Senior Security Systems Consultant

Coleman Wolf has extensive experience developing enterprise-wide access control and alarm monitoring systems, developing business analyses, and conducting detailed security surveys and assessments of corporate offices, power generation plants, and facilities related to national critical infrastructure. Coleman has also managed numerous security system installation and upgrade projects.

Publications/Presentations

  • “Hacking Building Controls For Fun And Profit: Security Risks To Cyber-Physical Systems.” GSX (Global Security Exchange). September 2021.
  • “Breaking Down the Pros and Cons of AI in Cybersecurity.” Security Management. April 2021.
  • “Breach of 150,000 Surveillance Cameras Sparks Credential Concerns.” Quoted. Security Management. March 2021.
  • “AI Principles for Security and How to Talk About Them” GSX+ Conference. September 2020.
  • “Evaluate Your Strategy for Thermal-Screening Deployments.” Co-author of ESD Blog. June 2020.
  • “Assessing Cyber Risks to Your Access Control System.” Quoted. Security Management. April 2020.
  • “Building Cybersecurity.” ESD. Chicago, Illinois. February 2020.
  • “Access Control Systems are Vulnerable … How Can We Protect Them?”  ASIS International. March 2020.
  • “How to Design a Security-Centric Lobby.” Security Management. February 2020.
  • “Critical Event Management Best Practices Roadshow.” Chicago, Illinois. October 2019.
  • Book Review of: “Click Here to Kill Everyone.” Security Management. July 2019.
  • “Cryptojacking Outpaces Ransomware Attacks.” Security Management. Quoted. June 2019.
  • “Critical Testing Programs for Security Operations.” GSX Conference. Las Vegas, Nevada. September 2018.
  • “A Hacker’s Perspective on the Human Element in Security.” ASIS 2017 Conference. September 2017.
  • “Security: Video Analytics and Machine Learning Gaining Momentum.” Quoted. Building Operating Management. September 2017.
  • “How Practitioners Can Ensure the Safety of Corporate Networks.” Cyber Security Roadshow. Chicago, Illinois. May 2017.
  • “Cybersecurity: Configuration Management & Protections – Enterprise to Facility System.” Realcomm Webinar. September 2016.
  • “Security Architecture and Engineering: System Design and Engineering” and “Addressing Cyber Risks to the Internet of Things and Building Controls.”  ASIS. September 2016.
  • “Beyond the Data Center Card Reader.” Mission Critical. July-August 2016.
  • “Beyond the Card.” Medical Construction + Design. June 2016.
  • “Emerging Security Technologies Offer FMs Range of Choices.” Quoted. Building Operating Management. June 2016.
  • “Is Your Refridgerator Spying on You?” ASIS International Webinar. April 13, 2016.
  • “Smart Building Cybersecurity – 55,000 Vulnerable Buildings and Counting.” Realcomm Webinar. November 2015.
  • “Securing Healthcare Facilities with Future Expectations, New Programs, and Security Officer Implementation.” Presentation. ASIS International Conference. September 2015.
  • “Risks to Building Control Systems.” Presentation. ASIS International Conference. September 2015.
  • “Security Architecture and Engineering, Part 2: Systems Design and Engineering.” Presentation. ASIS International Conference. September 2015.
  • “Building Cyber Awareness.” Quoted. Security Management. May 2015.
  • “Security Architecture and Engineering Council Series: Systems Design and Engineering.” 2014 ASIS International Conference. Atlanta, Georgia. September 2014.
  • “Network Security for Building Control Systems.” Illinois Institute of Technology Forensecure IT Security & Forensics Conference. April 2014.
  • Book Review of “Terrorism and WMDs: Awareness and Response.” Security Management. July 2012.
  • “Information Technology Security Council Series: Cyber Security.” 2011 ASIS Convention. Orlando, Florida. September 2011.
  • “Utility and Smart Grid Security, The Impact of NERC CIP Standards and NISTIR 7628 to the Utility Industry.” Information Technology Security Council (ITSC) and Utility Security Council (USC). ASIS International. February 2011.
  • Certification Profile. Security Management. June 2011.
  • Book Review of “Hacking Exposed: Network Security Secrets and Solutions.” Security Management. October 2010.
  • “Cloud Computing and Software as a Service (SaaS), An Overview for Security Professionals.” Information Technology Security Council (ITSC) and Physical Security Council (PSC). ASIS International. February 2010.
  • “Cyber-Neighborhood Watch.” Quoted. Security Management. January 2010.