A critical event is defined as an incident that disrupts normal operations, such as severe weather, crime, violence and critical equipment or technology failures. Business continuity and crisis response plans can only go so far if there isn't buy-in across functions, with executive-level support. Read More
In this webinar, we will outline the Security Growth Curve, which provides you with the context of the different levels of maturity to effectively assess where you are relative to the industry in terms of value and maturity. If you are trying to improve your financing with your current provider, looking to expand into new markets or new products, keep key employees, or looking to take some money off the table, you should invest 50 minutes of your valuable time. Read More
ON DEMAND: Locations that were once considered safe havens such as schools, places of worship and healthcare institutions are no longer immune to acts of violence. The session will be specific to unique risks in healthcare settings and address preparedness and response through training, education and communication.
ON DEMAND: In today's tumultuous global climate, where corporations span countries and employee travel is essential to doing business, crises are inevitable. This is why corporate security teams must always be ready for the unexpected and have procedures and plans in place to respond quickly and efficiently. A lag in crisis response or an ineffective response can cost money, resources, and even lives.
ON DEMAND: User experience. You’ve probably heard this term used in reference to some of your favorite apps and devices like Facebook or Twitter, but what does “user experience” have to do with physical security?
ON DEMAND: No environment is completely safe. While shootings in schools, nightclubs, churches and concerts capture many new headlines, more than 80 percent of active shooter incidents occur in the workplace, according to FBI data.
ON DEMAND: While large high tech and Fortune 500 companies have been delivering unprecedented levels of security, safety, emergency, and HR resources to their employees, vendors, user base, etc. at work and at home, the Global Security Operations Center as a Service (GSOCaas) model can now offer mid-size and fast-growing companies the same level of care and risk mitigation.
ON DEMAND: The term “Internet of Things” is becoming increasingly common in the vocabulary of IT and physical security professionals. While IoT may seem like a foreign concept, it’s probably more familiar than you realize. Of the 17.5 million petabytes of data generated by IoT applications, 84% comes from video surveillance! Additional IoT data is generated by integrated security sensors, access control systems and other physical security applications.
ON DEMAND: With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s priority (Gartner puts it at the top of their “Top Security Projects” list for 2 years in a row). But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity?
Our July issue cover article features MLS Soccer, security, and teamwork at the Houston Dynamo Stadium. Also in July, how can confidence make the best hire? And discover how workplace bullying is on the rise.