{"id":25641,"date":"2013-01-15T11:33:51","date_gmt":"2013-01-15T11:33:51","guid":{"rendered":"http:\/\/154.66.198.29\/?p=1173"},"modified":"2013-01-15T11:33:51","modified_gmt":"2013-01-15T11:33:51","slug":"your-2013-security-calendar","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/","title":{"rendered":"Your 2013 Security Calendar"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;3.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; use_border_color=&#8221;off&#8221; border_color=&#8221;#ffffff&#8221; border_style=&#8221;solid&#8221;]As an avid <strong>security enthusiast<\/strong>, chances are you\u2019ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages!<\/p>\n<p>I personally feel that a <strong>good security expo<\/strong> brings out the child in all of us; at the risk of succumbing to a tired metaphor, one does almost feel like a kid in a candy store when attending one of the many security-oriented events held throughout the year. The myriad gadgets, technological innovations and space-age intelligence generally on display at security events always leaves one feeling undeniably <strong>inspired<\/strong> by the sheer power of human endeavour, no longer cowed by an uncertain future but rather excited at the prospect of a secure one.<\/p>\n<p>CENTURION is fortunate enough to have participated in a number of these prestigious events in the past \u2013 and will certainly continue to do so in the future &#8211; and we hereby submit for your reading pleasure a small sample of what you can look forward to in the year ahead.<\/p>\n<ol>\n<li><strong><u>SecurExpo 2013<\/u><\/strong><\/li>\n<\/ol>\n<p>This relatively new entrant to the world of security conventions was held for the first time in Harare, Zimbabwe in March of 2012. <strong>SecurExpo<\/strong>, which saw a very successful launch at the Royal Harare Golf Club last year, draws participants from all sectors of the economy and focuses on all facets of security including cybercrime, cable theft prevention, computer forensics, etc. If SecurExpo 2012 was anything to go by, this event is sure to become<strong>Zimbabwe\u2019s premier showcase for integrated security solutions<\/strong>.<\/p>\n<p>The theme for this year is \u201cIntegrated Security, providing Global Protection\u201d<\/p>\n<p><strong>Venue: <\/strong>Harare, Zimbabwe. \u00a0For more information contact Conrad Chibanda,\u00a0<a href=\"mailto:cchibanda@secureexpo.org\">cchibanda@secureexpo.org<\/a><\/p>\n<p><strong>Dates: <\/strong>13 to 16 March 2013<\/p>\n<ol start=\"2\">\n<li><strong><u>Secutech 2013<\/u><\/strong><\/li>\n<\/ol>\n<p>The official <a href=\"http:\/\/www.secutech.com\/\">Secutech website<\/a> bills the event as \u201cThe business platform for global security manufacturers to demonstrate corporate values\u201d. Sounds good to me!<\/p>\n<p>The 16<sup>th<\/sup> annual <strong>Secutech<\/strong> international exhibition and conference for electronic and information security, fire and safety will be held in Taiwan and will showcase innovations in areas such as surveillance, access control, personal safety and police equipment.<\/p>\n<p><strong>Venue: <\/strong>Taipei Nangang Exhibition Center in Taiwan<\/p>\n<p><strong>Dates: <\/strong>24 to 26 April 2013<\/p>\n<p><strong>Website: <\/strong><a href=\"http:\/\/www.secutech.com\/\">www.secutech.com<\/a><\/p>\n<ol start=\"3\">\n<li><strong><u>Mine Site Security Conference<\/u><\/strong><\/li>\n<\/ol>\n<p>With Africa holding the <strong>world\u2019s largest producer of platinum and one the largest producers of gold<\/strong>, it is only natural that<strong> integrated security solutions<\/strong> would be such an important factor when it comes to the safeguarding of our valuable subterranean resources. Of course, <strong>access control<\/strong> is also important from a safety perspective as it is imperative that the identities of all employees engaged underground at any given time are known and easily accessible. And so, the <strong>Mine Site Security Conference<\/strong> was born.<\/p>\n<p><strong>Venue: <\/strong>Park Inn, Sandton<\/p>\n<p><strong>Dates: <\/strong>28 to 29 January 2013<\/p>\n<p><strong>Website: <\/strong><a href=\"http:\/\/www.miningsitesecurityafrica.com\/\">www.miningsitesecurityafrica.com<\/a><\/p>\n<ol start=\"4\">\n<li><strong><u>IFSEC 2013<\/u><\/strong><\/li>\n<\/ol>\n<p>As far as security expos go, this is the biggie. This writer, for one, cannot help but succumb to almost juvenile excitement when thinking about the row upon row of hi-tech gear. Last year saw the event play host to almost 6000 visitors and some 200 exhibitors \u2013 will these numbers be exceeded at IFSEC 2013?