ON DEMAND: Secure cloud connectivity eliminates the need for port-forwarding and associated cyber security risks, allowing for simple and secure deployment with easy connection to remote monitoring centers.
ON DEMAND: Security infrastructures are undergoing a digital transformation with growing adoption of intelligent access control, video surveillance and analytics as well as IoT devices and sensors – generating more data to than ever before. Harnessed properly with artificial intelligence and a risk-based model, this data can be exposed and leveraged to improve life safety, minimize risk and increase operational efficiency.
ON DEMAND: Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
ON DEMAND: Unmanned aerial systems pose a legitimate threat to sporting events in America. The devices are not only becoming cheaper and easier to own, but technology has advanced to such a point that virtually anyone — hobbyist or terrorist — can fly one. MetLife Stadium is home of the New York Jets and New York Giants, in addition to numerous entertainment events and concerts each year.
ON DEMAND: This presentation will explore nine key cybersecurity habits, and will look at how you can use those habits to focus on changing behaviors in your security training. Join this session to tailor your approach to awareness training and have the greatest impact for all of your employees or customers.
ON DEMAND: Managing the risks associated with acute targeted violence occurring in institutions has become challenging and complex. This presentation will provide stakeholders with a current and solution-oriented overview towards proactively managing and mitigating an active shooter incident.
ON DEMAND: In today’s connected world, technology of all kinds are contributing to the transformation of hospitals and healthcare as we know it. The ability to identify and utilize these technologies in new and different ways is one factor that is separating the good hospitals from the great.
ON DEMAND:This program will focus on the issue of workplace violence in the healthcare industry, current trends regarding violence rates, root causes for these behaviors and unique factors present in healthcare and social assistance environments which can cause such behaviors. Common factors in behaviors of concern, appropriate techniques for de-escalating conflict and the spectrum of workplace violence from intimidation to active assailant will be reviewed.
ON DEMAND: The 2018 Security 500 Report will unveil the top 10 trends CSOs are facing today and how each of them could impact the enterprise’s global reputation with the public, governments and business partners.
AVAILABLE ON DEMAND Convergint Technologies describes Quadrant Four as the highest level of enterprise integration. It is where IT, applications and product knowledge are combined to develop solutions that solve customers’ business problems and help them drive business excellence. The development of the Quadrant Four vision, the strategy for how it is being implemented in the market, and the positive results it has garnered are what earned Convergint Technologies SDM’s 2012 Systems Integrator of the Year Award.
This month, Security magazine brings you the Security 500 Report, Rankings and Thought Leader Profiles. How does your enterprise compare to others? Which security programs are leading the way? Also this month, we highlight artificial intelligence, ransomware attacks, vaping and cybersecurity regulations.