CST: 02/07/2016 04:34:47   

Security Experts at AMAG, Cisco, EMC, ImageWare, Route1, and Security Strategies Today Discuss Threats and Solutions In Exclusive Interviews On SecuritySolutionsWatch.com

108 Days ago

NEW YORK, NY--(Marketwired - Mar 16, 2016) - EMC Corporation (NYSE: EMC), ImageWare Systems (OTCQB: IWSY); Route1 (TSX VENTURE: ROI).

THANK YOU FOR JOINING US "IN THE BOARDROOM"
Matt Barnette, President, AMAG,
Dave Schmitt, Cisco
, Solutions Architect, IoT Vertical Solutions Group: Utilities
Ken Mills, EMC², Global Marketing and CTO, Surveillance and Security
Jim Miller ImageWare Chairman and CEO
Tony Busseri, Chief Executive Officer and Brian Brunetti, President, Route1
Steve Cocco, 27 year FBI veteran and President, Security Strategies Today

*****

MAKE YOUR PLANS NOW FOR CYBER SECURITY SUMMIT ATLANTA

Tickets are now on sale for the Cyber Security Summit in Atlanta, held on April 6 at the Ritz-Carlton, Buckhead. Experts from The FBI, The US Secret Service, Intel Security, DarkTrace, Securonix will be educating our executive level audience on the latest threats and solutions in the industry. There will also be a technology / solutions showcase of more than a dozen elite cyber companies. Attendance is limited, so reserve your pass today at CyberSummitUSA.com. Your admission includes breakfast, lunch, cocktail reception and access to the speaker sessions and product showcase. Use promo code SSW2016 for half off your admission to the Cyber Security Summit at http://CyberSummitUSA.com

*****

AMAG Technology
SMI Becomes Symmetry Preferred Partner
SMI Certifies Mobile Verification System with AMAG Technology's Symmetry Access Control System
AMAG Technology, an integrated security provider of access control, video management and identity management solutions, is proud to announce that SMI is a certified member of AMAG's Symmetry™ Preferred Partner Program. As a certified partner, SMI's Mobile Verification System integrates with AMAG's latest Symmetry V8 Access Control System. AMAG Technology and SMI cooperatively tested and certified this integration.

"We are proud to welcome SMI to the Symmetry Preferred Partner Program," said AMAG Technology, Vice President of Marketing, Dave Ella. "The integration will allow customers to control access virtually anywhere they choose using a handheld device and extending security beyond the typical perimeter."

"SMI are delighted to announce this new level of integration with Symmetry. We have been working with this platform now for a number of years -- and this takes the overall product to a new level," said Co-Founder of SMI, Dick Clark. "The combination of this software and some new mobile devices makes a very attractive product offering."

SMI's Mobile Verification System allows users to extend the reach of the Symmetry Access Control System beyond physical boundaries. Symmetry integrates with a range of mobile devices which has been jointly developed using the latest API from AMAG. The devices check the validity of a credential and display details of the registered cardholder. The transaction is passed to Symmetry and is available for reporting within Symmetry. A wide range of credential formats are supported. The overall system can operate in either on line or off line modes and support databases of any size.

SMI are a UK based privately held software author. The company specializes in providing mobile extensions to Access Control systems. A combination of software and hand held devices are supplied to provide a total mobile solution -- easy to install and fully compatible with the Access control system in use.

For more information about SMI, visit www.smi-global.net. For more information about the Symmetry Access Control integration with SMI's Mobile verification system, contact your Regional Sales Manager, call 310.518.2380 or visit www.amag.com. For inquiries about the Symmetry Preferred Partner Program, contact solutions@amag.com

For more information, please click here, or here: http://www.amag.com/en-US/Company/News/2016/03/08/SMI%20Becomes%20Symmetry%20Preferred%20Partner/

And, for our complete interview with Matt Barnette, President, AMAG, please click here or here:
www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_MattBarnette.html.

