Logo remediation technology
October 14 - 16, 2025
The Westin
Westminster, CO
Conveniently Located between Boulder & Denver
search
linkedin youtube
  • Create Account
  • Sign Out
  • My Account
October 14 - 16, 2025
The Westin
Westminster, CO
Conveniently Located between Boulder & Denver
Logo remediation technology
  • HOME
  • SUBMIT ABSTRACT
  • REGISTER
    • Registration Fees
    • Register Now!
  • ATTEND
    • Agenda
    • Why Attend The Summit
    • Attended Companies
    • 2024 Photo Gallery
  • PRESENTERS
    • Scientific Advisory Board
    • Keynotes/Session Chairs
    • Platform Presenters
    • Poster Presenters
    • Student Presenters
  • SPONSOR/EXHIBIT
    • Become a Sponsor or Exhibitor
    • Exhibit Floor Plan
    • Event Logos & Ads
  • STUDENTS
    • Student Program
    • Past Student Winners
  • TRAVEL
  • NEWSLETTERS
  • CONTACT
    • Stay Connected
    • Show Staff
Home » Store » Security Convergence

Security Convergence

No Comments

Product Details

 

By
Dave Tyson, MBA, CPP, CISSP

Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets.

Audience:
Chief Security Officers (CSO), Chief Information Security Officers (CIO), compliance officers, security managers, IT security managers, security consultants, security building automation and controls vendors, security technology manufacturers and system integrators, network security systems professionals.

Post a comment to this product


Report Abusive Comment

Get our eNewsletter delivered to your inbox!

Stay in the know on the latest environmental sciences & remediation news and information.

SUBSCRIBE TODAY

BNP Events

Privacy Policy | Code of Conduct

Copyright ©2025. All Rights Reserved
Design, CMS, Hosting & Web Development :: ePublishing