October 28-31, 2022
Renaissance Nashville Hotel | Nashville, TN

Approved for 13.5 CPE's



Approval pending for 6 CEC's

Keynote Session

sponsored by


Unique Perspectives on Risk

Grand Ballroom 3 October 29, 2022, 8:00 - 9:00 AM

Presenter:General Stanley McChrystal (Ret.)

Published in 2021, General Stanley McChrystal’s book, “Risk: A User’s Guide”, offers a battle-tested system for detecting and responding to risk. Instead of defining risk as a force to predict and eschewing the traditional Risk = Threat x Vulnerability measure, McChrystal describes the ten essential dimensions of control we can adjust at any given time. By closely monitoring these controls, we can maintain a healthy Risk Immune System that allows us to effectively anticipate, identify, analyze, and act. In his keynote address, General McChrystal will review these ten essential dimensions and focus on several which are particularly relevant to our industry. Drawing on examples ranging from military history to the business world, McChrystal illustrates how these dimensions are always in effect. By considering them, individuals and organizations can be better prepared to address every conceivable sort of risk that they might face. Every attendee will receive a copy of the General’s book.


sponsored by


Emerging Technology Company Presentations

Grand Ballroom 3 October 29, 2022, 1:00 - 2:15 PM

Moderator:Brian Coulombe, Amazon
Presenters:Alcatraz AI, Paul Fisher
 Hakimo, Jason Wright
 Davista.ai, Scott Sieracki
 Azena, Jeff Kunzler

Four exciting technology companies have been selected and invited to present brief individual presentations. They will review their underlying product technologies, this year with a decidedly AI flavor, security applications, and success stories. Companies such as these rarely have A&E program budgets and are most likely under the radar of most security consultants. The session’s objective is to stimulate awareness of products and technologies that have the potential for significant future impact In the industry.


sponsored by


Using 3D Visualization to Enhance Security Design

Grand Ballroom 3 October 30, 2022. 8:00 - 9:00 AM

Presenters:Kelly Watt, CEO & Founder, Visual Plan
 Brock Josephson, Burns & McDonnell

“A picture is worth 1000 words”; but what does 3D data, 360-imagery, and AR/MR/VR offer to security consultants, integrators, and owners? From design to project handover we depend on accurate current site information and communication to make informed decisions and create effective designs. Yet, our world is ever changing, and the data threads and communication we receive don’t always keep pace. How can AI help us game out scenarios to help us with effective planning and design? Available reality capture technologies from 3d LIDAR, to SLAM, photogrammetry and 360 are changing the way we look at spaces, share information, and collaborate on best outcomes. Hardened headsets allow us to experience this data in entirely different ways, from aerial perspectives, eye level or subsurface. And AI is helping us to game out best outcomes before deployment using Digital Twin framework. We will explore through use cases how reality capture is augmenting the design process to deliver best outcomes, and how AI is assisting the outcomes by offering data driven information.

Projects – From Design through Operation

sponsored by

Salient Systems

Is Astute Bonding the Solution to Better Performance?

Sylvan Park October 30, 2022, 9:15 - 10:30 AM

Moderator:Jim Henry, Butchko ESI
Panelists:Pierre Bourgeix, Butchko ESI
 Kevin Englehardt, Securitas
 Les Gold, Mitchell Silberberg & Knupp
 Mark Waldeck, CRC Insurance Services

Once a project gets underway and is in the hands of a general or electrical contractor, the intended performance objectives often get muddied or nearly lost when the designer is effectively removed from the construction process. If the designer has the Owner’s ear or is working in highly collaborative environment, the risk of this “degradation” may be lessened. Otherwise, one must ask why security should potentially suffer for the sake of contractor profit and schedule. One novel approach could be the use of “quality assurance bonding” to help assure security system performance. Questions such as bonding company buy-in, owner acceptance, and measurement criteria would need to be adequately addressed. Hear from a panel of experts who’ve seen it all in projects – the good, the bad, the ugly – about whether this approach could be feasible and effective.

What Makes for an Effective Specification?

