This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Events » Webinar

Webinar

Refine your results by

Webinar Solutions by Sector

7/28/20 to 7/28/21
Contact: Vania

Covid-19 and Healthcare Security: Responding to the Unpredictable

ON DEMAND: Listen to healthcare security experts as they discuss their journey through the Covid-19 pandemic – from response to recovery, what they saw, and what they learned. This webinar will discuss how these experts reacted to the pandemic, the planning, the changes in their operations and staffing, and dealing with this new unforeseen risk.

Read More

Webinar

7/22/20 to 7/22/21
Contact: Vania

Returning to Work: Contact Tracing and Beyond

ON DEMAND: The purpose of contact tracing is well understood, but there are many misconceptions about how it works, who it should apply to, and how to implement it. This webinar will clarify these issues and will recommend specific capabilities that businesses and government organizations should consider when selecting contact tracing solutions.

Read More

Webinar

7/21/20 to 7/21/21
Contact: Vania

Your Guide to Securing the Cannabis Industry

ON DEMAND: This webinar will educate viewers on becoming the go-to source for the safety and security of Marijuana farms, dispensaries and all of the other moving pieces of the industry — while also providing an opportunity for professional accreditation.

Read More

Webinar

6/30/20 to 6/30/21
Contact: Vania

How to Streamline and Simplify Workplace Access for Employees and Visitors

ON DEMAND: For seamless, simplified workplace access, we must flip our focus from the physical perimeter of the workplace and onto controlling the access of the identity. Some people work from home, some travel constantly to different facilities within their own company, and others are in multiple facilities across multiple companies.

Read More

Webinar Solutions by Sector

6/25/20 to 6/25/21
Contact: Vania

Insider Threat Assessment in K12 Schools – A Key Strategy to Prevent Campus or Workplace Violence

ON DEMAND: Join us as we explore guidance from the Department of Homeland Security (DHS) in developing threat assessment teams in K12 schools to detect, deter and prevent insiders from causing harm.

Read More

Sponsored Webinar

6/23/20 to 6/23/21
Contact: Vania

AppSec Managers Are Becoming Extinct. Get Ready to Embrace DevSecOps.

ON DEMAND: DevSecOps creates an environment of shared responsibility for security, where AppSec and development teams become more collaborative. With the right training and tools, developers can become more hands-on with security and, with that upskilling, stand out among their peers... however, they need the security specialists on-side, factoring them into securing code from the start and championing this mindset across the company.

Read More

Webinar

6/17/20 to 6/17/21
Contact: Vania

Is Your Old Physical Security Technology a Dirty Little Secret?

ON DEMAND: Chad Schermerhorn, Security Expert at Brivo, will discuss how your physical security stack should be an operational asset. It should be based on the strongest, and most-up-to-date smart security that can protect you today and adapt for unexpected threats that may come.

Read More

Webinar

6/4/20 to 6/4/21
Contact: Vania

Maximizing 8K Resolution for Stadiums, Municipalities, Government, and Other Large Venues

ON DEMAND: This presentation will show you the benefits of using high resolution cameras to monitor large venues. This will enable cost savings from reduced camera count. Various intelligent features and functions will be discussed that allow for ease of monitoring and searching videos as well as bandwidth reduction.

Read More

Webinar

5/26/20 to 5/26/21
Contact: Vania

TPRM 2.0: How to Reduce the Burden of Vendor Risk Assessments

ON DEMAND: You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.

Read More

Webinar Solutions by Sector

5/19/20 to 5/19/21
Contact: Vania

Risk-Based Security Controls in Electrical Utilities

ON DEMAND: New security technologies and services are often presented to security professionals within electrical utilities as a response to a perceived threat or risk, but end users can be unsure what solutions are appropriate or most effective for our specific needs. Enterprise physical security leaders are expected to make the right decisions in selecting and implementing security mitigations and controls that provide the best return on investment (ROI) and provide the appropriate level of security at their electrical utility sites.

Read More
Previous 1 2 3 4 5 Next
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • sponsored-content-BNP-covid__3J9FMQPY3I__
    Sponsored bySureView Operations

    How command centers are responding to COVID-19

Popular Stories

ransomware - cyber

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

Potawatomi Casino implements temp detection and touchless weapons detection for improved safety and security

Milwaukee-based Potawatomi Hotel & Casino implements touchless screening for guests

Security guards Allied, gardaworld and G4S

GardaWorld and Allied Universal to enter bidding war over G4S

SEC0321-Cover-Feat-slide1_900px

The 2021 Top Cybersecurity Leaders

water utilities security

Hacker breaks into Florida water treatment facility, changes chemical levels

2.16_SEC_SBS_REV_360X180_customcontent

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing