October 3-6, 2025
Hyatt Regency Denver Downtown

Approved for 13.75 CPE's

 

 

Approved for 6 CEC's

Keynote Session

sponsored by

Altronix

Lessons in Leadership

Capital 4-7 Ballroom Saturday 8:00 – 9:00 AM

Presenters: Dave Komendat
  President, DSKomendat Risk Management Services

A globally recognized security leader with over 40 years of industry experience, Dave Komendat will share a “behind the scenes look” at the challenges faced when leading security at one of the world’s most iconic brands. His address will include his personal insights, learnings and poignant moments about some of the most challenging incidents during his career.

GENERAL SESSIONS

sponsored by

Shooter Detection Systems

End User Perspectives on Consultant Value

Capital 4-7 Ballroom Saturday 1:15 - 2:15 PM

Moderator: Jerrod Johnson, Head of Corporate Security & Business Continuity, Ferguson Enterprises, LLC
Panelists: Mike Howard, former CSO, Microsoft
  Rob Nix, Director, Enterprise Security Technology, Cox Enterprises, Inc.
  Bhavesh Patel, Founder & CEO, BhCG
 

This session delves into the expectations that end users have for the consultant community, with a particular focus on how consultants can deliver tangible business value to the organization. It will draw a contrast between contracted consultant services and in-house staff and/or preferred integrator(s). The discussion will explore how users evaluate the success of their security programs and the value provided by external consultants. Additionally, it will examine how users should ideally measure the effectiveness of their security initiatives and the contributions made by consultants.

The Reality of AI Legal Liability

Capital 4-7 Ballroom Sunday 8:00 - 9:00 AM

Moderator: Jon Polly, Chief Solutions Officer, ProTecht Solutions Partners
Panelists: Amy Natasha Osteen, General Counsel, Alcatraz
  Jake Parker, Sr. Director - Government Relations, Security Industry Association
  Bobby Prostko, Deputy General Counsel and Chief Privacy Officer, Allegion
 

Many who have begun to grasp the realities of AI realize the potential for fraud, deception, and misuse of identity profiles. This is further complicated by the potential for data leakage, legal complexities, and liability concerns. Most early users of the technology are likely unaware of potential ramifications. These concerns start at the manufacturer and propagate through to the end user. In this session, you’ll hear several perspectives from manufacturers and other industry experts.

Specifications & Projects

sponsored by

ASSA ABLOY

Navigating Your Way with the CA

Agate (Level 3) Sunday 9:15 - 10:30 AM

Moderator: Todd Winslow, Senior Consultant & Associate Principal, Exante360
Panelists: RJ Hope, Principal & Director, Corporate Resiliency, Burns & McDonnell
  Jason McCann, Technology Systems Designer, Mead & Hunt
  Beth Van Why, Project Executive, Becker & Frondorf

Contract Administration (CA) refers to the process of managing contracts related to construction projects, ensuring that all terms are met and overseeing the project from inception to completion. Security consultants play an essential role in contract administration by offering expertise to integrate security measures into the project plans and ensure their effective execution. Collaboration between security consultants and construction teams is crucial. Clear communication and strategic planning are imperative for enhancing collaboration among project stakeholders, including contractors, architects, and clients. This also involves maintaining accurate documentation and conducting regular, thorough reviews of the project timeline and financial status. This session will address best practices for construction administration, risk management, handling unexpected challenges, and leveraging technology.

Div 08 vs Div 28 - The Ongoing Conundrum

Agate (Level 3) Sunday 10:45 AM - 12:00 PM

Moderator: James Krile, Associate Principal, Heapy
Panelists: Chris Fitzgerald, Senior IMIT Consultant, HH Angus
  Dave Miller, Principal, MCG Design Services
  Allen Mulanax, SVP Business Development, Paladin Technologies
  Benjamin Williams, Sr. Director of Product Management, ASSA ABLOY Opening Solutions

One of the long running unresolved issues in the security design profession is the coordination of the door control elements between the CSI Master Format Division 08 and Division 28 specifications. The complications arise from the fact that a well coordinated door control package involves multiple design professionals. Those involved include Architects, Interior Designers, Fire Protection engineers, Security Consultant, and even traditional Low Voltage Designers. This panel session attempts to take a fresh look at the factors involved in coordinating the door controls across multiple CSI Master Format Divisions and discuss real world experience and lessons learned.

