October 3-6, 2025
Hyatt Regency Denver Downtown

Approval Pending

 

 

Approval Pending

Keynote Session

sponsored by

Altronix

Lessons in Leadership

Presenter: Dave Komendat

Recalling his many years of service as the CSO at the Boeing Company, Dave will discuss several of the challenges he faced and lessons he learned.

GENERAL SESSIONS

sponsored by

Shooter Detection Systems

End User Perspectives on Consultant Value

This session will cover end user expectations of the consultant community, particularly with how they can bring true business value to the organization. It will contrast contracted consultant services with in-house staff and/or preferred integrator(s). How do users measure the success of their security programs and value provided? How should they?

The Reality of Legal Liabiility

What is the extent of security consultant, integrator, and manufacturer liabilities? What do attorneys skilled in prosecuting liability cases look for in cases of security system failure/negligence? Why is insurance not always the answer? What proactive actions should be taken?

Specifications & Projects

sponsored by

ASSA ABLOY

Navigating Your Way with the CA

Contract Administration (CA) refers to the process of managing contracts related to construction projects, ensuring that all terms are met and overseeing the project from inception to completion. Security consultants play an essential role in contract administration by offering expertise to integrate security measures into the project plans and ensure their effective execution. Collaboration between security consultants and construction teams is crucial. Clear communication and strategic planning are imperative for enhancing collaboration among project stakeholders, including contractors, architects, and clients. This also involves maintaining accurate documentation and conducting regular, thorough reviews of the project timeline and financial status. This session will address best practices for construction administration, risk management, handling unexpected challenges, and leveraging technology.

Div 08 vs Div 28 - The Ongoing Conundrum

Door Hardware appears in both Divisions 08 and 28 of CSI’s MasterFormat. CSI has determined that non-integrated door hardware falls under Div 08 and integrated hardware under Div 28. Further, they have accepted the fact that integrated hardware means any door hardware situation that touches the network. Nevertheless, these guidelines are frequently not adhered to. The unfortunate result is a common situation where a contractor without the requisite skill has prepared a door that is difficult for a systems integrator to work with in bringing up an access control system. Hear from this panel about the evolution of electrified door hardware installations and thoughts on improving this situation.

Mentoring Designers into Consultants - Path to Design Competency

How does the consulting profession differentiate between “designer” and “consultant”? A new hire in a consulting firm may start out as a CAD designer or, with experience, as a system designer. However, there is a level of understanding and maturity that accompanies being a true consultant – one who understands risks, customer constraints, and potential solutions. Hear from a panel of “mentors” who have assisted security professionals making this transition.

Vertical Focus: Hospitals & Healthcare

Hospitals and Health Care facilities present their own special challenges in security design. Many healthcare facilities in the US struggle to manage visitors effectively, leading to disruptions for staff and vulnerabilities due to unauthorized access. Without proper visitor identification, it is difficult to distinguish non-staff individuals. The unrestricted public access leaves hospitals exposed to potential incidents. Special considerations exist for facilities dealing with mental health patients. Controlled substances require diligent and secure handling. Learn more about these challenges and how the security industry and providers are addressing them.

Card Reader Security

sponsored by

Wavelynx

OSDP Deployment Issues

The Open Supervised Device Protocol (OSDP) facilitates encrypted and reliable communication between access control card readers and control panels, OSDP V2.2 includes encryption between the reader and the panel. Do what extent has the industry embraced OSDP? What kinds of issues, problems, and miscues have been witnessed in deployment? Do consultants seem to be specifying OSDP? Are end-users pushing back or being slow to adopt the new technology? These issues and more will be discussed by our presenters/panel.

Is 2025 the Breakout Year for PKOC?

