Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingIdentity ManagementPhysical SecurityGovernment: Federal, State and Local

5 minutes with David Wiseman - Turning to technology for the distribution of COVID-19 vaccines

By Maria Henriquez
5 minutes with Wiseman
April 19, 2021

As we embark on the long-haul journey to distribute the COVID-19 vaccine to all Americans, addressing the communication challenges of this distribution has never been more vital for safety and coordination, says David Wiseman, Vice President of Secure Communications at BlackBerry. Here, we talk to Wiseman about the need for unified communications as states implement vaccine rollout strategies. 

 

Security: As states look to implement vaccine rollout strategies, is there a need for unified communications for safety and coordination? 

Wiseman: BlackBerry’s experience working with governments, businesses and humanitarian relief organizations around the world has taught us how essential it is for organizations in mission critical settings to have a trusted and unified system to communicate and collaborate in times of crises. Whether it be working with local governments to issue public alerts and warnings in the context of a wild fire, as we did with California’s Contra Costa County, or working with the American Red Cross to effectively respond to disasters, a secure, unified and resilient communications system is essential. This is also the case for the roll-out of a complex vaccine distribution program. A unified communications system will help authorities coordinate and increase the effectiveness and efficiency of the vaccine distribution program. Moreover, it is useful for issuing critical alerts and conducting rapid surveys in situations that are fast evolving and fluid.

 

Security: What technologies are critical to keeping federal, state, and local officials efficient and alert through the vaccine distribution? 

Wiseman: There are indeed a number of communication technologies that can be easily applied to augment existing plans and increase their effectiveness. A basic tenant for technology adoption, however, would have to be the ability to link multiple government systems with those of private enterprise and civil society organizations to enable collaboration and communication without having to make changes to their existing communication infrastructure or to provision any outside members within their networks. This is important because relevant technologies need to be capable of extending these information flows across a wide variety of channels including email, SMS, phone, Apps and private social feeds in a consistent and efficient way. Beyond just one-off communications the ability to setup operations information workflows that are tailored to local plans can assist in reducing omissions, latency and errors in plan execution. Finally, the ability to have the system engage with the public in a way that protects privacy and delivers approved information in a consistent manner is important. Options could include resident opt-in to different channels or by pushing alerts in a way that does not require the public to share personal information. The technology should enable distribution through multiple channels including social media, digital signs, radio, tv and other public announcement channels. 

 

Security: What are best practices on how to disseminate information quickly, especially during times of uncertainty?  

Wiseman: Even though it is 2021, the reality is that many entities still rely on old-fashioned “solutions” like call-tree lists to disseminate information. The idea of contacting all employees in the middle of the night through daisy-chained phone calls is incredibly inefficient and prone to failure. While this is a more extreme example, it is meant to illustrate the point that a clear and efficient communication solution is crucial to effective decision-making and to protecting people and assets in today’s increasingly complex world. Companies and institutions that implement an Emergency Mass Notification System (EMNS) are far more effective and efficient in communicating warnings and instructions to their employees, stakeholders or constituents during an event or crisis. Instead of relying on one method of communication—an EMNS can deliver information simultaneously over various media and platforms in multiple formats to ensure maximum exposure and impact.

KEYWORDS: business continuity COVID-19 COVID-19 response crisis communications emergency communications emergency response public safety risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Soroko

    5 minutes with Jason Soroko - The importance of zero trust during COVID-19

    See More
  • 5 mins with Patrick

    5 minutes with Kory Patrick - How COVID-19 challenged security practices

    See More
  • 5 mins with Omri Kletter

    5 minutes with Omri Kletter – COVID-19, cybersecurity, crime, and fraud management

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing