Integrated Security Technologies Inc.的封面图片
Integrated Security Technologies Inc.

Integrated Security Technologies Inc.

安全系统服务

Waipahu,Hawaii 1,597 位关注者

Leading Hawaii to a Safer Place (Since 1998)

关于我们

Founded in 1998, We are Hawaii's leading local electronic security system integration firm. We service most major vertical markets including DOD, Fed Gov, Local Gov, Utilities, Healthcare, Financial, and Education sectors. Our Hawaii contractor's license is # C-21626. We are a Federal 8a, DBE, and WOSB. Our cage code is 1F0P0. For 24x7 Service call 808.836.4099

网站
https://www.istechs.net
所属行业
安全系统服务
规模
11-50 人
总部
Waipahu,Hawaii
类型
私人持股
创立
1998
领域
ID Credentialing ~ Biometrics ~ Digital Video Storage & Analytics ~ FLIR Dealer for Hawaii ~ Avigilon Dealer for Hawaii ~ Lenel VAR for Hawaii和Guam

地点

  • 主要

    94-1388 Moaniani St.

    Suite 204

    US,Hawaii,Waipahu,96797

    获取路线

Integrated Security Technologies Inc.员工

动态

  • 100% of people are vulnerable to manipulation and what it can lead to. IMHO this is a fantastic share for everyone Shawnee, appreciate the operational guidance as well. Put it to work folks, you and those in your life are worth working for 👀

    查看Shawnee Delaney的档案

    CEO, Vaillance Group | Keynote Speaker and Expert on Cybersecurity, Insider Threat & Counterintelligence

    I used to protect national secrets. Now I’m just trying to protect my kids on Roblox. And let me tell you—negotiating with warlords was way easier than negotiating screen time with three tiny humans who think "online friends" are totally safe because "they're nice." Parenting in the digital age? It’s a full-time intel op. One minute they’re building pixelated houses... The next, they’re chatting with strangers, clicking links, or watching “how to be a millionaire” videos made by someone who still lives in their mom’s basement. Here’s what I’ve learned from years of recruiting spies and building insider threat programs: 💡 The most dangerous risks don’t come with warning labels. 💡 Your people (yes, even the little ones) are both your greatest asset—and your greatest vulnerability. 💡 If you’re not the voice of truth online, TikTok, Telegram, or a romance scammer will gladly step in. That’s why I’m kicking off a new content series on Parenting in the Digital Age. Because I don’t want to raise rule-followers (unless they are MY rules!). I want to raise kids who question things, know how to spot manipulation, and lead with integrity—online and off. One simple way to start? Set up a Family “Code Word.” Not just for texts—but for any situation that feels off. 💡 If your kid gets a suspicious phone call or FaceTime... 💡 If someone online pretends to be a friend or family member... 💡 If they’re not sure who’s really on the other end... They can ask for the family code word. No code word? No trust. No further engagement. End the call. Walk away. It’s a simple way to spot imposters, challenge deepfakes, and give your kids a powerful tool to stay in control. And if something still doesn’t feel right? They can text or say that same word to you—no questions asked—and know you’ll step in without judgment. Empower them to verify. Not just comply. Because in a world of synthetic voices and fake video calls, a shared safe word can be the difference between danger and defense. 🛡 Empower, don’t punish. 🧭 Guide, don’t shame. 🎯 Prepare them for weird—before weird finds them (because it is out there!). This series will be filled with real talk. Spy secrets. Family-tested strategies. And no judgement. If you’re a parent, teacher, leader—or just someone who wants the next generation to be a little safer and a lot savvier. Follow me for tips and real talk and drop a ❤️ if you're in this parenting fight too. We’re raising humans in a digital world. Let’s do it with eyes wide open. (Just to be clear—I don’t allow my kids on any online gaming. Zero access. Zero regrets. Yes, I am a mean mom. And, no, the photo is not my child.) #ParentingInTheDigitalAge #DigitalWellness #CyberSafety #RaisingHumans #HumanRisk #OnlineSafety #SpyMomChronicles #CriticalThinking #InsiderThreatStartsYoung #FamilyCybersecurity

    • 该图片无替代文字
  • If you don’t monitor performance, how do you know you’re performing? Thanks Paul, John, and Shaun for sharing their insights!

    查看Paul Rothman的档案

    Editor-in-Chief at Security Business Magazine, part of Endeavor Business Media

    As Christine Lanning told me, #KPIs are "our only scoreboard." Lanning joined fellow expert #security integrator executives John Nemerofsky and Shaun Castillo to explore their favorite Key Performance Indicators to guide a business, shape company culture, and position it for success. Check out my April Security Business Magazine cover story below. https://lnkd.in/eFWtPwFm

  • Thanks Richard, We are increasingly on our own in this unstable business climate, remain #vigilant 👀

    查看Richard Staynings的档案

    Keynote Speaker, Cybersecurity Luminary, Evangelist, Thought Leader, Advocate, and Board Member

    The Google Threat Intelligence team (GTIG) has published new research outlining how IT workers from the Democratic People's Republic of Korea (DPRK) are expanding both the scope and scale of their operations, targeting companies across the globe with more advanced deception and cyber extortion tactics. The report offers a stark reminder that nation-state threats don't always originate with malware—they can also come disguised as job applicants. "DPRK IT workers present a unique threat by posing as non-North Korean nationals and applying for remote employment opportunities around the globe," Google Threat Intelligence wrote in its April 1st blog post. "While they appear to be freelance IT workers, in reality, they are bad actors using the access gained as contractors to enable a range of malicious activities, including theft of intellectual property, planting of backdoors, and stealing money." SecureWorld Drew Todd Cam Sivesind https://lnkd.in/gWsmytQ2

