Announcing Ascend 2024!
Get ready for the much-anticipated return of Ascend: Resolver Security Summit!
Ascend brings together security leaders from diverse industries to share the latest security insights and trends in the field. Network with peers, get hands-on training, and earn CPE credits while enjoying beautiful San Diego, California
Join Security Leaders to Discuss What’s Next in Corporate Security
Register now to take advantage of early bird pricing — save $200 off a general pass!
A look back at the 2023 Ascend Program
Grab your badge and welcome package as you officially check-in to the conference. Take your time to get settled into the Woodlands Resort, read through the agenda for the upcoming days, and enjoy the venue.
Join us for a fun-filled evening and meet and network with other conference attendees, speakers, and sponsors. Drinks and apps are on us!
Chief Linskey takes his audience with him on a journey throughout his career which ended as Boston’s top cop. His presentation has audience members feeling as if they are running towards bullets and bombs with the Chief as he leads the hunt for the terrorists during the Boston Marathon Bombing Attack.
Linskey began his career with the Boston Police Department as the youngest officer in their history starting his service before he could legally possess alcohol. Three days before his official graduation from the police academy he was put in a blue uniform, given his service revolver, and assigned to the corner of Boylston and Hereford Streets to protect the Boston Marathon. He rose through the ranks in various assignments during triumph and tragedy always working as a member of, developing, or leading highly effective teams and units. His entire career Chief Linskey had been striving and working towards becoming the best leader he could be while developing his team.
His quest for leadership took him to the swamps of the U.S. Marine Corps boot camp at Paris Island to the Crossroads of the Marine Corps at Quantico, the Marine Officers training program. It had him climbing trees and hiding in dumpsters as he led squads of undercover officers conducting operations against violent street gangs, and drug dealers. It lead him to the halls of Harvard’s elite executive development programs, and back to Quantico at FBI National Academy. His leadership journey included watching great leaders at their best as well as some leaders who would fall short during their assignments and challenges.
His work ethic, knowledge, ability to drive results and effectively develop teams, and his ability to be at his best during challenging circumstances, led to his appointment as Chief of the Department at the age of 43. Twenty-Seven years after he started his career he arrived at the same street corner where he first wore his blue uniform to see devastation beyond his worst nightmares. He was overwhelmed by the carnage and froze for the first time in his career. Fearing for his life and the hundreds of others around him he wanted to flee but knew that was not an option. He took several deep breaths and forced open his "File Cabinet of Leadership", he had been accumulating information in his brain his entire life. He opened that cabinet up and led his team as they raced to save lives and find those responsible.
His presentation will provide lessons on leading before, during, and after the crisis. The Chief will share how he and others effectively led team members to prepare and respond to unthinkable challenges. The Chief’s presentation will at moments have the audience laughing, most assuredly learning and thinking, while oftentimes wiping a tear from their eye as he shares what his community, cops and his family went through that week in April. He will provide information for everyone’s "File Cabinet of Leadership."
The Four Pillars of Successful Threat Protection Programs
Organizations with highly impactful threat protection programs master four key capabilities: signal detection, signal enrichment, threat assessment, and response. Join us to learn how leading threat teams master these areas and provide a template for building greater maturity in your threat program, so you can find the potential in your data and prevent the next major incident.
Incident Management: Tips to Help You Make the Most of Your Application
This session offers an end-to-end walk-through of our incident management application which empowers security teams to protect their organization and prove their value by providing better visibility, clearer insights, and greater efficiency.
Building A Strong Foundation – Best Practices for Creating and Modifying Objects in Resolver
Objects form the foundation on which all aspects of Resolver are built. In this session, you'll learn how to create and modify the objects you need to build robust and efficient process that support your objectives.
The Intersection of Threat Intelligence, Case Management and Protecting People – Through the Lens of Executive Protection
Steve Powers will lead an interactive discussion about the importance of curated information and intelligence when protecting Executives. Steve will focus on the various shades of gray and how important information curation is in making serious decision about protecting our leaders. Furthermore, Steve will discuss the role(s) and limitations of (1) immediate raw intelligence in times of crisis, (2) refined actionable intelligence products and (3) routine delivery of intelligence products to inform the overall Executive Protection Program or function – and more importantly establishing the mechanisms for the timely passage of each to those who need to know at the various stages of the threat lifecycle.
