ON DEMAND The Director of Cybersecurity, Dave Weinstein, and the Director of Intelligence, Rosemary Martorana, will discuss cybersecurity and intelligence reform at the state level and how organizations can apply lessons learned to enhance their own cybersecurity policies and practices
ON DEMAND Learn how experts are combining corporate class visitor identity management with PIAM (Physical Identity and Access Management) to deliver a completely secure, policy-based visitor identity management solution leveraging enterprise-class workflow, real-time security assessment and pre-screening methodology to deliver total and continuous protection in compliance with company policy as well as federal, state and local rules and regulations against un-wanted visitors and malicious threat actors.
ON DEMAND Walmart has partnered with the Advanced Law Enforcement Rapid Response Training (ALERRT) center at Texas State University to develop an Active Shooter Awareness Campaign that introduces the Avoid | Deny |Defend™ concept. Join us as representatives from ALERRT and Walmart present on their partnership and awareness strategy.
AVAILABLE ON DEMAND Convergint Technologies describes Quadrant Four as the highest level of enterprise integration. It is where IT, applications and product knowledge are combined to develop solutions that solve customers’ business problems and help them drive business excellence. The development of the Quadrant Four vision, the strategy for how it is being implemented in the market, and the positive results it has garnered are what earned Convergint Technologies SDM’s 2012 Systems Integrator of the Year Award.
AVAILABLE ON DEMAND This webinar examines how Brown Shoe Company uses security technology in its more than 1,300 locations. Join Protection 1’s Lisa Ciappetta, Senior Director Marketing, and Jim Shepherd, National Account Manager, together with their customer, Kevin Darnell, Director of Loss Prevention at Brown Shoe Company, for this webinar!
Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!