ON DEMAND: Listen to healthcare security experts as they discuss their journey through the Covid-19 pandemic – from response to recovery, what they saw, and what they learned. This webinar will discuss how these experts reacted to the pandemic, the planning, the changes in their operations and staffing, and dealing with this new unforeseen risk.
ON DEMAND: The purpose of contact tracing is well understood, but there are many misconceptions about how it works, who it should apply to, and how to implement it. This webinar will clarify these issues and will recommend specific capabilities that businesses and government organizations should consider when selecting contact tracing solutions.
ON DEMAND: This webinar will educate viewers on becoming the go-to source for the safety and security of Marijuana farms, dispensaries and all of the other moving pieces of the industry — while also providing an opportunity for professional accreditation.
ON DEMAND: For seamless, simplified workplace access, we must flip our focus from the physical perimeter of the workplace and onto controlling the access of the identity. Some people work from home, some travel constantly to different facilities within their own company, and others are in multiple facilities across multiple companies.
ON DEMAND: DevSecOps creates an environment of shared responsibility for security, where AppSec and development teams become more collaborative. With the right training and tools, developers can become more hands-on with security and, with that upskilling, stand out among their peers... however, they need the security specialists on-side, factoring them into securing code from the start and championing this mindset across the company.
ON DEMAND: Chad Schermerhorn, Security Expert at Brivo, will discuss how your physical security stack should be an operational asset. It should be based on the strongest, and most-up-to-date smart security that can protect you today and adapt for unexpected threats that may come.
ON DEMAND: This presentation will show you the benefits of using high resolution cameras to monitor large venues. This will enable cost savings from reduced camera count. Various intelligent features and functions will be discussed that allow for ease of monitoring and searching videos as well as bandwidth reduction.
ON DEMAND: You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.
ON DEMAND: New security technologies and services are often presented to security professionals within electrical utilities as a response to a perceived threat or risk, but end users can be unsure what solutions are appropriate or most effective for our specific needs. Enterprise physical security leaders are expected to make the right decisions in selecting and implementing security mitigations and controls that provide the best return on investment (ROI) and provide the appropriate level of security at their electrical utility sites.
This month, Security magazine brings you the Security 500 Report, Rankings and Thought Leader Profiles. How does your enterprise compare to others? Which security programs are leading the way? Also this month, we highlight how to plan, prepare for and build resilience to protests and other unplanned events, video surveillance tools for SMBs and more.