After an incident is not the time to review your bomb threat preparedness plan. Work with local law enforcement and first responders, as well as internal stakeholders and partners, to develop a more comprehensive, confidential bomb threat response plan.
Whether you’re attending ISC West on your own or with your integrator, or just watching the new security technology arrive from afar, there are many new solutions on the horizon for video surveillance, access management, mobile credentials and much more.
An inexplicable rise in organized retail crime during the past couple of years, perhaps due to police passivity, has major retailers looking to upgrade their equipment, technology, policies and procedures, and training for employees to combat loss prevention.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!