ASIS International expects to welcome up to 20,000 traditional security and cyber security practitioners from around the globe to the 59th Annual Seminar and Exhibits (ASIS 2013), Sept. 24-27 in Chicago. (ISC)2, the world’s largest information security professional body and administrators of the CISSP®, will co-locate its third annual Security Congress with ASIS 2013. The event is designed for attendees, who are responsible for protecting their organization’s people, property and information, to learn about best practices in the industry, identify trends in technology, connect with their peers and see the latest security products and services on display in the expansive exhibit hall, McCormick Place.


“The world we live in is constantly changing — as are the threats we encounter. Security professionals must continue to hone their skills in all areas and share lessons learned from both high-profile incidents such as the Boston Marathon bombing and the common challenges we face every day such as data breaches. There is no better place to do that than at ASIS 2013,” said Geoff Craighead, CPP, president, ASIS.


Reflecting the interdependence of information technology and traditional security, the partnership between ASIS and (ISC)², which began with ASIS 2011, broadens the scope of the educational programs. More than 200 education sessions in 24 tracks, inclusive of 80 education sessions for all levels of cyber security professionals, will be presented along with pre-Seminar programs, certification classroom reviews, keynotes and general sessions, networking events, and an exhibit floor of more than 600 manufacturers, inventors, service providers and entrepreneurs.


Among the offerings is an expanded Systems Integrator Track, which debuted in 2011 as a way to help integrators better market their services and reinforce their value to clients. This year, BICSI, the Electronic Security Association (ESA) and the Security Industry Association (SIA) have joined forces with ASIS to provide additional topics of interest to the entire distribution channel.


The International Association for Healthcare Safety and Security (IAHSS) is partnering with the ASIS Healthcare Security Council to deliver educational sessions focusing on healthcare security.



Silicon Valley icon and philanthropist, Steve Wozniak, will deliver the first keynote address on Wed., Sept. 25 at 8:00 a.m. The co-founder of Apple Computer helped shape the computing industry with his design of Apple’s first line of products, the Apple I and II, and influenced the popular Macintosh. Wozniak is a best-selling author with his 2006 autobiography iWoz: From Computer Geek to Cult Icon, and is the subject of the current movie, Jobs. Wozniak currently serves as chief scientist for Fusion-IO.


A unique world view will be presented Thurs., Sept. 26 at 8:00 a.m. by The Honorable John Winston Howard, the 25th Prime Minister of Australia, who served from 1996 to 2007. As Australia’s second longest serving prime minister, he was known for his pro market economic policies, conservative social policy, and fiscal reforms. He serves as chairman of the International Democratic Union, an international group of center/right parties including the Republican Party, and has been awarded the Presidential Medal of Freedom by President George W. Bush. His autobiography, Lazarus Rising, has become the bestselling political memoir in Australian history.


Sports legend, Mike Ditka, will be the closing luncheon speaker on Fri., Sept. 27 at 12:00 p.m. The Hall-of-Famer will share lessons learned in his time as player, assistant coach and head coach of the Chicago Bears. His presentation “ACE” – Attitude, Character and Enthusiasm, highlights the key characteristics people need to achieve their personal and professional goals.


Education Sessions

More than 200 peer-reviewed educational sessions address the full range of up-to-the-minute operational and cyber security topics, critical issues, and security management best practices. Registrants can select sessions from 24 tracks and design a program in line with their interests and career goals. Several sessions will explore topics related to high-profile incidents such as the Boston Marathon bombing, Hurricane Sandy and the Sandy Hook school mass shootings.


General Sessions

An International Policy Roundtable, “From Victims to Vigilantes: Cyber Security Strategies Going on the Offensive,” will be presented Fri., Sept. 27 at 8:00 a.m. Following that session is “Counterfeiting: From Potions and Lotions to Tractors and Turbines” at 9:30 a.m. The final general session at 11:00 a.m., “The Security Professional as a Trusted Advisor,” will present diverse ways for security professionals to work with the C-suite, as well as deal with territorial challenges.



More than 600 companies will demonstrate the latest in traditional and IT security products and services on the exhibit floor, which opens at 9:00 a.m. on Tues., Sept. 24.  Exhibits-only registration is complimentary for both (ISC)2 and ASIS members who register online or onsite. A fee of $75 for non-members will apply after Sept. 20. A new benefit this year for “Exhibits Only” registrants is free admission to the ASIS keynotes on Wednesday and Thursday. In addition, more free education will be delivered in the exhibit hall including in-depth vendor presentations in the Solutions Theater, Poster Sessions, and Tech Trends, which are non-vendor specific 30-minute presentations. 


Career Pavilion

Attendees of both conferences will get answers to their career-related questions and challenges and learn how best to position themselves on the job and in leadership roles at the 2nd Annual Career Pavilion. Sponsored by the University of Phoenix, the Pavilion will feature free career coaching and resume reviews, education sessions, and career services. The Pavilion is open to all attendees of ASIS 2013 and the (ISC)2 Security Congress.


In addition, on Military and Law Enforcement Appreciation Day, Sept. 26, American Military University will host a special panel session focused on transitioning to private sector security.