For more information: www.AMAG.com

*****

Cisco

Mr. Dave Schmitt, Cisco, Solutions Architect, IoT Vertical Solutions Group: Utilities, told us, "Utilities are especially popular, high-profile targets for attacks. According to the Cisco Security Capabilities Benchmark Study, 73% of utility IT security professionals say they've suffered a public security breach, compared with an average of 55% in other industries. Most U.S. utilities have already undertaken substantial security measures throughout many parts of their systems. However, the nature of cyber threats and vulnerabilities keeps changing. U.S. utilities have, for several years, been deploying IoT technology (aka Smart Grid) because it enables significant business and operational benefits: increased grid reliability, enhanced integration of renewables and other distributed energy resources, reduced operating costs, and more. However, all of this opportunity comes with the tradeoffs of increased complexity and new risks."

For the complete interview with Dave Schmitt at Ciscoplease click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Cisco_Schmitt.html
Additional Cisco resources on this topic include:

*****

EMC²

Mr. Ken Mills, EMC², Global Marketing and CTO, Surveillance and Security, told us, "Since we last talked, we have launched five new solutions for surveillance. We've partnered with Avnet to build a compute plus storage bundle that greatly simplifies the deployment of an enterprise surveillance solution. With ATOS, a global partner of EMC, we are working to develop and bring to market surveillance storage as a service. As customers begin to consider cloud for their surveillance storage needs, we want to make sure they have a best in class enterprise option.

We have also launched a surveillance solution with VCE, the Converged Platforms Division of EMC. VCE brings together VMware, Cisco and EMC together in a single package for large-scale surveillance deployments. The VCE solutions for surveillance can handle thousands of cameras in a single rack with one number to call for support. It has never been easier to take advantage of this kind of pedigree in surveillance. And, finally we are launching a partner solution with Axis, Genetec and Avaya at ISC West. This partnership delivers "LINK", the security industry's first validated surveillance solution that helps secure video from the device all the way to the storage. It offers a cyber-hardened solution that provides scalability and reliability for enhanced security management while helping to reduce the possibility of a cyber-security breach. The partnership ensures that customers have the best solution to deliver surveillance at scale with the confidence they expect from market leaders in surveillance.

Lastly, we are releasing our second generation of the Video Surveillance Storage platform. We strongly believe that the surveillance market needs unique solutions and to that end we have brought our 6-9s enterprise class storage platforms to the surveillance market. Due to the success we had with our first generation Video Surveillance Storage (VSS), it was a no-brainer to take our most current generation storage platform and customize it for the surveillance market."

For the complete interview with Ken Mills at EMC, and Terry Gainer please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_EMC_Gainer.html.

For more information about evidence management solutions at EMC, please click here: "Evidence Storage: In the cloud or not?" or here: www.emc.com/collateral/handout/emc-on-prem-vs-cloud.pdf.

And, for general information on EMC Surveillance solutions, please click here, or here: www.emc.com/surveillance.

*****

ImageWare Systems, Inc.
ImageWare Systems and Aruba Deliver Biometric Security for Enhanced Network and App Defense  
Integrated Solution Enables Seamless, Multi-Factor Authentication with Enhanced Protection
ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has integrated its GoVerifyID® product with the ClearPass Policy Manager from Aruba, a Hewlett Packard Enterprise company. The integrated solution will provide ClearPass customers with a seamless option for enhanced network and application security on any mobile or computer platform.

Aruba ClearPass is a multi-vendor wired and wireless network access security solution. Its multi-vendor integration capabilities make it a leader for AAA replacement, guest access, BYOD, and IoT visibility in any network environment. In fact, ClearPass has consistently been positioned in the Leaders quadrant of Gartner's "Magic Quadrant for Network Access Control." ClearPass is used to manage over 65 million endpoints worldwide.

"The addition of biometric based MFA to the ClearPass policy framework reinforces Aruba's leadership in security and NAC management," said Vinay Anand, ClearPass VP/GM at Aruba. "The added biometric security provided by ImageWare's GoVerifyID offers an extra layer of protection for customers who are increasingly concerned with identity assurance."
ImageWare Chairman and CEO Jim Miller commented: "ImageWare's position as a leader in biometric authentication continues to be validated by providing flexible, highly-scalable, and patented multi-modal biometric solutions to industry leaders like Aruba. The integration of GoVerifyID with Aruba's ClearPass adds an unsurpassed level of identity assurance and security to wired and wireless networks. We look forward to delivering an enhanced user experience and trusted biometric security to Aruba's customers worldwide."