Sylvan Park October 30, 2022, 10:45 AM - 12:00 PM

Moderator:Forest Gist, Jacobs
Panelists:John Acosta, Faith Group
 Bret Emerson, CommTech Design
 Charles LeBlanc, IMEG

What is the balance between design information in the body of a written specification vs. drawings? How much attention is paid to the CSI format? With the continuing evolution if integrated systems, is it time to move towards more Division 25 specs? Are canned specifications through online services of any value? Are short-version small project specifications of any value as opposed to full content detailed specifications? These questions and more will be addressed by a panel of seasoned consultants and a leading integrator.

Selling and Delivering Better Value to Clients

Sylvan Park October 30, 2022, 1:45 - 3:00 PM

Moderator:Paul Boucherle, Matterhorn Consulting
Panelists:Jerrod Johnson, Ferguson Enterprises
 Tim McCord, TLC Engineering Solutions
 Ryan Schonfeld, RAS Security
 Jeff Smith, TEECOM

Starting with the now familiar (but not fully answered) question. “How Can Security Deliver Better Business Value to the User”, extrapolate that to the security consultant. Not only is the consultant expected to be up to speed on all the latest impactful technologies, but there should also be the expectation that the knowledge leads to innovative and creative solutions. Increasingly, those solutions should transcend security and touch other areas of the enterprise that can benefit from the technologies employed in security. Three questions that arise from this premise:
  • Does a consultant have the expertise to accomplish this?
  • How can a consultant effectively sell his/her vision to the client?
  • What are the most effective ways to move from the theoretical to the practical and actually impact areas outside of traditional security

Planning for and Maintaining System Life-Cycle Security

Sylvan Park October 30, 2022, 3:15 - 4:30 PM

Moderator:Frank Pisciotta, Business Protection Specialists
Panelists:Danny Chung, Northland Controls
 Derek Ommert, Protus3
 John Palumbo, Unlimited Technology
 Wayne Smith, Tech Systems

Most often, the Security System Development Life Cycle is defined as a process that is ongoing throughout software development. But what are the considerations for an electronic/physical security system that is pending or actually deployed? Life cycle security of such a system must be thought of through its components – devices, severs, system software, device firmware and the underlying infrastructure to support these. Ideally, this is all considered pre-deployment and involves considerations such as “patchability” of devices, software maintenance agreements, ongoing compatibility of integrated systems, and vendor and IT support. How can consultants and project specifications help drive better security over the life cycle? How can key stakeholders determine if the devices and systems being deployed have been engineered and architected to maintain their security capabilities over the life of the overall system? What actions should be taken at commissioning to help insure longer-term security?

Products and Technology

sponsored by


The Collision of Mobile & Access

Midtown 2 October 30, 2022, 9:15 - 10:30 AM

Presenters:Brandon Arcement, SwiftConnect
 Ed Chandler, Security By Design

Mobile and Access industry leaders are collaborating like never before and are positioned to truly converge. Almost 20 years after the NFC Forum was established, the mobile device and access control industries finally seem poised to deliver viable, real-world mobile access solutions at enterprise scale. During this session, the presenters will share insights from a decade of experience working closely with mobile technology manufacturers and summarize observations from hundreds of (attempted) mobile access deployments in enterprise. The discussion will include:
  • Background on the two industries that has led to the current state
  • Valuable business outcomes that can be realized by enterprise mobile access and patterns, observed from both failed and successful deployments
  • The Apple Access Platform and why Apple Wallet will fundamentally transform the access control industry
  • Overall investments and costs associated with delivering a complete, practical, secure mobile access experience within large enterprise
  • Future direction of mobile-access deployments

Forecast: Increasing Clouds

Midtown 2 October 30, 2022, 10:45 AM - 12:00 PM

Moderator:Lance Kelson, Tiger Technology
Panelists:Brent Edmunds, Stone Security
 Matt Fishback, Milestone Systems
 Brent McCarthy, Amazon Web Services (AWS)

The security industry continues to move towards embracing cloud-based services, and manufacturers keep expanding the options. Still, there is much to be learned, with questions such as:
  • What is the current makeup of the Cloud? What are the key technology advantages?
  • What storage redundancy options are available to me?
  • What is a Private Cloud and what are the benefits?
  • What is meant by Cloud First and how does it compare to On-Prem First?
  • How much expertise, planning, and downtime is typical for a transition?
  • Which services are currently most in demand and appropriate for Cloud?
  • How can we advise and prepare ourselves and our clients for cloud adoption?
  • What are the downside risks & hidden costs? How can these be mitigated?
  • Who contracts with the cloud services?
  • Can Cloud be used in the public sector?
Hear a highly knowledgeable panel weighing in on these issues and more.

