This event is for you if have regional, national or global physical security program or security operations responsibilities.

This event is for you if you are a CSO, VP or directly report to one, or are a director or manager, and . . .
One or more of these apply:

  • Role in Enterprise Security Risk Management (ESRM) program creation or execution for corporate, cyber or physical security risk scope
  • Some or full responsibility for physical security operations
  • Development or approval role for an AI for physical security strategy
  • Interest in learning how your security function can benefit from digital transformation and culture improvement initiatives
  • Cybersecurity responsibilities for electronic physical security systems
  • Responsibility for site security at multiple locations
  • Major role in business continuity and disaster recovery planning and/or execution
  • Workplace Violence Prevention program responsibilities
  • Interest in moving beyond reactive / responsive security to achieve proactive, predictive and preemptive capabilities
  • Responsibility for physical security technology design, deployment or utilization
  • Large legacy physical security systems that you want to upgrade in security-effective and cost-effective ways
  • Security camera deployment of  500 or more cameras
  • Instrumental role in implementing organizational resilience
Earn up to 11.25 hours of Continuing Professional Education Credits

Day 1:
Security Leadership

Discover the most successful approaches to reducing security risks to acceptable levels, at an acceptable cost, in a manner that is enabling to the business.

What does it mean to establish uniform physical security due diligence across all your facilities?

What are your roles in your organization’s digital transformation and culture improvement efforts (including Diversity, Equity, Inclusion and Belonging)? How do these intersect with the scope of your security function? Do your organization’s other leaders understand the contribution these initiatives can make to proactive and preventive security, in addition to effective security response?

As these initiatives roll forward, don’t let your security function be left behind!

Discover what the true scope of proactive and preemptive workplace violence (WPV) prevention in a modern organization, and how it can address the commonly hidden  WPV corporate liability gaps that your organization may have.

Learn More

Day 2:
Technology Command

Walk away with technical insights that will help you get a better grip on your security technology infrastructure and prepare for emerging technologies.

Learn what it means to have the right combination of AI, automation and people in the deployment of emerging technologies to maximize the force multiplier effects of your physical security technology, and enable security operations enhancements at a smooth and non-disruptive pace.

In a hands-on mode, closely examine cloud-based security system capabilities.

Explore what a future-ready risk-oriented Security technology strategy would look like. Consider how to migrate from your current security technology infrastructure to what will give you the security operations and management capabilities in the near future.  

Attendance is limited to 50 seats to make hands-on technology interaction possible for all attendees.

Learn More

GSO Participant Video Testimonials

Participants in previous GSO Events share their excitement and explain how GSO is so very different from other security conferences and workshops.

This is the original security practitioner event based on a 5-year look-ahead at where business trends and technology trends can take you.

See how you can use advanced technologies to bring your security operations capabilities to where they will need to be in the next 3 – 5 years.

Watch the Testimonials

How to Make This Event HIghly Relevant to You

In advance of the event, you’ll be able to share with us the kinds of details you’d like to hear about the session topics.

We also have some assessment worksheets that you can use ahead of the event to rate the elements of your security program, assess the strengths and weaknesses of your security technology infrastructure, These can help you sharpen the focus of your questions, interactions and networking during the event.

View the Day One and Day Two Agendas