GoVerifyID®, which is a part of the IWS' patented CloudID® product suite, includes a Software Development Kit (SDK) that enables rapid integration into existing business processes and applications. The technology verifies user identity using the enrolled biometrics of their choice via a mobile device. In addition to being algorithm and hardware agnostic, GoVerifyID enables plug-n-play technology and can be deployed globally as an enterprise end-to-end solution. Implementation takes only a matter of hours as opposed to days or weeks. To learn more about ImageWare Systems' GoVerifyID, please go to:http://iwsinc.com/products/goverifyid/.

For our complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html . For more information: www.iwsinc.com

Online resources
 
- Read the IWS blog: http://iwsinc.com/imageware-blog/
 - Follow IWS on Twitter: https://twitter.com/IWSINC
 - Follow IWS on LinkedIn: http://www.linkedin.com/company/imageware-systems-inc.
 - Like IWS on Facebook: https://www.facebook.com/imagewaresystems
 - IWS' YouTube channel: http://www.youtube.com/channel/UCjcTr2UMoDRfODCVBD3Ng3A
 - For regular news updates, bookmark IWS' newsroom: http://iwsinc.com/latestnews/

*****

Route1
Route1 Receives ATO for MobiKEY from the U.S. Department of the Interior
Route1 Inc. (TSX VENTURE: ROI) (the Company or Route1), a leading provider of secure access technologies for the mobile workspace to protect businesses and government agencies, announced that the U.S. Department of the Interior (DOI), after completing its accreditation process, issued an authority to operate (ATO) for the MobiKEY technology and the DEFIMNET platform that the U.S. Fish and Wildlife Service (FWS) installed at a secure DOI hosting facility in March 2015.

"The MobiKEY technology is one of the core components in our bureau mobility and desktop virtualization strategy. After extensive piloting across all our regional offices we found that it delivers an exceptional level of functionality and flexibility across a wide gamut of use cases, while at the same time exceeding the strictest departmental and federal security requirements", said Ken Taylor, FWS' Assistant Director, IRTM and CIO. "As an added value, we found the MobiKEY technology out of the box enhanced our Citrix VDI solution -- delivering portability and astounding performance. With the accreditation of the DEFIMNET completed, and a full ATO granted by the Department of Interior, we envision rapid adaptation of the solution across all the DOI bureaus. It will enable the department to strengthen its HSPD-12 compliance without incurring any capital outlays."

For more information, please click here, or here: https://www.route1.com/investors/press-releases/item/761-route1-receives-ato-for-mobikey-from-the-u-s-department-of-the-interior.html

In other recent news...
Tony Busseri, Chief Executive Officer, Route1, Discusses Data Breaches, Cybersecurity & More on Security Guy Radio

Route1 Provides Q4 Operations Update
(https://www.route1.com/investors/press-releases/item/762-route1-provides-q4-operations-update.html)

Route1 Reports Sixth Consecutive Quarter of Subscriber Growth
 (www.route1.com/investors/press-releases/item/759-route1-reports-sixth-consecutive-quarter-of-subscriber-growth.html)

Route1 Comments: Continued Data Breaches Demonstrate Need to Dispel Dangerous Myths
 (www.route1.com/investors/press-releases/item/758-route1-comments-continued-data-breaches-demonstrate-need-to-dispel-dangerous-myths.html)

Route1 Announces the New Standard in Secure Mobility
 (www.route1.com/investors/press-releases/item/757-route1-announces-the-new-standard-in-secure-mobility.html)

And, for our complete interview with Mr. Brian Brunetti, President, Route1, please click here, or here
 http://securitysolutionswatch.com/Interviews/in_Boardroom_Route1_Brunetti.html

Download the MobiKEY Technology Overview, please click here, or here: https://www.route1.com/mobikey-technology-overview.html

*****

Security Strategies Today

Mr. Steve Cocco, President, Security Strategies Today, told us, I have dedicated my professional life to law enforcement and security and am now the president of my own company. I got here after 27 years with the FBI, having started off in the Bureau's New York office as a linguist in the 1980s. I was so impressed with the professionalism of the agency that I decided I wanted to become an agent and was honored to be given the opportunity. I spent several years as a field agent in San Diego and New York before going into management. That took me to Rome, Italy, where I was assigned to the US embassy to support the FBI's mission overseas. I also responded to the US embassy bombings in East Africa and conducted extensive FBI-sponsored training to foreign law enforcement partners in Africa and in Latin America. I was given the opportunity to set up the FBI's Joint Terrorsim Task Force in the San Juan, Puerto Rico division and finally served as Assistance Special Agent in Charge in Phoenix. It was just an amazing career with outstanding people and opportunities.

