ON DEMAND: The 2018 Security 500 Report will unveil the top 10 trends CSOs are facing today and how each of them could impact the enterprise’s global reputation with the public, governments and business partners.
ON DEMAND: Today more than ever before, organizations have significant interest in the intelligence that can be derived from video. Content can be leveraged for a multitude of purposes including operational efficiency, situational awareness, marketing and risk mitigation, making it highly valuable to multiple stakeholders. In fact, video is the most prominent Big Data application in the world, and once captured it has to be stored and protected to ensure its usefulness as a business intelligence tool.
ON DEMAND: To effectively secure organizations and facilities, policies, plans and procedures have to be fluid to address the ever-changing trends of crime, terrorism and active shooter incidents. When organizations engage professionals in the security sector to help them address threats of physical, intellectual or cyber theft, violence and, in worst case scenarios, active shooter incidents; it is imperative that security professionals are learning from the nuances of emerging trends and are giving tailored, scalable advice to their clientele.
ON DEMAND: Employees are not confined to static locations as they once were. In fact, according to the Global Business Travel Association, international business travel spend has doubled in the last 15 years and is projected to reach $1.6 trillion by 2020.
ON DEMAND: John A. Petruzzi Jr. and Rachelle Loyear will demonstrate how to manage any security program with a risk-based approach. Examining risks, resources and resolutions in a systematic way will help you understand what you are protecting, what you are protecting it from, and how you can help prevent, contain, or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities.
ON DEMAND: This is not another ordinary active shooter webcast that reiterates the common talking points about material that is already available. Rather, this webcast will contain rich and exclusive content that has been gained as a result of lessons learned from actual responses to threats of violence and acts of violence. Security professional Tom M. Conley, who will be the presenter, has personally responded to more than 300 such incidences and managed more than 700 more over the past 35 years.
ON DEMAND: Set against the backdrop of the 2008 global financial crisis and the 2014 collapse of the global oil market, “Safe Separations” explores the nexus between market driven reduction in force (RIF) and expansion in force (EIF) exercises and the risk of violence impacting an organization. The phenomena of significant headcount change brings unique challenges to companies which are typically exposed to violence risk from 3rd party perpetrators but are now facing the risk of violent actions being taken by employees and contractors from within the organization.
ON DEMAND: How can you enhance your role as a strategic business partner in your enterprise? In this 60-minute webinar, John Turey, Vice President of Enterprise Risk and Security Management at TE Connectivity, will teach you how to better think and understand about enterprise risk management. You will walk away with an innovative perspective, execution framework and views on enterprise behaviors in which you can leverage when engage the “enterprise owners of risk” in your organization.
AVAILABLE ON DEMAND Convergint Technologies describes Quadrant Four as the highest level of enterprise integration. It is where IT, applications and product knowledge are combined to develop solutions that solve customers’ business problems and help them drive business excellence. The development of the Quadrant Four vision, the strategy for how it is being implemented in the market, and the positive results it has garnered are what earned Convergint Technologies SDM’s 2012 Systems Integrator of the Year Award.
AVAILABLE ON DEMAND This webinar examines how Brown Shoe Company uses security technology in its more than 1,300 locations. Join Protection 1’s Lisa Ciappetta, Senior Director Marketing, and Jim Shepherd, National Account Manager, together with their customer, Kevin Darnell, Director of Loss Prevention at Brown Shoe Company, for this webinar!
Our June issue cover article features “Security Leadership: Women in the Spotlight”.
Also in June, video is becoming a fundamental component of a quality security plan. How can CPTED strategies lead to better physical enterprise security? And discover How David Espie, Director of Security, secures Mayland's Seaports.