    • 该图片无替代文字
  • Great share Matthew, mahalo sir 🤙

    查看Matthew Rosenquist的档案
    Matthew Rosenquist Matthew Rosenquist是领英影响力人物

    CISO at Mercury Risk. - Formerly Intel Corp, Cybersecurity Strategist, Board Advisor, Keynote Speaker, 190k followers

    Generative AI is a tremendously powerful tool that is utilized by people in every department in some way. The risks of inadvertently exposing sensitive data has skyrocketed with the proliferation of GenAI tools. For a breakdown of the risks, ramifications, and recommendations, check out Kitework's Protecting Sensitive Data in the Age of Generative AI: Risks, Challenges, and Solutions post. Read more: https://gag.gl/XJVTdD Sponsored Post #Cybersecurity #AI #DataSecurity #CyberRisk #Kiteworks

  • A big thank you to Andrew L. Christine Lanning, John Rozmeski, Travis Suemori, Jeffrey Alameida, and Kevin Vegas for representing the Integrated Security Technologies Inc. colors at the ASIS International Hawaii Chapter 134 golf tournament. A good time was had by everyone, not necessarily on every hole. Proceeds go to support scholarships for students pursuing degrees in criminal justice. #leadingHawaiitoasaferplace #golftounament #sectec

  • Powerful testimonial to what we’re doing, why we’re doing it, and why it’s workin; so let’s keep working it 👀 Aloha Erin and thank you!

    查看Erin Grippo的档案

    WISF Power 100 2024 | Emerging Leader 2022 by Canadian Security | Named One to Watch on IFSEC's Global Influencer List 2021 | Security Industry Professional

    A big THANK YOU to all the organizations that supported #ISCWest this year by sending their early-career professionals! The vibrant atmosphere, influx of new faces, and dedication to nurturing young talent were truly evident throughout the event. In the security industry, relationships are paramount, and gatherings like ISC West offer a platform to connect with peers, foster collaborations, and explore career pathways. It's crucial to continue empowering emerging talent through such events, industry programs, thought leadership, and exposure to the vast career opportunities within security. As a young professional passionate about my career, I deeply appreciate the efforts to retain and develop talent within our organizations. Thank you! SIA RISE ISC Security Events RX Global

  • Integrated Security Technologies Inc.转发了

    查看Andrew L.的档案

    Learning 😎 Sharing

    Here’s what victims of failed #security system implementations look like in our ecosystem. Sally survived, that’s not always the case. #ElectronicSecurityIndustry we can do better!

    查看Sally Wynter 👹的档案

    £1k to 7-figure-exit in 6 months age 26🔥 Working on Something New -Better Careers Access for All 🤓 // Grew up on Free School Meals 🥘 // Product & Ideas gal. Championing AUTHENTICITY 🤝

    Dear Mayor of London, Sadiq Khan, Last Thursday I was violently assaulted on a tube train by a stranger. I went to the Help Point at the next station and pressed the emergency button, hoping the man could be caught. I pressed the button at least four times. In the harrowing 30 minutes I waited, no one came...no one picked up the intercom. I later found out that in that 30 minutes a man matching the description of my assailant 𝐚𝐭𝐭𝐚𝐜𝐤𝐞𝐝 𝐚 𝐜𝐡𝐢𝐥𝐝 𝐢𝐧 𝐭𝐡𝐞 𝐭𝐢𝐜𝐤𝐞𝐭 𝐡𝐚𝐥𝐥—and due to the parents deciding not to press charges, the assailant walked free. This happened in front of British Transport police who were not alerted by: A) Station staff who should have picked up my Help Point Intercom B) The Metropolitan Police who I immediately rang and gave a description to minutes after the incident What I'm saying is that this was all PREVENTABLE. And had the correct systems operated in the way they were meant to... This man could have been caught. The child who was kicked at random, didn't have to go through something that may traumatise them into adulthood. I want to make it clear that this isn't an isolated incident. I've had numerous people tell me of similar situations of the Help Point not being responsive. And now that I'm slightly over the initial shock.... I'm angry. Fuming in fact...at the numerous failings that went on that day. When you're in crisis underground, you funnel toward the help point, trusting that help will come. When it doesn’t, you’re left isolated—and even more vulnerable to further attack. 𝐇𝐞𝐫𝐞'𝐬 𝐰𝐡𝐚𝐭 𝐈 𝐧𝐞𝐞𝐝 𝐲𝐨𝐮 𝐭𝐨 𝐝𝐨 𝐒𝐚𝐝𝐢𝐪, 𝐔𝐑𝐆𝐄𝐍𝐓𝐋𝐘: 1) Reach out to me directly at hello@sallywynter.com so we can discuss how to investigate this matter further. 2) Plan an urgent audit of all emergency help points at major Underground stations—test them without warning. 3) If the intercom isn’t answered, set up a an automated message directing staff to the ticket hall for immediate help, and log every instance of no response electronically so that these failures are tracked and addressed. Our safety depends on reliable emergency support. Please fix this now 𝐓𝐨 𝐦𝐲 𝐧𝐞𝐭𝐰𝐨𝐫𝐤, my ask to you is to: - Like, comment on and SHARE this post to your network, friends and family to make sure we make some NOISE. This will get the attention of the press and decision makers. - If someone knows Sadiq or decision makers at TFL/ British Transport Police - please put us in touch via the email listed above. I know you can help me get this in front of the right people to make sure these changes are made and that this lesson is learned for next time, so we can keep each other safe ❤️ #tfl #safety #Londonunderground #metropolitanpolice

    • 该图片无替代文字

关联主页

相似主页

查看职位