We are a full service security consulting firm and we spend the bulk of our time and efforts on conducting threat and risk assessments for private clients, including companies and small businesses. As part of our efforts to enhance the security posture of companies that have a limited budget, we recently put together low cost packages that allow a business to get an on-site security assessment conducted by professionals. 

A key aspect to our threat assessment modeling includes providing the familiarization training to management which enables it to identify possible "insider threats" to the business. Quite often, the most significant threat to safe and secure operations stems from employees or contractors who abscond with company data, merchandise, cash or intellectual property. Although these may all be chargeable offenses, why not take proactive steps to spot trends and activities that are suspect and implement measures to counter these threats before a loss is incurred? 

For the complete interview with Steve Cocco, President, Security Strategies Todayplease click here, or here:

www.securitysolutionswatch.com/Interviews/in_Boardroom_SecurityStrategies_Cocco.html

*****

Would your company like to be featured in our "In The Boardroom"© Security Thought Leadership Series?
Metrics confirm that "content marketing" is the most effective form of messaging for awareness, branding and lead generation.
Please contact us for a quick tour and free consultation to see exactly how YOUR SOLUTIONS will be featured?
Mark Elliott:MBE@SecuritySolutionsWatch.com, or call 1+914.690.9351, to set up a call.

And, please visit us on Twitter, please click here , or here: https://twitter.com/SecStockWatch

*****

SECURITY TRADE SHOWS EVENTS

We are proud to be media sponsors of these important upcoming security events and trade shows...

Connect:ID 2016: Physical & digital identity in the 21st century
March 14-16, 2016 - WEWCC, Washington, DC, USA

One global exhibition • Three focused conferences • Countless opportunities

  • biometric ID:HUB
  • mobile ID:HUB
  • secure ID:HUB

Welcome to connect:ID - three simultaneous international conferences and a global exhibition that focus on all aspects of identity technologies and the opportunities for their management in both the physical and digital worlds.
The event takes place March 14-16, 2016 in Washington, DC with the conferences running for 3 days and the free-to-visit exhibition open for 2 days - March 15-16.

connect:ID unites solutions adopters and stakeholders from around the world to explore the development and fusion of multiple advanced identity technologies - including biometrics, secure credentials and mobile identity systems.

This event is brought to you by Science Media Partners and the International Biometrics & Identification Association (IBIA) and brings together all the players in the international identity market. www.connectidexpo.com

*****

Cyber Security Summit Atlanta:

Tickets are now on sale for the Cyber Security Summit in Atlanta, held on April 6 at the Ritz-Carlton, Buckhead. Experts from The FBI, The US Secret Service, Intel Security, DarkTrace, Securonix will be educating our executive level audience on the latest threats and solutions in the industry. There will also be a technology / solutions showcase of more than a dozen elite cyber companies. Attendance is limited, so reserve your pass today at CyberSummitUSA.com. Your admission includes breakfast, lunch, cocktail reception and access to the speaker sessions and product showcase. Use promo code SSW2016 for half off your admission to the Cyber Security Summit at http://CyberSummitUSA.com

*****

Geo IoT WORLD

Geo IoT World is a 2-day conference, exhibition and testbed focused on the new location-aware technologies and use cases at the intersection of IoT, location and analytics.

SCOPE: "Disruptive geo-aware techs, inspiring use cases"
From LPWA networks to Location Intelligence, from BLE-Beacons to mobile LBS, the conference covers state-of-the-art geolocation technologies, their implementation best practices, illustrated by the most inspiring use cases from key verticals: Retail, Smart Home, Smart City, Enterprise and Transport/Automotive.

FORMAT: a high level conference & beyond
In addition to the expertise delivered by 70 speakers in two parallel tracks, the conference features an exclusive indoor positioning testbed along with an exhibition of latest solutions and demos in the field. The most innovative products/applications newly launched will also be recognized through the Geo IoT World Awards.

