Join hundreds of your peers at the 5th Annual Security Technology Forum, October 14, 2025 near Washington, D.C.
This one-day event offers showcased technology presentations from top manufacturers (Bosch, Commend, and more), hands-on “Tinker Tables” to explore devices and software with expert guidance, and interactive exhibits where you can experience real-world solutions in perimeter detection, analytics, intercom, and command center furniture. You’ll also enjoy valuable networking time during a catered lunch and dinner with happy hour—perfect for swapping insights with colleagues and forging new industry connections.
Whether you're an end user, integrator, system engineer, consultant, or security leader within your organization, this local forum is the ideal way to stay on the cutting edge of physical and electronic security—without the cost and hassle of a large national expo.
Technology Presentations & Interactive Exhibits
- Tuesday, October 14, 2025 at 8am
- Near Washington, D.C. (venue details provided after registration)
- 8 Spotlight on Technology Presentation Sessions with DOUBLE the amount of seating as last year!
- 15 Solution Exhibits
- 6 Tinker Tables with Subject Matter Experts
- LUNCH: Smokehouse BBQ - Beef Brisket and Grilled Chicken
- Dinner and Happy Hour with Open Bar from 5pm-7pm - Beef Tenderloin with Peppercorn Sauce and Chicken Marsala
- Entertainment during Lunch, Dinner, and Happy Hour
10 most compelling reasons security professionals attend:
-
Fast, focused learning in one day: Eight “Spotlight on Technology” sessions, fifteen solution exhibits, and six hands-on Tinker Tables pack a ton of value into a single day.
-
Real hands-on time with the tech: The Tinker Tables let you click through real interfaces and handle hardware alongside subject-matter experts—so you leave with practical, ready-to-apply know-how.
-
Serious networking built in: Catered lunch plus a dinner & happy hour (open bar 5–7 pm) create relaxed time to compare notes, problem-solve, and build partnerships with peers and manufacturers.
-
Meet the makers: Top brands across video, intrusion, intercom, perimeter, consoles, power, networking, and entrance control—Bosch, Radionix, Commend, Winsted, Southwest Microwave, Orion Power Systems, AMG Systems, Gallagher, and Orion Entrance Control—are exhibiting.
-
Local, easy, and cost-effective: It’s near Washington, D.C. at National Harbor (easy access, close to DCA) and registration is free—so you can bring more of your team without blowing the budget.
-
Practical content (not sales pitches): Sessions focus on how to implement solutions—design choices, integration tips, and operational best practices you can use immediately.
-
A regional alternative to big trade shows: Stay on the cutting edge without the travel, time, and hassle of a national expo.
-
Bring clients and accelerate projects: Side-by-side demos and SME access make it easy to co-design, validate requirements, and de-risk decisions together.
-
More seats, smoother experience: Double the session seating this year means better access to the talks you care about.
-
Proven attendee value: Past participants—from security leaders to students—consistently call it informative, well-run, and ideal for meaningful 1:1 conversations.
SITE NAVIGATION
What did past attendees have to say?
"Great show and seminars. Very informative." -Felix C
________________
"The entire event was done well, I learned valuable insight and information to aid in my career. I am a cyber security student at UVA. We work with majority of the vendors at the event and it was helpful to see the technology first hand and see where it is going in the future. Looking forward to next years event!" -Haylee D
________________
"I usually cannot attend the big events, so the opportunity to see so much and to talk shop with colleagues was very useful." -Richard P
________________
"Decided to attend because it sounded like a great way to gain some more familiarity and hands on experience with various technologies in the security industry. The exhibits were cool and I'd love to see more technologies in use! My favorite presentations included the ones that dove deeper into the hardware used and how they worked and could be used in conjunction with other devices! The presentations I enjoyed best were by: Tom Mechler, Sachin Khanna, Jeff Drews and John Wekenborg, and Dr. Danny Kent. I enjoyed these presentations the most because they gave some insight into some of the new technology that's soon to be available in the industry, as well as how to make use of this new technology. In particular, Jeff Drews and John Wekenborg's presentations on the use of layered perimeter security was particularly interesting to me." -Anonymous
________________
"I actually thought that this hotel had the best hotel food that I'd ever had. It was legit and I go to that place again just for that!!!!!!" -Christopher P
________________
"The venue, food, and displays were great! The presentations and exhibits were informative and a value-add. Thank for you and incredible event and the connections that it facilitated." -Seaun W
________________
"The Security Technology Forum was great. This is the only local security forum that is in the Washington, DC area yearly. I attend this to keep up with the latest Security technology, and Chesapeake & Midlantic Marketing again delivered. The people working at Chesapeake & Midlantic Marketing are immensely helpful and always willing to take the time to answer your questions. I highly recommend attending this Security Technology Forum if you want to stay on the leading edge of security technology." -Timothy A
________________
"Terrific event! Presentations were well timed and speakers did great. Perfect size event for one on one conversations and discussions about solutions for specific issues." -Eric M
TELL COLLEAGUES, BRING YOUR CLIENTS
Send this link to your colleagues and clients. They'll thank you later....we promise!
