After attending this webinar, attendees should be able to understand the trends driving surveillance and security to the datacenter, review real world examples of how surveillance and security equipment can be used to exploit networks, identify and recognize the Edge to Core to Cloud for surveillance and security theory, and assess the benefits of the role of cybersecurity in surveillance and enterprise security. You do not have to look far for a real world example of how surveillance and security equipment can be used to exploit networks. Read More
Attendees of this webinar should be able to understand the history and use of Exelon’s Insider Threat program as a necessity to support business goals and operations, identify and recognize the benefits of a holistic approach to address an Insider Threat Program, review best practices, based on Exelon’s experience, to use training and awareness in an Insider Threat Program, and assess the benefits of using physical and information security teams in an Insider Threat program to keep pace with enterprise security challenges. Read More
After attending this webinar, you will be able to identify and recognize how social media has changed corporate security, explore the implications of social media and make changes to your security team to compensate, obtain actionable insight into how to use social media to your advantage, utilize Real-life examples of how social media can be used as a critical dataset for effective event response Read More
On Demand Learning objectives for this webinar are: understand the history and implication of security blowback for active shooter prevention and response, identify and recognize the challenge of a “weapons culture” in any environment, review best practices to prevent an active shooter incident with an emphasis on a “zero incidents philosophy.” and assess the benefits of the training strategies with regards to active shooter for staff and customers, including the “run-hide-fight” theory.
ON DEMAND When you think of retail theft, you might envision teenagers shoplifting candy bars. It’s a much larger problem than that. Theft and fraud cost U.S. retailers billions in annual losses, as well as generating violence. Shoplifting also drives up prices for paying customers and filling the coffers of gangs and terrorist organizations. In cities around the United States, a growing number of violent drug store robberies are putting employees and customers at risk, while data breaches siphon off in minutes what would take years to steal from stores.
ON DEMAND In this webinar, you will learn about the current state of the access control market, including key technologies in use, how to best prepare for and conduct upgrades to access control systems and actionable best practices to protect organizations from common vulnerabilities.
ON DEMAND In this webinar, you will learn about issues that exist without adequate contextual evaluation of security data, key indicators to define context for security decisions, leveraging predictive analytics to create context and mitigate risk and best practices to transform your security infrastructure to make contextual decisions
ON DEMAND Join us to learn how to reduce risk and liabilities by eliminating downtime and data loss, how to improve the effectiveness of your surveillance systems by maximizing performances and scalability and how to leverage the latest IT advantages to reduce costs and mobilize fully integrated systems
ON DEMAND Attendees of this webinar will discover access control gaps, get guidance on how to improve your physical security and access control, learn which access control technologies are most secure and understand how to incorporate cybersecurity practices that will keep the bad guys away from hacking your facility
ON DEMAND LAUSD police officers are employing a 21st century policing strategy, with a focus on community oriented enforcement, to improving police-community relations, keep kids in school and to improve the safety of the schools within the district and the surrounding neighborhoods.
Who are the Most Influential People in Security? Find out which security leaders are making a difference in the September issue of Security magazine! Also, read about how New York is shaking up cybersecurity, changes in drone legislation, three steps to prepare for the GDPR, school surveillance savings and more.