The Public Key Open Credential (PKOC) is a publicly available specification for access control credentials that is defined with two methods of delivery, NFC and Bluetooth. PKOC does not rely on the Public Key Infrastructure (PKI) for issuing and managing digital certificates. Instead, the private key of the credential is stored only on the card/device itself, maximizing system security. PKOC readers are compatible with both Wiegand and OSDP panels, minimizing the need for panel replacements. This panel will review the current state of PKOC implementation including: • Actual orders and work within the industry? • How, from a cyber standpoint, do OSDP and PKOC complement each other? • Go-forward strategies • Availability of PKOC-capable product • Access Control System testing experience • Hardware implementations – cards, readers, panels

Hands-on Card Reader Hacking & OSDP Workshop (Double Session)

Due to their inherent insecurity due to clear-channel communication, Wiegand card readers have been incredibly easy to hack. Yet, they continue to be installed in large numbers. Come to this session and witness just how! After seeing, first-hand, Wiegand reader vulnerabilities, stick around for a deeper dive into OSDP in a workshop environment. Learn how, if not properly configured, OSDP may not deliver the expected security benefits. Those who attend this session should expect to leave with a much better grasp of provisioning strong card reader communication security.

Door Hardware

sponsored by

Allegion

Introduction to Door Hardware Design

While possibly appearing as a simple topic to the uninitiated, the process of selecting and specifying door hardware can be complex and daunting. This is the session for those who wish to begin or bolster their education in this area. It will address requirements, selection areas, product options, and the impact of architectural design.

Updated Codes for Electrified Door Hardware

Presenter: Lori Greene, Allegion

The model code requirements addressing electrified hardware have been updated in recent years to clarify what is needed to ensure a balance of life safety and security. Are you familiar with the requirements for controlled egress locks in health care facilities, an alternative to delayed egress locking systems? Have you seen the new sections in the I-Codes for fail safe locks on elevator lobby doors, and the interlocks that will be covered in the 2027 editions? Do you know which components are required by code for systems with electromagnetic locks – either sensor-release or door-hardware release? Have you run into trouble with the need for products listed to UL 294 or UL 1034? These topics and others will be covered in this interactive and engaging session by Lori Greene, Manager – Codes & Resources for Allegion and the creator of iDigHardware.com.

Door Hardware Workshop (Double Session)

Presented by representatives of ASSA ABLOY and Allegion, this double session will feature hands-on demonstrations of key door hardware components. Requirements and variations of each component will be discussed in an informal free-flowing format. Separate demonstrations will be conducted by our two hardware manufacturers, allowing attendees to receive different perspectives. Attendees may drop in and combine elements of this program with other afternoon track sessions.

Special Topics

sponsored by

Hanwa

Access Control for Remote Locations

Learn about the special challenges of provisioning access control for remote locations, in light of increasing cloud offerings in the industry. What are the special challenges in merging on-prem vs. cloud deployments in a unified fashion? Learn about MQTT (MQ Telemetry Transport ) and why some manufacturers are embracing it.

AI Use Cases

AI continues to permeate our daily lives and products and terminology within the security industry. This session will present different use case of successful AI implementation. A cross section of applications will be represented. In addition, the panel will be asked to comment on situations where experience did not meet expectations.

Why Bollards Fail

Presenter: Robert Miller, Imperial Professional Consulting

This session was prompted by the tragic events of January 2024 in New Orleans, where pedestrians were unknowingly placed in harm’s way due to bollards having become non-operational and slated for replacement. The public rarely takes notice of bollard protection unless they’re visually disturbing. The fact is that bollards do fail, particularly retractable versions. Learn from an expert why bollards can fail, their failure modes, and what preventive actions should be taken to prevent their failure.

Keeping an Eye on Drones

Presenter: Remengton Pierce, Sandia National Laboratories

Advances in technology are increasing threats from drones. The Ukraine war in particular has shown how miniaturization, better batteries, swarming tactics, and quieter devices enhance these risks. Hear about these increasing drone threats from a recognized Government expert and approaches being considered and taken to detect and mitigate them.

Questions or comments? Contact us at admin@securityspecifiers.com.

About Us

CONSULT is a security industry event sponsored by SecuritySpecifiers. SecuritySpecifiers is an online community and network of security professionals established to address the need for the physical security industry to more effectively engage with designers and consultants.

Contacts Details

203-405-3740

SecuritySpecifiers, CONSULT, and CONSULT Technical Security Symposium are registered trademark of Gilwell Technology Services, LLC.