Incidents to Insights
Better visibility, clearer insights, greater impact. The world's leading corporate security teams rely on their ability to effectively capture and analyze security data to protect their organization and prove their value. This session will provide an overview of best practices for capturing incident reports, case evidence, and other security data from across the organization, how-to transform incidents into insights and analyzing key risk and performance indicators and how-to create data-driven recommendations to fast-track security investments
Maximize Your Operational Efficiency - Introduction to Workflow Building & Customization Pt 1
In this session, you'll learn how to build and customize workflows to match your processes.
Workplace Violence and Active Assailant Preparation - A Holistic Approach
Matt and Daniel will lead an interactive discussion about what leading-edge organizations are doing to proactively combat workplace violence (in all its forms) as well as proactively address the lingering threats of an active assailant. A comprehensive and modern solution involves a cross-disciplinary and multi-disciplined approach including elements from business unit leadership, human resources/capital, legal, marketing, PR, security, executive-level buy in and the general employee citizenry. Important components include specialized training and awareness at all levels of the organization, established reporting capabilities, investigative and assessment expertise, proper training in threat intervention, physical and technical security components, law enforcement liaison, business continuity and resilience planning, etc. Matt and Danny will break down each element and provide tools and strategies to better safeguard and protect your organization from the threats associated with workplace violence and active assailants.
Investigating a Whistleblower Complaint
Former FBI Special Agent and current Managing Director at Kroll, Sherine Ebadi, will provide some pro tips and tricks for conducting an effective internal investigation. Come learn from an expert how to prepare for, execute, and manage the potential risks associated with the investigative process.
Maximize Your Operational Efficiency - Introduction to Workflow Building & Customization Pt 2
In this session, you'll learn how to build and customize workflows to match your processes.
In this session we'll cover how Resolver is investing in innovative solutions to help our customers overcome the most pervasive and impactful challenges facing security teams.
The Importance of a Modern and Standardized Approach to Threat Assessment & Management including an introduction to the "RAGE-V Methodology"
Steve Powers will lead an interactive discussion about the importance of standardizing an organization's approach to threat management and threat assessment, thus reducing potential liability, reducing blind spots, tightening duty of care fulfillment and providing an all around better solution to the organization. Steve will touch on industry leading best practices, the power of reliable and actionable information as well as some of the challenges conducting modern-day threat management and assessments – including accepting inherent limitations and operating smartly with hypotheses.
Metrics That Matter: The Top 10 Reports Every Security Team Should Have
Today's leaders, whether they be in sales, marketing, finance, or customer support, all rely on data to drive their decision making and prove their impact. Security leaders should be no different, yet security lags other functions when it comes to data collection and usage. This webinar showcases the top 10 reports that every security team should have at their fingertips with an emphasis on how each report can support decision making or help prove the value of security.
Elevate Your Vantage Point - Introduction to Resolver's Data Collection and Communication Tools
Resolver offers a wide array of tools to help security teams collect information from across the enterprise and communicate effectively with team members and other stakeholders. In this session, you'll learn how to make most of reporting portals, email templates and integration, confidential reporting tools, and more.
Emerging Social Media, Opportunities for Threat Intelligence
Hear about the evolving tech and social media landscape and how threat intelligence can be leveraged to protect your company, people, and assets. Learn about emerging social media platforms, including traditional, alt social, and diving into deep and dark web. See how users are adopting the platforms, what types of intelligence can be discovered, and how to best gather key intel. Look into case studies on how to use Navigator to detect doxxing, physical threats, and GeoPolitical risks.
Transforming Security by Reimagining All-Hazards Risk Mitigation for 2030 Resiliency Performance & Value
We are ascending! All-hazards resiliency may be our next high-value, brand protection offering. Gone are the days when guns, gates and guards were sufficient security theater to impress our sponsors. Arguably, we left an impression, and the perception lingers. It is no surprise that discerning Chief Financial Officers and their leadership peers want more. Our transformation began in earnest mid-COVID. Public Safety first-responders were hit hard by the pandemic and social justice policy disagreement. Despite these developments and significant economic headwinds, we once again answered the bell to modify access control, track traveler and home office wellness, and hone our risk, threat and vulnerability intelligence for other fast-forming concerns. We continue to optimize services and technologies that likely, were never fully integrated.
Despite accolades and accomplishments, we have not yet fully told our Value Story. In an era of continuing critical events and threats, we must continue inform brand leaders for wiser, RoI-capable strategies. Operational risk is now ever-present and fluid. Our path to resilience is rigorous. Proven practices are not just our job. They are our measured means to enable brand mission and the strategic plan through persuasive business cases. Rising compliance and stakeholder expectations demand, for continuously improving cyber, environmental health, safety and security protection can be met. This session may be either serve as the beginning or the continuation of your value story; to support incremental resilience, if not operational excellence.
