IAPSC 2025 Annual Conference - Program
Take a look at some of the topics being covered at the IAPSC 2025 Conference in San Diego, CA!
Tuesday, April 29th
Pre-Conference Workshop -1pm- 5pm PT
Pre-Conference Program on Cybersecurity with Pierre Bourgeix, CEO, Founder ESI Convergent
Join us on Tuesday, April 29th for an engaging pre-conference session led by Pierre Bourgeix, a renowned cyber and physical security expert. This program will explore the latest trends in cybersecurity, the growing interrelatedness of cyber and physical security, and the impact these changes have on security operations. Pierre will delve into the unique cybersecurity challenges facing IAPSC members, including the concerns and risks associated with their own business operations. Gain insights into how these evolving threats can affect your security strategy and learn practical approaches to safeguard your business in an increasingly interconnected landscape.
Registration Workshop Add On: $200 - please process with your registration. If you have already registered, kindly reach out to the IAPSC office at iapsc@iapsc.org for support.
Wednesday, April 30th
The Security Experts use of the “Standard of Care” from the Intake of a Case to the Final Verdict presented by Mike Haggard, Managing Partner, The Haggard Lawfirm
This highly interactive presentation will rely upon some of the most intriguing real cases that have been tried to an actual jury in the field of Negligent Security cases. The purpose of this presentation is to instruct Security Experts on how to understand what the Standard of Care is in the field and for the actual case that they are retained on. The Security expert will not only learn how to use the Standard of Care to develop opinions, but also, importantly, how to avoid any Daubert challenge.
Real cases examples will be used throughout the presentation on how to use the applicable Standard of Care in expert reports, expert depositions and in actual trial. The first thing all security experts must know is what is the applicable Standard of Care for that industry and that particular case. This is where it all starts, and various real-life examples will be shown throughout the presentation. Once a Security expert recognizes and decides upon the applicable Standard of Care for that particular case, how does the expert use it to explain, justify and support their ultimate opinions in the case? This presentation will explain how best to use the standards and guidelines in your case most effectively to a Judge and Jury. How do you use relevant studies and documents throughout your work on the case? Not only will an expert leave this presentation with a thorough understanding of how to use the relevant Standard of Care, but they will leave confident in their ability to explain this to a real-life jury.
Securing Large Scale Projects: Lessons, Challenges, and Stakeholder Alignment presented by Thomas J. (TJ) McComas, PMP, PSP, Principal Security Consultant, Bastion Security Group LLC.
In this session, we will explore key security insights gained from a major public-private partnership (P3) project. Attendees will learn about the challenges in defining the scope of security systems and how these complexities can impact project success. We’ll discuss strategies for securing stakeholder buy-in, ensuring recommended security measures match business needs. Lastly, we will discuss how effective collaboration, and clear communication can enhance security outcomes and drive successful project delivery.
De-escalation and Situational Awareness, presented by Doug Simpson, Chief Security & Surveillance Officer, Gila River Resorts & Casinos
Gain insight into effective de-escalation strategies and situational awareness techniques that consultants can use to guide clients. Interactive discussion in managing conflicts and responding to high-stress situations, promoting safety and preventing escalation.
Body Worn Cameras in proprietary Security: A gaming operators case study on implementing a BWC program with Eric Golebiewski and Jay James, Caesars Entertainment
This presentation explores the implementation and impact of Body-Worn Camera (BWC) programs within proprietary security operations, focusing on a case study of a major domestic casino operator. The discussion examines the unique challenges and opportunities associated with deploying BWCs in a high-stakes, fast-paced environment where security and guest experience are paramount. Key topics include the development of policies and procedures tailored to armed security special response team casino operations, compliance with legal and regulatory requirements, and the integration of BWCs with existing security technologies.
The case study highlights the practical considerations of launching a BWC program, from training security personnel to managing data storage and privacy concerns. Additionally, it evaluates the effectiveness of BWCs in enhancing accountability, reducing incidents, and improving conflict resolution. By analyzing outcomes and lessons learned, this presentation offers valuable insights for security professionals and operators considering similar initiatives.
Designed for security managers, compliance officers, and industry stakeholders, this session aims to provide actionable strategies and best practices for implementing BWCs in proprietary security settings, ensuring a balance between operational efficiency and guest satisfaction.
Thursday, May 1st
Building Effective Security and Emergency Preparedness Programs: Foundations, Collaboration, and Sustainability for Security Professionals with Dr. Stephen Bayne, Framework Synergy Solutions
Security experts play a crucial role to ensure their clients are prepared for, able to effectively respond to, and ultimately recover from emergencies. Today, security and emergency preparedness for businesses and industries are complex, and often, CEOs and other business leaders do not know where to start or get stuck in the process. Building a successful security and emergency preparedness program starts and continues with the right people. Establishing an internal and external collaborative group is key to laying a strong security and emergency preparedness foundation. Once this foundation is in place, sustainability can be built over time. Most importantly, security and emergency preparedness programs need to be grounded in reality and operational framework.
Navigating Security Challenges in Cloud Video Applications
Explore technical design considerations, implementation strategies, and best practices for optimizing cloud-based video solutions.
Business Development trends, tips, and tools: Artificial intelligence, knowledge management, and more, Presenting: Frank Pisciotta on Knowledge Management, Kelly Stewart on AI and Knowledge Management, Drew Neckar on Business Development & Social Media Presence, moderated by Ken Wheatley.
Forensic Methodology – The Gold Standard for Expert Witnesses, with Steve Kaufer and Alan Zajic.
Bullet-proof your report and opinions by following the Forensic Methodology developed by the IAPSC in 2000. Recognized by Courts across the United States, the Forensic Methodology demonstrates your adherence to a widely accepted consensus-based and peer-reviewed best practice for the evaluation of security-related litigation.
Whether you’re just starting out in the forensic field, or have hundreds of cases behind you, learn from a panel of seasoned forensic experts how best to use the Methodology to bolster your credibility and ensure that you can defend your opinions. By the end of this interactive session, you will learn:
- How to cite the Methodology in your report for maximum impact.
- How to support your opinions with the Methodology and reduce the potential for a Daubert challenge.
- Explain evidence review deviations from the Methodology that might be necessary.
- Compare your accepted best practice to the DIY methods of the opposing expert.
- How to best explain the differences between a security risk assessment, threat assessment, and vulnerability assessment/security survey to a lay audience at deposition or trial.
Interested in a one pager of the program? Click here to download.