Mentoring Designers into Consultants - Path to Design Competency

Agate (Level 3) Sunday 1:15 - 2:30 PM

Moderator: Charles LeBlanc, Principal / Project Executive, IMEG Security Group
Panelists: Jerry Blanchard, Chairman & CEO, Protus3
  Forrest Gist, Global Principal - Security, Jacobs
  Tim McCord, Senior Associate, TLC Engineering Solutions

How does the consulting profession differentiate between “designer” and “consultant”? A new hire in a consulting firm may start out as a CAD designer or, with experience, as a system designer. However, there is a level of understanding and maturity that accompanies being a true consultant – one who understands risks, customer constraints, and potential solutions. Hear from a panel of “mentors” who have assisted security professionals making this transition.

Vertical Focus: Hospitals & Healthcare

Agate (Level 3) Sunday 2:45 PM - 4:00 PM

Moderator: Frank Pisciotta, President, Business Protection Specialists
Panelists: Steven DeArruda, Senior Security System Designer, Business Protection Specialists
  David McGowan, Vice President - National Security Services, Kaiser Permanente
  Allen Mulanax, SVP Business Development, Paladin Technologies

Hospitals and Health Care facilities present their own special challenges from a threat and security design perspective. The unrestricted public access leaves hospitals exposed to potential incidents. Special considerations exist for security sensitive areas such as ED’s, Labor and Delivery, Pharmacies and behavioral health. Offsite clinics present yet another challenge. Given the myriad of security design resources out there, how does the security designer discern which to apply? Regulation and accreditation bodies influence the way technology can be deployed in this complex setting. Learn more about these challenges and how the security industry and providers are addressing them.

Card Reader Security

sponsored by

Wavelynx

OSDP Deployment Issues

Capitol 1 Ballroom (Level 4) Sunday 9:15 AM - 10:30 AM

Presenters: Sal D'Agostino, CEO, IDmachines
  Rodney Thayer, Convergence Engineer, Smithee Solutions

The Open Supervised Device Protocol (OSDP) facilitates encrypted and reliable communication between access control card readers and control panels, OSDP V2.2 includes encryption between the reader and the panel. Do what extent has the industry embraced OSDP? What kinds of issues, problems, and miscues have been witnessed in deployment? Do consultants seem to be specifying OSDP? Are end-users pushing back or being slow to adopt the new technology? These issues and more will be discussed by our presenters/panel.

Is 2025 the Breakout Year for PKOC?

Capitol 1 Ballroom (Level 4) Sunday 10:45 AM - 12:00 PM

Moderator: Jason Ouellette, Vice President, Elatec
Panelists: Bruno Desrochers, Sales Manager - Canada, Tech Systems
  Keith Kelly, Director & Chief Security Officer, Deloitte
  Mike Zercher, Consultant/Software Engineer, Secure Element Solutions

The Public Key Open Credential (PKOC) is a publicly available specification for access control credentials that is defined with two methods of delivery, NFC and Bluetooth. PKOC does not rely on the Public Key Infrastructure (PKI) for issuing and managing digital certificates. Instead, the private key of the credential is stored only on the card/device itself, maximizing system security. PKOC readers are compatible with both Wiegand and OSDP panels, minimizing the need for panel replacements. This panel will review the current state of PKOC implementation including: • Actual orders and work within the industry? • How, from a cyber standpoint, do OSDP and PKOC complement each other? • Go-forward strategies • Availability of PKOC-capable product • Access Control System testing experience • Hardware implementations – cards, readers, panels

Hands-on Card Reader Hacking & OSDP Workshop (Double Session)

Capitol 1 Ballroom (Level 4) Sunday 1:15 - 4:00 PM

Presenters: James Cooper, Directory of Technology & Cyber Security , Pavion
  Sal D'Agostino, CEO, IDmachines
  Rodney Thayer, Convergence Engineer, Smithee Solutions

Due to their inherent insecurity due to clear-channel communication, Wiegand card readers have been incredibly easy to hack. Yet, they continue to be installed in large numbers. Come to this session and witness just how! After seeing, first-hand, Wiegand reader vulnerabilities, stick around for a deeper dive into OSDP in a workshop environment. Learn how, if not properly configured, OSDP may not deliver the expected security benefits. Those who attend this session should expect to leave with a much better grasp of provisioning strong card reader communication security.

Door Hardware

sponsored by

Allegion

Introduction to Door Hardware Design

Capitol 3 Ballroom (Level 4) Sunday 9:15 - 10:30 AM

Presenters: Justin McKee, Sr. Channel Marketing Manager, Allegion
  Derek Ommert, Director of Business Development, ASSA ABLOY

While possibly appearing as a simple topic to the uninitiated, the process of selecting and specifying door hardware can be complex and daunting. This is the session for those who wish to begin or bolster their education in this area. It will address requirements, selection areas, product options, and the impact of architectural design.

