The U.S Department of Homeland Security (DHS), with support from George Mason University and the Homeland Security Systems Engineering and Development Institute (HSSEDI), recently concluded a two-week Use of Force Simulation Experiment (SIMEX) to examine law enforcement use of force and inform best practices for 21st century policing.
After a lifetime in the protection business, the one constant in Washington that I’ve learned is that it takes tragedy to force change. The January 6 Capitol riot is not an enigma. This was a clear protective intelligence failure. The key finding of Retired Army LTG. Russel Honore’s report reviewing how the pillar of U.S. democracy could have been so easily infiltrated is that the U.S. Capitol Police (USCP) must better integrate intelligence into its operations through improved awareness, assessment, sharing, and response capabilities. We can look at effective protective intelligence as a three-part story: Act I is identifying threats; Act II is building those threats into a cohesive profile; Act III is sharing and acting on that information in order to make nothing happen. Applying this framework to January 6 helps us understand how we can and must do better and provides important takeaways for corporations.
The Seattle Theatre Group (STG) recently used a cloud video surveillance to solve their surveillance and server management challenges. The solution helped STG streamline their video security infrastructure by being compatible with existing IP cameras and networks.
UAB Italiana LT needed to secure its Kaunas region factory, boosts access control, perimeter security and surveillance to protect employees and assets.
C2MI, the largest electronic systems research center in Canada, is implementing an AI-driven thermal screening technology to increase occupant safety at its facilities and allow security staff to focus on other critical tasks.
Matthew Ireland has been named Chief Information Security Officer (CISO) at NTT Research to focus on both information security and physical security at the organization.
Changeover is inevitable at every organization, all the way up to the chief executive, but former employees with a motive can abuse their privileges to access information they deem valuable or useful in the future, causing irreparable harm to the enterprise and its operations. This insider threat is preventable. Find out how.
Geopolitical risks from Myanmar to Central Asia to Sweden are influencing the threat landscape for global enterprises. Companies must carry out systematic and capillary monitoring activities aimed at minimizing risks or, at least, limiting possible impacts.
As we continue into 2021, it's no secret we are still reeling from the aftermath and impacts that 2020 unleashed across the globe. That's why—now more than ever—it is critical that companies prioritize their duty of care plans, or risk falling behind for good. Below, we speak to Hugh Dunleavy, Senior Vice President, U.S. Operations and Chief Security Officer of Crisis24, a GardaWorld company, about crafting a robust duty of care program.