Security reached out to Dean Alexander, Director of the Homeland Security Research Program and Associate Professor of Homeland Security at Western Illinois University, for suggestions on how business owners and security leaders can cooperate with law enforcement and gain additional insight before, during and after a potential terrorist incident like the one in Chelsea.
A few months ago, cities around the world anxiously awaited for the results of the Global Cities Index, which identifies the world’s top 125 cities on the basis of their ability to attract and retain global capital, people and ideas, as well as sustain that performance in the long term.
Through the VIC, private-sector enterprises can join the program for a small licensing fee, and tie their exterior surveillance cameras into the VIC network. Or, if they prefer, enterprises (especially small businesses or residential complexes) can lease a camera from the police department or another proprietary business.
Ultimately, with a public-private partnership, what you put in is what you get out, says Wesley Bull, Senior Director/Head of Global Protective Services at NVIDIA, a company that invented the GPU – the engine of modern visual computing.
A new report by Marsh confirms that demand for terrorism insurance remains strong and the existence of the Terrorism Risk Insurance Program Reauthorization Act (TRIPRA) plays a key role in making coverage available and affordable.
New York State Police Superintendent Joseph A. D’Amico will be named the ASIS 2014 Person of the Year Award at a special luncheon at noon on Friday, March 14, in New York City. The annual awards luncheon is part of the 24th New York City Security Conference & Expo, hosted by the ASIS NYC Chapter.
In last month’s column, we explored the Top Five Reasons to Report Computer Intrusions to Law Enforcement. This month’s column will provide you with a sense of what your company, as a victim of a computer intrusion, should expect when working with the Feds.
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.