How can you measure your risk of unauthorized entry? Until now, it’s been virtually impossible. When it comes to security entrances, new analytics technologies (e.g. PSIM, IoT, etc.) are emerging, and it’s becoming possible to use technology, combined with people, to tap into security entrance metrics as part of an overall physical security strategy.
At Ann & Robert H. Lurie Children’s Hospital of Chicago, the pediatric teaching partner of Northwestern University Feinberg School of Medicine, being leaders in pediatric medicine, research, treatment, education and advocacy are the pillars of the facility’s mission statement.
Social media is transforming corporate security in fundamental ways. Here are five trends that chief security officers, intelligence analysts and others need to consider when building a social media strategy.
Stay ahead of the curve by attending this in-depth program, featuring the latest scientific findings on risk perception, case studies from around the world, a suite of practical tools, and hands-on skill training. Read More
What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.