That’s where mass notification systems come into play, as well, as is the case with MillerCoors’ Fort Worth, Texas, brewery, which is located in Tornado Alley and sees about 25 tornadoes each year. The brewery employs 105 employees spread across 150 acres, and it brews 9 million barrels a year. It houses an on-site refrigeration system with 150,000 pounds of ammonia to assist with the brewing process.
Operators in the room are on their phones, either receiving or relaying information about security – physical and cyber-related events. Welcome to Exelon’s Security Operations Center (ESOC), with three entities: the ESOC, the Incident Command Center (ICC) and the Cyber Security Operations Center (CSOC).
Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.
Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.
For Johns Hopkins in Baltimore, it’s a neighborhood initiative program that looks beyond traditional campus security and that integrates university special police officers with AlliedBarton security officers. The result: recognition in the Higher Education sector in the 2013 Security 500 report.
Late last year about 200 banks in New York took part in a cybersecurity “exam” in which they were made to respond in real time to questions about their cybersecurity policies and procedures. The test was designed to help the banks see how they compare with their peers in terms of being ready for attacks by cybergangs looking to break into their networks.
The Chief Information Security Officer (CISO) not only protects IT systems with special hardware, software and secure business processes, but he or she also creates, implements and communicates the organization’s digital information security policies and procedures.
It was the second deadliest mass shooting by a single person in American history, after the 2007 Virginia Tech massacre, and the second deadliest mass murder at a U.S. elementary school. As a mother of two young children, I am still anguished over “Newtown,” as the events are often referred to. Guy Grace is, as well.
Each minute in 2010 there were 45 new viruses created, 200 new malicious websites established, 180 personal identities stolen, 5,000 new versions of malware created and most importantly, 2 million dollars lost.
What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.