as a general session. This year's session is offered as a track session to allow greater interchange among consultants to understand the nature of potential liability, ways to mitigate that liability, likelihood of being held responsible in a cyber-related breach, and the role of insurance. Specifically, some of the key questions are:

  • Is cyber liability insurance specifically required?
  • What protection does it afford?
  • How is it priced?
  • How should a provider be selected?

CY2. An Operational Model for Cybersecurity

Presenter: Dr. Greg White, University of Texas, San Antonio

Prevention is an important aspect in an organization's security program, but it is only one part. In today's environment, organizations need to be doing more than just incorporating prevention technologies, they need to consider detection, response, and recovery. This talk will cover the general operational model of cybersecurity and address what an organization can be doing in each of these phases: Prevention, Detection, Response, and Recovery.

CY3. Cyber Specification Language

Moderator: Ray Coulombe, SecuritySpecifiers
Panelists: Neil Lakomiak, Underwriters Laboratory
Wael Lahoud, Goldmark Security Consulting
Geoff Bauer, Axis Communications
Amy Williams, PSB Exero

CSI MasterFormat Division 28 (28 05 11) encompasses Cyber Security Requirements for Electronic Safety and Security. At CONSULT 2017, conversations were initiated around this topic, and, since then, SecuritySpecifiers has published suggested specification language for comment. Further comments from the industry will be incorporated into this language, and elements of this will be discussed in this session. The spec language is meant for consideration by consultants to support cyber security elements in the projects they design. It encompasses such considerations as submittals, product characteristics, asset management, password provisioning, and contractor responsibilities.

CY4. What Should We Expect of Integrators in the Installation of a Cyber Secure Project?

Moderator: Jack Meltzer, Veracity
Panelists: Andrew Lanning, Integrated Security Technologies
John Palumbo, Unlimited Technologies
Phil Aronson, Aronson Security Group (ADT)

Just as producibility is critical to a product designer, the ability of a project to be properly provisioned, installed, and configured is critical to overall success. This is especially true when it comes to the cybersecurity of an installed project. In light of anticipated cyber specification language, what can today's security integrators be reasonably expected to accomplish? What certifications should they have that can be referenced in a specification? How do they deal with the potential for cyber liability? Hear from three leading security systems integrators and see if their perspectives align with the consultant perspective?


sponsored by Commend Inc.

Ryman 2 Room

TP1. Weaponizing Technology to Improve Outcomes during Hostile Events

Presenter: Jerry Wilkins, Active Risk Survival

This session will provide information on how technology can play a critical role in improving outcomes during a Critical Incident/Hostile event. Examples of insufficient planning and preparation derived from both Parkland Florida and Las Vegas after action reports will be reviewed. Insight into the importance of integrating technology as part of the process to Plan, Respond and Recover from an Active Shooter Event will be covered. Examples from NFPA-3000 (PS) will be sited as industry “Best Practice”. Session Goals:

  • Understand the latest First Responder Tactics
  • Discuss utilizing technology beyond Deter and Detect show how Technology can be part of a comprehensive Defensive tool kit
  • Highlight of NFPA-3000 (PS) and the potential Liability for not adopting an ASHER Program
  • Putting technology at the front end of the planning process
  • Review the causes of negligence (Foreseeability, Reasonable Man Test and Proximate Cause)

TP2. Smart Cities, Smart Buildings and The Evolution of The Converged Security Approach

Presenter: Pierre Bourgeix, ESI Convergent

This transformative session will discuss the future of security from the managing of traffic lights/traffic flow, Power Grids, Ports, and transportation systems. Included in this conversation will be the understanding of the use of Cameras, Access Control, Gunshot Detection, OSINT (Open Source Intelligence Social Analyzers), IoT devices, cyber information, video management, predictive maintenance for critical infrastructure, and entry solutions. We will also discuss the use of meta data, analytics, AI (Artificial Intelligence), secured communication, secured storage, and secured devices in the role of risk mitigation and prevention. The conversation will include the role of a converged security standard to define and weigh liability and align proper technology to compliance with business processes.

TP3. Case Study: Securing Cannabis from Farm to Recliner

Presenter: Ryan Schonfeld, RAS Security Group

The legalized marijuana industry in Southern California is growing dramatically, while presenting numerous security challenges. Not only is the subject a controlled substance, but millions of dollars are changing hands in the process. Security occurs all along the way from tracking individual plants to securing the integrity of home delivery vehicles. Learn about the challenges and process from a noted consultant who is in the thick of the action, providing innovative security solutions to this unique industry.

TP4. Artificial Intelligence (AI) at the Edge

Presenter: Soren Knudsen, Intel Corporation

Artificial Intelligence is beginning to transform and turbocharge device functionality and analytics, particularly as the processing power to accomplished this is provisioned at the edge device. Learn more about this technology from one of the world's leading AI companies – how it works, how it's provisioned, where is it taking us, and how it is poised to impact security as we know it.

Questions or comments? Contact us at

About Us

CONSULT is a security industry event sponsored by SecuritySpecifiers. SecuritySpecifiers is an online community and network of security professionals established to address the need for the physical security industry to more effectively engage with designers and consultants.

Useful Links

Contacts Details