In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.
This year’s Most Influential is organized by five categories: Corporate Security Practitioners, Public Sector Security, University/Think Tanks, Cybersecurity and State/Local Government Security.
Establishing command and control gives the power to professionals so they can properly assess the risks and determine which threats pose the greatest danger and must be considered a high security priority. Authority also requires that they identify potential threats that may be considered “acceptable risks” to the organization – meaning they are worth keeping an eye on, but don’t warrant a significant security investment.
Through the VIC, private-sector enterprises can join the program for a small licensing fee, and tie their exterior surveillance cameras into the VIC network. Or, if they prefer, enterprises (especially small businesses or residential complexes) can lease a camera from the police department or another proprietary business.
While the police and fire department response times are good in Sandy Springs, Georgia, in medical emergencies, security officers are often the first on the scene. The G4S officers are trained in first aid and automated external defibrillator (AED) devices.
Social spaces will be able to identify and know their inhabitants, visitors, guests, caretakers, administrators, and any other people who interact with them. This knowledge is a fundamental building block because social relationships are built on the concept of stable personal identity over time.
Several situations show the benefits that megapixel can offer a security enterprise executive, including the Nebraska Medical Center, located in Omaha, that has a number of patients who require 24/7 observation.
Over the past 15 years the visitor management market has evolved from a simple “hello my name is” label to roaming officers processing visitors with 4G-enabled tablets and evacuation systems
Employees are currently able to pre-register guests both from their desktop and from their home computer or laptop. KGW is collaborating with Veristream to work on an app that will also allow them to do it from their cellphones in the near future.
Aesthetics are important initially, but they should not trump security, safety or throughput. The winning solution has to meet high aesthetic requirements without sacrificing the other key decision factors.
The Kraddick Foundation didn’t seek out badging help from Diamond Business Services, Inc.
September 1, 2014
Kraddick spoke of his Foundation’s work with chronic and terminally ill children and funding an all-expense paid trip to Walt Disney World in Florida each year. The story tugged at the heartstrings of Pence, who has a healthy daughter that she adopted from Russia.
It’s a common phrase in the security field: “There is no silver bullet to prevent incidents.”
September 1, 2014
By combining video surveillance and big data gathered throughout the enterprise, he and his team can look for red flags, such as one particular bartender who has low revenue, a high number of voids and no-sales.
Employees traveling abroad often want to spend off-hours and weekends sightseeing, but that doesn’t mean that enterprises can lose track of them during that time.
Depending on the environment you’re in, physical safeguards such as desks, railings and panic buttons can be helpful deterrents. “You don’t want to make it look like a prison, but at the same time, you can make minor modifications that help protect.
While legislators have passed a multitude of statutes to aid in the protection of our economic interests pertaining to data systems – non-physical assets and privacy – frequently any course of action is still determined by the concept of monetary loss and treated as if someone was stealing or damaging physical assets, or as in the case of the Stored Communications Act (SCA), creating a statue that has been described as dense and confusing to even legal scholars.
Protecting and supporting stakeholders on a global scale through investments in security operations centers (SOCs), intelligence services and travel support companies has become a best practice for leading security programs.
Some businesses, such as airlines, have either suspended service or increased passenger screening in the area. British Airways suspended service to both Liberia and Sierra Leone. Air France and Brussels Airlines increased screening procedures and warned that service could be cut at any time.
When the Department of Homeland Security purposefully dropped data disks and USB flash drives in the parking lots of federal agencies and government contractors, 60 percent of the found objects were inserted into an agency or contractor network.
Having Lock-Down Protocols are useful, however it can delay law enforcement’s entry time. Do not expect to always escort law enforcement to threat areas; directions and diagrams are very helpful.
Safe City initiatives typically start with the integration of security video. In most cases the cameras are operated by the police department or other local government entities such as Departments of Transportation, or Emergency Operations Centers.
It is easy for hackers to hijack global social media accounts because of the sheer volume of accounts of this type and the large number of people managing them.
Three U.S. naturalized citizens of Somali descent undertook suicide bombings in Somali on behalf of the Somali terror group al Shabaab. The concern is that U.S.-based individuals would fight in Syria, return to the United States, and participate in a terror attack on U.S. soil.