Risk Based Behavioral Simulation utilizing Digital Twins

Midtown 2 October 30, 2022, 1:45 - 3:00 PM

Presenters:Kelly Watt, Visual Plan
 Patrick Simon, Beehive Technology Solutions
Panelists:Benjamin Butchko, Butchko ESI
 Mark Schreiber, Safeguards Consulting
 J. Kelly Stewart, Newcastle Consulting

Commercial simulation has revolutionized industry since the 1950s. Design of cyber-physical systems, IoT, cloud computing, AI/ML, provide predictive and automated outcomes for digital twin utilization and the smart building or factory. But beyond sensors data, what about the human factor and processes? How can risk-based behavioral simulation provide real answers to human scenarios, predict outcomes, automate outcomes, or prescribe real-time countermeasures through monitoring anomalistic behaviors through a digital twin framework in an integrated physical-cyber environment? Panelists in this session will discuss the value of digital twins in physical and cyber security design and key benefits to operations from use cases in critical infrastructure and transportation. Then, a new model utilizing security sensors, analytics, and behavioral simulation to predict and interdict threats predictively before they cause harm will be presented.

Leveraging Audio Analytics for K-12 School Security

Midtown 2 October 30, 2022, 3:15 - 4:30 PM

Moderator:Chuck Wilson, PASS
Panelists:Richard Brent, Louroe Electronics
 Tom Reilly, Commend
 Dan Rothrock, Zenitel
 Phil Santore, Ross & Baruzzini

The field of audio in surveillance is being revolutionized with the use of audio analytics and the integration with adjacent systems. This session will review some of the latest and most relevant advances, as seen by several of our industry’s foremost audio and intercom manufacturers. As a special use case, applications in K-12 school security will be considered. For example, in 2019, 22% of students ages 12 to 18 reported being bullied at school, with about 15% reported being made fun of or insulted. Audio is uniquely positioned to capture these types of incidents and provide school administrators with the information they need for intervention.

Cyber Security

sponsored by

Milestone Systems

Some Cyber Basics

Midtown 1 October 30, 2022, 9:15 - 10:30 AM

Presenters:Sal D'Agostino, IDmachines
 Rodney Thayer, Smithee Solutions

A number of requests have been received for some cybersecurity training. This session will review of number of highly relevant selected topics which all security professionals should have some familiarity with. These include:
  • Common scanning tools
  • Most vulnerable protocols
  • SSL vs. TLS
  • Device discovery
  • SNMP
  • Digital certificates
  • Secure passwords
  • Encryption (AES, OSDP)
  • Hashing
  • Authentication
  • Wi-Fi vulnerabilities
  • VPN’s
  • Security Controls and Risk

The ABC's of Cyber for Corporate Networks

Midtown 1 October 30, 2022, 10:45 AM - 12:00 PM

Presenters:Joshua Cummings, Paladin Technologies
 Andrew Lanning, Integrated Security Technologies

When it comes to cybersecurity, no two entities are rarely alike in their potential vulnerabilities and cyber needs. However, there are a number of common elements that all should be familiar with. This session will overview a number of these, covering topics such as:
  • Defense in Depth
  • Least Privilege
  • Physical security of IT infrastructure
  • Authentication/Authorization
  • Vulnerability assessments
  • Penetration testing
  • Password policy
  • Cloud services
  • Updates and patches

Incorporating Cyber Security into Specifications

Midtown 1 October 30, 2022, 1:45 - 3:00 PM

Moderator:James Krile, Heapy
Panelists:Steve DeArruda, Business Protection Specialists
 Forrest Gist, Jacobs
 John Nemerofsky, Sage Integration

This is a conversation that’s been held at CONSULT since it was first addressed in 2017. Since then, SIA has introduced the SICC (Security Industry Cyber Certification), the insurance industry has gotten more skilled in analyzing cyber policies, and cyber threats have multiplied. Cybersecurity is addressed in both CSI Divisions 27 and 28. Hear the discussion about the best way to incorporate cybersecurity into project specifications, from product selection to integrator qualifications to closeout submittals…and more.