WHAT'S IN FOR 2016?
Built by its Program Committee, the Geo IoT World agenda will give the IoT, location and analytics technologies stakeholders concrete answers to unleash the power of geolocation in their solutions and deployments:
• Which wireless technologies is the best for precision indoor location?
• How to provide ubiquitous location services?
• How to derive intelligence from trillion of geo-aware data points?
• How to leverage geodata in a business intelligence strategy?
• What are the opportunities of geolocation for app developpers?
• The privacy risks and challenges of collecting user's geolocation

*****

IFSEC

The global stage for security innovation and expertise, IFSEC International, will converge again at ExCeL London from 21-23 June 2016. It is your chance to speak to the suppliers of the world's leading security solutions and products. Learn best-practice from industry experts and set up new business through the various networking opportunities available to you over the three days. You will see products from all key areas of security; access control, surveillance and detections, deterrence and perimeter security.

Not to be missed at IFSEC 2016 will be the Home Automation Feature, where products and solutions will be demonstrated and discussed. The zone will explore how traditional security solutions can be interconnected and interoperable to play a vital role in the advanced security architectures of the world around us, providing stronger resilience, greater security and a safer future.

The global stage for security innovation and expertise, IFSEC International, will converge again at ExCeL London from 21-23 June 2016. It is your chance to speak to the suppliers of the world's leading security solutions and products. Learn best-practice from industry experts and set up new business through the various networking opportunities available to you over the three days. You will see products from all key areas of security; access control, surveillance and detections, deterrence and perimeter security.

Not to be missed at IFSEC 2016 will be the Home Automation Feature, where products and solutions will be demonstrated and discussed. The zone will explore how traditional security solutions can be interconnected and interoperable to play a vital role in the advanced security architectures of the world around us, providing stronger resilience, greater security and a safer future.

*****

Infosecurity Europe

Infosecurity Europe 2016 registration is now open. Join over 315 exhibitors showcasing the most diverse range of products and services to 12,006 visitors.

Choose from over 160+ hours of high-qualityeducational sessions in our free to attend conference programme, bringing 260+ international thought leaders. Take advantage of our conference to develop your career and skills. This is a great chance to enhance your professional development and to collect valuable CPE / CPD credits.

Explore and network. We bring you 3 exciting days of multiple opportunities for you to network with a global audience of over 15,000 information security professionals, all under one roof.

Be part of the information security community. Join us at Olympia, London on 7-9 June 2016. Register to attend for free.

*****

IP EXPO Manchester
IP EXPO Manchester is part of the IP EXPO event series, the UK and Europe's number one enterprise IT event series, which also includes IP EXPO Europe in London and IP EXPO Nordic in Sweden. Launched by organisers Imago Techmedia in 2015, the event now encompasses six events under one roof including Cloud and Infrastructure, Cyber Security, Data Centre, DevOps, Data Analytics and Unified Communications. Designed for those looking to find out how the latest IT innovations can drive and support their business and transition to a digital future

The events showcase brand new exclusive content and senior level insights from across the industry, as well as unveiling the latest developments in IT. It covers everything you need to run a successful enterprise or organisation.

This year's speaker line-up includes Mandy Waite, developer advocate for Google Cloud Platform; Ian Massingham, technical evangelist at Amazon Web Services; and VMWare's chief technologist Duncan Epping, with the opening keynote yet to be revealed.

The inaugural event in 2015 saw over 3,400 attendees through its doors, 73 speakers hosting free-to-attend seminars covering all aspects of IT, and 72 exhibitors in total. 2016's event will focus more on emerging technologies and supporting business transformation through these platforms.
For full details and to register FREE, visit http://www.ipexpomanchester.com/

Press contacts: Meera Lakhani/ Beth Robertson, 020 3176 4700, ipexpomanchester@kaizo.co.uk
Speaker or exhibitor enquiries: Sophie Barry/Matthew Stubbs, 0203 841 8500

*****

SDW 2016 - Security Document World - 10 th Edition
Conference: 10-12 May, 2016 - Exhibition: 11-12 May, 2016
QEII Centre, London, UK

SDW - now in its 10th year - is a world-leading event providing a global showcase for next-generation human identity solutions, focusing on intrinsic document security and on the new cutting-edge secure infrastructure now required to produce and use these advanced documents in live situations.

At the heart of the event is our exhibition - the biggest in the world for security documents. With over 130+ exhibitors and a visitor-ship from across the globe, SDW is the perfect meeting place for all attendees to exchange ideas and source solutions that meet their requirements.

