ON DEMAND Walmart has partnered with the Advanced Law Enforcement Rapid Response Training (ALERRT) center at Texas State University to develop an Active Shooter Awareness Campaign that introduces the Avoid | Deny |Defend™ concept. Join us as representatives from ALERRT and Walmart present on their partnership and awareness strategy.
ON DEMAND Learn how experts are combining corporate class visitor identity management with PIAM (Physical Identity and Access Management) to deliver a completely secure, policy-based visitor identity management solution leveraging enterprise-class workflow, real-time security assessment and pre-screening methodology to deliver total and continuous protection in compliance with company policy as well as federal, state and local rules and regulations against un-wanted visitors and malicious threat actors.
ON DEMAND The Director of Cybersecurity, Dave Weinstein, and the Director of Intelligence, Rosemary Martorana, will discuss cybersecurity and intelligence reform at the state level and how organizations can apply lessons learned to enhance their own cybersecurity policies and practices
The tragedy of the United States domestic violence situation is impossible to quantify. There is both a sordid history and an on-going crisis; a crisis that has become normalized. Since 2000, approximately more than 20,000 women have been murdered by domestic partners, or "family terrorists". Read More
ON DEMAND Whether you are integrating with different technologies to provide a unified solution, implementing cutting solutions to mitigate risk, or upgrading a legacy system, learn what questions to ask, what to look for in a partner and how to implement an affordable, cost-effective security solution
ON DEMAND Join us for this expert webinar to discuss the importance of mitigating the active shooter threat by understanding the dynamics of the event, planning for the full-cycle of the event and preparing those at risk with the necessary information and skills.
ON DEMAND You’ll leave this webinar with a proactive security strategy that takes advantage of cloud-based technology’s unique capabilities, and you will receive a complimentary eBrief: Six Questions to Ask When Choosing Your Physical Security Vendor.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!