<\/p>\n<p>According to IFSEC SA\u2019s website \u201c<strong>IFSEC<\/strong> <strong>South Africa<\/strong> is the leading Commercial Security, Homeland Security and Fire exhibition on the African continent\u201d.<\/p>\n<p>Note that IFSEC also boasts international legs, including one in the UK and one in Nigeria.<\/p>\n<p><strong>Venue: <\/strong>Gallagher Convention Centre, Midrand<\/p>\n<p><strong>Dates: <\/strong>18 to 20 June 2013<\/p>\n<p><strong>Website: <\/strong><a href=\"http:\/\/www.ifsecsa.com\/\">www.ifsecsa.com<\/a><br \/>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an avid security enthusiast, chances are you\u2019ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages! I personally feel that a good security expo brings [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[23],"tags":[],"class_list":["post-25641","post","type-post","status-publish","format-standard","hentry","category-blog-posts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Your 2013 Security Calendar - Centurion Systems French<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Your 2013 Security Calendar - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"As an avid security enthusiast, chances are you\u2019ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages! I personally feel that a good security expo brings [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2013-01-15T11:33:51+00:00\" \/>\r\n<meta name=\"author\" content=\"Eddie\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eddie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/\"},\"author\":{\"name\":\"Eddie\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"headline\":\"Your 2013 Security Calendar\",\"datePublished\":\"2013-01-15T11:33:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/\"},\"wordCount\":655,\"commentCount\":0,\"articleSection\":[\"Blog Posts\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/\",\"name\":\"Your 2013 Security Calendar - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"datePublished\":\"2013-01-15T11:33:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/your-2013-security-calendar\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your 2013 Security Calendar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\",\"name\":\"Eddie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"caption\":\"Eddie\"},\"sameAs\":[\"http:\\\/\\\/www.centsys.com\\\/fr\"],\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/eddie\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your 2013 Security Calendar - Centurion Systems French","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/","og_locale":"en_US","og_type":"article","og_title":"Your 2013 Security Calendar - Centurion Systems French","og_description":"As an avid security enthusiast, chances are you\u2019ll want to know what new technology is on offer in this arena, what innovations are making waves and which people are exerting influence. Fear not, weary traveller, for the information you seek is contained within these very pages! I personally feel that a good security expo brings [&hellip;]","og_url":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/","og_site_name":"Centurion Systems French","article_published_time":"2013-01-15T11:33:51+00:00","author":"Eddie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eddie","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/"},"author":{"name":"Eddie","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"headline":"Your 2013 Security Calendar","datePublished":"2013-01-15T11:33:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/"},"wordCount":655,"commentCount":0,"articleSection":["Blog Posts"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/","url":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/","name":"Your 2013 Security Calendar - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"datePublished":"2013-01-15T11:33:51+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/your-2013-security-calendar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Your 2013 Security Calendar"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883","name":"Eddie","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","caption":"Eddie"},"sameAs":["http:\/\/www.centsys.com\/fr"],"url":"https:\/\/www.centsys.com\/fr\/author\/eddie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/25641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=25641"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/25641\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=25641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=25641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=25641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}