ON DEMAND: Unmanned aerial systems pose a legitimate threat to sporting events in America. The devices are not only becoming cheaper and easier to own, but technology has advanced to such a point that virtually anyone — hobbyist or terrorist — can fly one. MetLife Stadium is home of the New York Jets and New York Giants, in addition to numerous entertainment events and concerts each year.
ON DEMAND: This presentation will explore nine key cybersecurity habits, and will look at how you can use those habits to focus on changing behaviors in your security training. Join this session to tailor your approach to awareness training and have the greatest impact for all of your employees or customers.
ON DEMAND: Managing the risks associated with acute targeted violence occurring in institutions has become challenging and complex. This presentation will provide stakeholders with a current and solution-oriented overview towards proactively managing and mitigating an active shooter incident.
ON DEMAND: In today’s connected world, technology of all kinds are contributing to the transformation of hospitals and healthcare as we know it. The ability to identify and utilize these technologies in new and different ways is one factor that is separating the good hospitals from the great.
ON DEMAND:This program will focus on the issue of workplace violence in the healthcare industry, current trends regarding violence rates, root causes for these behaviors and unique factors present in healthcare and social assistance environments which can cause such behaviors. Common factors in behaviors of concern, appropriate techniques for de-escalating conflict and the spectrum of workplace violence from intimidation to active assailant will be reviewed.
ON DEMAND: The 2018 Security 500 Report will unveil the top 10 trends CSOs are facing today and how each of them could impact the enterprise’s global reputation with the public, governments and business partners.
ON DEMAND: Today more than ever before, organizations have significant interest in the intelligence that can be derived from video. Content can be leveraged for a multitude of purposes including operational efficiency, situational awareness, marketing and risk mitigation, making it highly valuable to multiple stakeholders. In fact, video is the most prominent Big Data application in the world, and once captured it has to be stored and protected to ensure its usefulness as a business intelligence tool.
ON DEMAND: To effectively secure organizations and facilities, policies, plans and procedures have to be fluid to address the ever-changing trends of crime, terrorism and active shooter incidents. When organizations engage professionals in the security sector to help them address threats of physical, intellectual or cyber theft, violence and, in worst case scenarios, active shooter incidents; it is imperative that security professionals are learning from the nuances of emerging trends and are giving tailored, scalable advice to their clientele.
ON DEMAND: Employees are not confined to static locations as they once were. In fact, according to the Global Business Travel Association, international business travel spend has doubled in the last 15 years and is projected to reach $1.6 trillion by 2020.
ON DEMAND: John A. Petruzzi Jr. and Rachelle Loyear will demonstrate how to manage any security program with a risk-based approach. Examining risks, resources and resolutions in a systematic way will help you understand what you are protecting, what you are protecting it from, and how you can help prevent, contain, or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities.
Our special report this month features 26 security leaders who are changing the industry, inspiring many and leading with innovation. Security experts discuss the CCPA, public-private relationships, mobile device security and how aware employees can mitigate active shooter events and workplace violence.