Updated Codes for Electrified Door Hardware

Capitol 3 Ballroom (Level 4) Sunday 10:45 AM - 12:00 PM

Presenter: Lori Greene, Manager - Codes & Resources, Allegion

The model code requirements addressing electrified hardware have been updated in recent years to clarify what is needed to ensure a balance of life safety and security. Are you familiar with the requirements for controlled egress locks in health care facilities, an alternative to delayed egress locking systems? Have you seen the new sections in the I-Codes for fail safe locks on elevator lobby doors, and the interlocks that will be covered in the 2027 editions? Do you know which components are required by code for systems with electromagnetic locks – either sensor-release or door-hardware release? Have you run into trouble with the need for products listed to UL 294 or UL 1034? These topics and others will be covered in this interactive and engaging session by the creator of iDigHardware.com.

Door Hardware Workshop (Double Session)

Capitol 3 Ballroom (Level 4) Sunday 1:15 - 4:00 PM

Presenters: Justin McKee, Sr. Channel Marketing Manager, Allegion
  Derek Ommert, Director of Business Development, ASSA ABLOY

Presented by representatives of ASSA ABLOY and Allegion, this double session will feature hands-on demonstrations of key door hardware components. Requirements and variations of each component will be discussed in an informal free-flowing format. Separate demonstrations will be conducted by our two hardware manufacturers, allowing attendees to receive different perspectives. Attendees may drop in and combine elements of this program with other afternoon track sessions.

Special Topics

sponsored by

Hanwa

AI Use Cases

Granite (Level 3) Sunday 9:15 - 10:30 AM

Moderator: Josh Cummings, EVP - Technology, Paladin Technologies
Panelists: Matt Isgur, Chief Technology Officer, ADRM
  Jarrett Morgan, Technology Leader, Mead & Hunt
  Aaron Saks, Director of Product Training, Hanwha Vision
  Bryan Schmode, CEO, Soterix Systems

AI continues to permeate our daily lives and products and terminology within the security industry. This session will present different use case of successful AI implementation. A cross section of applications will be represented. In addition, the panel will be asked to comment on situations where experience did not meet expectations.

Access Control for Remote Locations

Granite (Level 3) Sunday 10:45 AM - 12:00 PM

Moderator: Charles Johnson, Founder & CEO, NGA Security Associates, LLC
Panelists: Paula Balmori Beltrán, Global Director of Security Design & Integration, Brivo
  Chad Hendrickson, Sales Leader (CO), Convergint
  Eric Joseph, Vice President - Strategic Sales, Honeywell Security
  Bhavesh Patel, Founder & CEO, BhCG

Learn about the special challenges of provisioning access control for remote locations, in light of increasing cloud offerings in the industry. What are the special challenges in merging on-prem vs. cloud deployments in a unified fashion? Learn about MQTT (MQ Telemetry Transport ) and why some manufacturers are embracing it.

Why Bollards Fail

Granite (Level 3) Sunday 1:15 - 2::30 PM

Presenter: Robert Miller, Owner, Imperial Professional Consulting

This session was prompted by the tragic events of January 2024 in New Orleans, where pedestrians were unknowingly placed in harm’s way due to bollards having become non-operational and slated for replacement. The public rarely takes notice of bollard protection unless they’re visually disturbing. The fact is that bollards do fail, particularly retractable versions. Learn from an expert why bollards can fail, their failure modes, and what preventive actions should be taken to prevent their failure.

Keeping an Eye on Drones

Granite (Level 3) Sunday 2:45 - 4:00 PM

Presenter: Remengton Pierce, Cyber Engineer, Sandia National Laboratories

Cutting-edge technology is transforming drones from surveillance tools into serious security threats. The war in Ukraine has put this danger in sharp focus, revealing how miniaturization, next-gen batteries, stealthier designs, and swarm tactics are reshaping the battlefield — and raising alarms far beyond it. Join a leading government expert as they uncover the rising risks of drone warfare and share the latest strategies and technologies being deployed to detect, counter, and neutralize these fast-moving threats.

Questions or comments? Contact us at admin@securityspecifiers.com.

About Us

CONSULT is a security industry event sponsored by SecuritySpecifiers. SecuritySpecifiers is an online community and network of security professionals established to address the need for the physical security industry to more effectively engage with designers and consultants.

Contacts Details

203-405-3740

SecuritySpecifiers, CONSULT, and CONSULT Technical Security Symposium are registered trademark of Gilwell Technology Services, LLC.