Recovering from a Cyber Incident

Midtown 1 October 30, 2022, 3:15 - 4:30 PM

Moderator:Gary Hoffner, PSLA
Panelists:Jerrod Johnson, Ferguson Enterprises
 Shaun Moye, Targeted Solutions, LLC
 Patrick Simon, Beehive Technology Solutions
 Brian St.Onge, Dell Technologies

Best practices for recovering from a Cyber Incident start with actions taken long before an incident takes place. How should data and facility redundancies be provisioned – hardware, software, cloud? Have policies, plans, and procedures been evolved, tested, and kept current? Have response personnel been identified and prepared for their roles in a disaster event? A Business Impact Analysis (BIA) assesses the enterprise’s ability to recover from a disaster and should form the basis for a contingency or business continuity plan. What needs to happen in the 48 hours immediately following an incident? This panel will examine elements of preparation and recovery, and it will provide consultants with a basis for further discussions with their clients.

Special Topics

sponsored by


Key Issues in Critical Infrastructure Security

Midtown 3 October 30, 2022, 9:15 - 10:30 AM

Moderator:RJ Hope, Burns & McDonnell
Panelists:Brent Edmunds, Stone Security
 Brock Josephson, Burns & McDonnell
 Mark Schreiber, Safeguards Consulting

Critical Infrastructure has always been ‘critical’, but has become even more so with the enhanced threats brought to the forefront by the Ukrainian War. What is the generally accepted definition of critical infrastructure? Is some portion of this more ‘critical’ than the rest. Which elements of critical infrastructure are most vulnerable? Which sectors are furthest ahead? What sectors have the most dependencies (e.g. those like power which affect many other sectors)? What can electronic and physical security consultants contribute to possible solutions, and should they be expected to weigh in on cybersecurity? This session will feature a discussion of the primary physical and cyber threats to the myriad of potential critical infrastructure targets, and the role for consultants in helping to address them.

Design Considerations for Security Operations Centers

Midtown 3 October 30, 2022, 10:45 AM - 12:00 PM

Moderator:Jon Polly, ProTecht Solutions Partners
Panelists:Heather Conover, Constant Technologies
 Matthew Peterworth, HGA
 Scott Sieracki, Davista.ai

With the advent of intelligent buildings, situational awareness products, analytics, and changing threats, the mission of Security Operations Centers (SOC/GSOC's) has evolved and, so too, have design considerations. Sensor fusion, audio-video integration, system redundancy, AI enhancements, and operator effectiveness are among the many areas to be considered in the design of these facilities. What are the most critical design areas consultants need to be concerned with and what types of products and technologies merit further investigation? Hear about these issues and more as this topic will be discussed at CONSULT for the first time.

Building an Impactful Social Network

Midtown 3 October 30, 2022, 1:45 - 3:00 PM

Moderator:David Morgan, SD Marketing
Panelists:Chad Cooper, Motorola
 Chris Hills, Bosch Security
 Jason Wright, Hakimo

LinkedIn is a powerful social media and networking platform, yet most people in the industry are challenged to effectively use it. Successful social media influencers change the thought dynamic and make LinkedIn an active networking platform that works for them by creating awareness and, ultimately, influence. Attendees of this session will hear from several of the security industry’s leading LinkedIn “micro-influencers”. They have a following of 35,000+ people, many of whom view their posts almost daily; and most these posts receive over 10,000K impressions each. With this extensive social marketing reach into our industry, successful influencers expose the entire industry to new ideas, services and products. Why not become one of them?

Leveraging Intelligent Building Data for Better Security

Midtown 3 October 30, 2022, 3:15 - 4:30 PM

Presenters:Drew Deatherage, Crux Solutions
 Gale Moericke, Crux Solutions

Crux Technology and Security Solutions has pivoted toward the Smart Building market. Their focus is how to leverage all the data that is being created by security, HVAC, lighting, asset tracking, and others. There are some fascinating new developments in this space that will ultimately make us safer by allow us to detect threats sooner and defend ourselves from physical, cyber, and biological threats.

Questions or comments? Contact us at info@AttendConsult.com.

About Us

CONSULT is a security industry event sponsored by SecuritySpecifiers. SecuritySpecifiers is an online community and network of security professionals established to address the need for the physical security industry to more effectively engage with designers and consultants.

Contacts Details