WHO SHOULD ATTEND
We want to see you, your colleagues, & your clients!
Anyone involved in a physical or electronic security program or organization as an end user or system owner, decision maker, integrator, distributor, or security consultant or engineer should attend.
This is a great opportunity to take in technology presentations, interactive exhibits staffed with the experts who can show you the benefits of each solution and help you design each system, and hands-on Tinker Tables where you can take control of the mouse alongside a subject matter expert to dive into the programming or user interface of various software solutions for installation, operation, and programming of systems from video analytics to intrusion alarm panels.
You won't be disappointed when you spend just one day with our team and partners!
The Forum will be held in National Harbor, MD.
Once you have registered, keep an eye on your email inbox for the exact venue location address in National Harbor, MD. Pre-registration is required.
National Harbor features easy access from I-495 near Washington, DC and Alexandria, VA and is conveniently located close to Reagan International Airport (DCA) and downtown restaurants, monuments, museums, and entertainment.
When booking your hotel, look in the areas of National Harbor, Alexandria, and Old Town Alexandria.
Local Hotels, Shops, and Restaurants >>
FREE REGISTRATION
Register today. Upon successful registration, venue information will be sent to your email inbox.
SPOTLIGHT ON TECHNOLOGY Presentation Sessions @ 8:25am
Grab your seat, we start at 8:25am sharp!
Don’t miss the Spotlight on Technology sessions led by technology and strategy experts from Bosch and key partners including Commend, Southwest Microwave, Winsted, and other solution providers.
These focused presentations will dive deep into the latest advancements in security, communication, and safety technologies—highlighting not only how the solutions work, but how they can be implemented effectively within your security strategy.
Whether you're designing a new system or upgrading an existing one, you'll gain practical insights into maximizing performance, enhancing integration, and aligning your technology investments with your organization's evolving needs.
Here's the Spotlight on Technology lineup...
Next-Gen Perimeter Imaging: X-Series, Thermal, & Fusion Cameras
Focus: Bosch’s latest imaging hardware for critical infrastructure and perimeter security.
Get a practical tour of what’s new—and why it matters in the field. We’ll introduce the DINION thermal 8100i for long-range detection and low-light reliability, the MIC fusion 9100i for ruggedized deployments that blend thermal and optical views, and the FLEXIDOME dual 7100i for dual perspectives within a single housing. We’ll also unpack the X-series sensor platform and how its imaging pipeline boosts dynamic range, low-light performance, and color fidelity.
What you’ll learn
- How to choose between thermal, optical, and fusion imaging for fence lines, substations, and wide-area yards.
- Field-of-view, lensing, and mounting best practices to reduce blind spots.
- Real-world performance gains from the X-series sensor platform (noise handling, WDR, motion clarity).
- Power, network, and environmental considerations for 24/7 outdoor operation.
Ideal for: Security directors, consulting engineers, and integrators designing or upgrading perimeter video.
IVA Pro in Action: Contextual AI, LPR, & Visual Gun Detection
Focus: The latest analytics in IVA Pro, including IVA Pro Context for advanced scene understanding using Generative AI techniques, enhancements to IVA Pro License Plate Recognition (LPR), and recent progress with IVA Pro Visual Gun Detection—with special attention to wide-area parking lots.
What you’ll learn
- How IVA Pro Context models add additional context, beyond people and vehicle detection to reduce response times and increase operator efficiency.
- Practical configuration of LPR: camera placement, plate angles, regional plate sets, and watchlist use cases.
- Operationalizing Visual Gun Detection: coverage planning, alert routing, and operator verification workflows to manage false/true alerts.
- Privacy, data retention, and audit considerations when deploying advanced analytics.
Demo & discussion: End-to-end event flow—from edge detection to alarm handling in VMS—plus tips for testing and acceptance in live environments.
Ideal for: System designers, SOC managers, and end users evaluating AI analytics for safety, compliance, and operations.
BVMS + DIVAR IP: Faster Investigations with Metadata-Driven Search
Focus: Technical updates in BVMS and DIVAR IP appliances that accelerate investigations and strengthen coordinated incident response.
Topics covered
- Multi-camera tracking: Follow a person across cameras and time ranges for faster response and rapid event reconstruction.
- Metadata-driven free-text search: Use object attributes, colors, and keywords to cut review time drastically.
