Rachelle Loyear, Allied Universal Technology Services

Rachelle Loyear

Vice President, Integrated Security Solutions

Allied Universal Technology Services

As Vice President of Sales, Integrated Security Solutions at Allied Universal, Rachelle Loyear leads the Allied Universal Enterprise Security Risk Management approach to customer program development. The Integrated Security function is dedicated to driving Allied Universal’s mission of helping customers find and deploy the right combination of security professionals, policies, processes and procedures, and cutting-edge technology and data tools to most effectively secure their organizations in a world of evolving risk.

Rachelle has spent over a decade managing programs in corporate security organizations. Focusing strongly on security risk management, she has been responsible for ensuring enterprise resilience in the face of many different types of risks, both physical and cyber. In 2016 she co-authored The Manager’s Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security, in 2017, she released the book The Manager’s Guide to Simple, Strategic, Service-Oriented Business Continuity, and is a co-author of the 2018 book, Enterprise Security Risk Management: Concepts and Applications.

Rachelle is a member of the ASIS North American Board of Directors and ESRM Community Steering Committee. She serves on the Cybersecurity Advisory board for SIA, is a Certified Information Security Manager (CISM) through ISACA, a Master Business Continuity Professional (MBCP) through DRI International, and a certified Project Management Professional (PMP) through the Project Management Institute (PMI).



Cybersecurity Threats and Leading in a World of Converged Security

Tuesday, October 18th

The SNG cybersecurity panel will provide a holistic executive view of cybersecurity, and a few of the core topics that will be addressed as part of this important session include:

  • Cybersecurity of IoT devices, including industrial control systems and security systems
  • Nation-state hacking and other sources of challenge for top cybersecurity leaders
  • How cybersecurity leaders can share intel and coordinate with physical security leaders to prepare to face threats with multiple vectors
  • Artificial intelligence impact on cybersecurity