Designed by the editors of the critically acclaimed Security Document World news and information portal, our conference programme is always packed with an international line-up of quality speakers who will deliver an imaginative programme on issues that are of real consequence. www.SDW2016.com

*****

Sea-Air-Space Exposition
Defense Secretary Ashton Carter Will Speak at Sea-Air-Space Luncheon

Secretary of Defense Ashton B. Carter will be the keynote speaker at the "Sea-Air-Space Luncheon" May 17, the second day of the annual Sea-Air-Space: The Navy League's Global Maritime Exposition. This will be Carter's first time speaking at Sea-Air-Space and the first time in six years that the incumbent secretary of Defense has spoken at the conference.

The Sea-Air-Space Luncheon, slated from 12:15 p.m. to 1:45 p.m., often serves as the platform for some of the sea services' most influential voices to provide important and topical information. In 2015, Adm. Paul F. Zukunft, the 25th commandant of the of U.S. Coast Guard, provided an overview of the way forward for the service and discussed central missions, priorities and key issues for the agency to more than 1,000 attendees.

"Ashton Carter has a distinguished record of service to national security and is dedicated to the men and women who make our nation a safer place," said Kevin Traver, the Navy League's staff vice president of Corporate Affairs. "We are honored to have him address the sea services community at this year's Sea-Air-Space."

Tickets for the Sea-Air-Space Luncheon and other special events are available during the badge registration process. See our complete list of special events, open to all registered attendees.

Sea-Air-Space attendee registration is free to U.S. military, government and other qualified individuals. Attendee registration, event tickets and trade fair details are available at seaairspace.org. Conference Schedule updates are posted frequently, check back here.

ABOUT THE NAVY LEAGUE

The Navy League of the United States was founded in 1902 with the encouragement of President Theodore Roosevelt. The Navy League provides a powerful and consistent message to Congress and the American people about the need to maintain strong sea services. The Navy League has grown to become the foremost citizens' organization to serve, support and stand with all the U.S. sea services -- the Navy, Marine Corps, Coast Guard and U.S.-flag Merchant Marine. Since the Navy League's founding, it has grown to become a worldwide organization with 43,000 members, more than 250 councils and over 240 corporate and community affiliate members. To learn more about the Navy League of the United States please visit www.navyleague.org.

Press Inquiries: Megan Alexander, 917.746.4519, megan.alexander@clarionevents.com

*****

Smart Card Alliance Payment Summit

The Payments Summit is the premier industry event covering all things payments, including FinTech, EMV chip technology, mobile wallets, NFC, contactless, open transit systems and more. Attend the 9th annual Summit and get the latest on all of these exciting technologies and the many business opportunities they can unlock. 2016 will mark the first time that the Smart Card Alliance and the International Card Manufacturing Association (ICMA) are co-locating their events, giving attendees a broader perspective from the core manufacturing and personalization of a card, to the rapid evolution in secure payments.

*****

TEC

TEC, presented by PSA Security Network, is the premier education and networking event that is open to everyone in the physical security industry. TEC offers quality education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of security industry professionals. For 2016, TEC goes "Beyond the Edge," offering educational programs focused on industry trends and polishing attendees' business acumen with specific learning tracks for sales and marketing, operations, business owners and technical professionals. All TEC attendees benefit from the comprehensive registration package that includes access to all networking events, meals and all non-certification conference courses at no additional cost. This year's program offers over 50 new courses, six unique learning tracks designed to educate entire business teams, over 100 premier vendors during exhibit day, and endless networking opportunities. To learn more or register, visit www.psatec.com . 

*****

TECHEXPO Top Secret March Hiring Events:
TECHEXPO POLYGRAPH ONLY Hiring Event - April 13 & 14
Hiring Events April 13 & 14: Leading Defense Industry Employers are seeking experienced Polygraph-Tested Professionals. Interview face-to-face at the TECHEXPO Top Secret Hiring Events on April 13 at the BWI Marriott, and at the Ritz-Carlton Tysons Corner on April 14. Meet with hiring managers from PWC, Vencore, Parsons, CGI, Jacobs FNS, BAE Systems, Deloitte, HP, and more! A CI or Full Scope Polygraph Clearance is Required to attend. For details and registration visit: www.TechExpoUSA.com

*****

THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.securitysolutionswatch.com/Main/Terms_of_Use.html .

*****