Up Your Insights & Enhance Your Reporting: Introduction to Dashboard Building
Join our product experts to learn how you can leverage our new dashboarding capabilities to draw greater insights from your data and streamline your reporting.
What's The Buzz on Drones?
Once a novelty, unmanned aerial systems (UASs) have become a phenomenon for hobbyists and a valuable commercial tool for delivery of goods, aerial mapping, property inspection, environmental monitoring, and large-event oversight, to name just a few applications. UASs—or, more colloquially, drones—now find themselves as a promising tool in the private security market.
According to a 2020 forecast by Coherent Market Insights, the market for safety and security drones is expected to grow at a 34.7% compound annual growth rate to 2027. Applications driving this growth, according to the report, are crowd management, asset management, patrolling, and surveillance operations.
This session will explore the following questions:
- Which organizations/industries use drones for private security?
- Which applications have been the most successful?
- What are common drawbacks/problems?
- How do you start a drone program, including make the business case?
- What are the pertinent legal, regulatory, licensing issues?
- What are preferred payloads and controller preferences?
- What lessons can be learned for law enforcement drone programs?
- Can drones show ROI?
A $22M Security Breach changed The Boston Beer Company, Practically and Culturally
Up Your Insights & Enhance Your Reporting: Making The Most of Your Reports
Join our product experts to learn best practices that will help you make the most of Resolver's reporting tools.
Peer-to-Peer Learning: Benefits of Migrating from Perspective to Core
In this session you'll hear from 3 customers who have migrated from Perspective to Core and get their perspective on the migration process and the benefits of transferring their program to Core.
Building the Business Case for Security Investments
Security teams often struggle to communicate their value to the organization and unlock funding for necessary programs and resources. In this session, we'll show you how to build an effective business case for security investments and gain buy-in across the broader organization.
Capture What Counts - Introduction to Form Building
In this session, you'll learn how to maximize Resolver's form building capabilities and improve capture data.
Amazing Moments from Ascend 2023
Frequently Asked Questions
Where will the conference take place?
Resolver's Security Summit will take place at San Diego Mission Bay Resort. 1775 E Mission Bay Dr., San Diego, CA 92109, United States.
When will the conference take place?
May 15 – 17, 2024
Who can come to Resolver’s security conference?
Registration for Resolver's Security Summit is limited to qualified professionals. Representatives of companies with products or services that compete with Resolver's products and services are prohibited from attending. All registrations are subject to approval and Resolver, in its sole discretion, reserves the right to deny or cancel any registration for any reason. Cancelled registrations will have their event registration fee refunded. No refunds will be made for travel, room, or any other direct or indirect expenses.
Can I bring a guest?
Resolver's Security Summit and related events hosted by Resolver or its partners are exclusive to registered attendees of the conference.
What is the registration cost?
The early bird registration cost is $695 USD, until January 31st, 2024. After the early bird deadline, the cost for a conference pass is $895 USD. Group discounts are available. For full details visit our Registration Page
What is the registration cancellation policy?
Email firstname.lastname@example.org to cancel your registration. We will issue full refunds until March 31, 2024. If you need further assistance, please contact us.
I’m having trouble with registration, where can I get help?
Please contact email@example.com further assistance.
Are meals covered with my conference pass?
Breakfast, lunches, and breaks are included with your conference pass, as well as refreshments at our two evening events.
What if I have dietary restrictions?
There is an opportunity to indicate special dietary restrictions during the registration process. Please note that Resolver will do everything possible to accommodate restrictions and allergies.
How can I book my room?
While the conference pass does not cover accommodations, we're pleased to offer you special conference rates at The Mission Bay Resort. Details will be provided soon, check back soon.
What is the weather like in San Diego in May?
Expect high temperatures from around 68°F/20°C to 75°F/24°C. Daily low temperatures can vary from 59°F/15°C to 65°F/18°C. The complete conference agenda takes place indoors, which may be cooler to some. Make sure to pack accordingly.
What airport do I fly into?
San Diego International Airport
What should I wear?
We recommend business casual attire for the entire conference. Dress pants or jeans, dresses, blouses, sportcoat (tie or no tie – up to you!), are welcome. Conference ballrooms tend to be chilly so please bring a blazer or a sweater. Evening event attire is casual.
What are the recommended travel dates?
We recommend you arrive in the afternoon on Wednesday, May 15th, 2024. We are hosting a reception to welcome you on Wednesday evening. The conference starts early Thursday, May 16th and our program wraps on Friday, May 17th. San Diego is on Pacific Daylight Time.