- LPR workflows: Create, manage, and action watchlists directly within BVMS, including alerting and reporting.
- Zero-trust-aligned improvements: Hardening measures, identity controls, and segmentation guidance to reduce lateral movement risk.
- Appliance tuning: Sizing, storage planning, and retention strategies on DIVAR IP for mixed-resolution fleets.
What you’ll take away
- A step-by-step playbook to shorten time-to-evidence.
- Configuration patterns that keep performance high as your camera count and analytics grow.
Ideal for: VMS administrators, IT/SOC teams, and consultants responsible for investigations and uptime.
Firmware & Cybersecurity: FIPS 140-3, IEC 62443-4-2, Stealth Mode, & PQC
Focus: Bosch’s latest firmware features and certifications that map to government and enterprise security standards.
Key areas
- FIPS 140-3 readiness and what it means for cryptographic modules in regulated deployments.
- IEC 62443-4-2 device-level security requirements—and how to validate compliance in procurement.
- Stealth Mode & Secure Device ID: Minimizing device discoverability and ensuring trusted identity at scale.
- Post-quantum cryptography (PQC): Road-map considerations and how to future-proof long-life systems.
- Patch management, signing/verification, and secure boot chains for cameras and appliances.
What you’ll learn
- How to design projects that align with modern controls (hardening, logging, key mgmt, and RBAC).
- A practical checklist for commissioning and periodic audits in government and critical infrastructure environments.
Ideal for: CISOs, security architects, compliance officers, and any team responsible for security accreditation.
More Topics to be Announced Soon
Agenda, topics, and presenters subject to change
SOLUTION EXHIBITS
@ 8:00am
Explore interactive exhibits that bring the latest in security and communication technologies to life. From 360⁰ imaging cameras and AI-powered video analytics to intercom systems and entry control systems, you'll experience these tools in action—up close and hands-on.
See how today’s innovations can be applied across real-world scenarios, whether you're protecting a building entrance, monitoring a wide-area perimeter, or coordinating emergency communications. It’s not just a demo—it’s your chance to engage directly with the solutions shaping the future of physical security.
EXHIBITORS
DISCUSSION & TINKER TABLES
@ 8:00am
Roll up your sleeves and dive into the technology at our interactive Tinker Tables, where you can get hands-on with a wide range of security hardware and software—from cameras and intrusion detectors to intercoms and access control systems.
Whether you're clicking through interfaces with a mouse and keyboard or grabbing a screwdriver to explore the physical components, this is your chance to see exactly how these solutions work under the hood. It's a unique opportunity to test-drive cutting-edge tools in a low-pressure environment, guided by the experts who know them best.
Tinker Table Topics and Experts subject to change
LUNCH
Take a well-deserved break from the morning sessions and recharge with a Smokehouse BBQ buffet lunch—a perfect way to refuel while continuing the conversation with fellow attendees and industry experts.
Enjoy a spread of slow-smoked favorites in a casual setting that encourages networking and idea sharing. Whether you're comparing notes from the morning presentations or connecting with a new contact over a plate of brisket and pulled pork, this midday break blends great food with valuable face time in the heart of the Security Technology Forum.
HAPPY HOUR & DINNER BUFFET
NETWORK WITH THE EXPERTS
4:45pm - 7pm
Happy Hour and Dinner
After the presentations have wrapped up and your brain is buzzing with new ideas, why rush into traffic?
Instead, stick around and unwind with fellow attendees and industry experts in a relaxed, informal setting designed to foster meaningful conversations. This is your opportunity to follow up on the day’s demos, ask deeper questions about the solutions that caught your eye, and get one-on-one insights from the manufacturers and consultants who build and support these technologies every day.
As you network and connect, enjoy a delicious catered meal featuring Beef Tenderloin with Peppercorn Sauce and Chicken Marsala, paired with beverages from multiple bars.
Whether you're looking to explore product applications, spark a new partnership, or simply reflect on the day's takeaways, this post-event reception is the perfect way to close out a high-value day in security technology.
PARKING
Enjoy the convenience of FREE on-site parking at the event venue—no need to search for a spot or worry about meters. Simply arrive, park, and head straight into a full day of hands-on technology, expert insights, and networking opportunities. It’s just one more way the Security Technology Forum is making your experience seamless and hassle-free from start to finish.
FLYING
- Reagan National Airport (DCA) 8 miles away
- Dulles International Airport (IAD) 36 miles away
- Baltimore/Washington International Thurgood Marshall Airport (BWI) 52 miles away
When planning ground transfer to or from local airports, please be aware of significant traffic delays in the area.
Matt Golueke
- matt@midches.com
- (410) 935-0560
* Date, location, presenter lineup, participating manufacturers, and other details subject to change.