This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Events » Webinar

Webinar

Refine your results by

Webinar

4/30/20 to 4/30/21
Contact: Vania

5 Things to Consider When Creating a Security Master Plan

ON DEMAND: This course will walk security professionals through five steps to creating a realistic security master plan and how to make the business case for funding. We start with where you're at and what capabilities you have.

Read More

Webinar

4/23/20 to 4/23/21
Contact: Vania

How IT Can Enhance Security & Video Surveillance

ON DEMAND: The physical security industry adopts datacenter information technology in bits and pieces, but not to the extent possible. This prevents organizations from making strides in reducing costs and complexity, rapidly responding to change, and delivering on the prime security directives of keeping people and property safe.

Read More

Webinar Solutions by Sector

4/21/20 to 4/21/21
Contact: Vania

Building a GSOC for the Future of the Modern Enterprise

ON DEMAND: At the center of an organization's security operation stands its nucleus, one of the most important pieces for overall functionality: the global security operations center (GSOC). But that can look different based on goals, budget and overall vision. However, one commonality remains: the GSOC is where a variety of systems and solutions come together to provide a singular operational picture, mitigate threats and promote enhanced communication during an incident.

Read More

Webinar

4/16/20 to 4/16/21
Contact: Vania

7 Principles of Highly Effective Command Centers

ON DEMAND: Risk impacts every organization, and critical events and can cripple your operations if they’re not properly managed. For organizations focused on risk resiliency, the command center is quickly becoming the operational hub of risk management within an organization: the nerve center for risk.

Read More

Webinar

4/7/20 to 4/7/21
Contact: Vania

How Intelligence as a Service Can Reduce Enterprise Risk

ON DEMAND: With the coronavirus pandemic adding to an evolving set of risks to already challenged security operations and budgets, reducing enterprise risk is more complex than ever.

Read More

Webinar

3/31/20 to 3/31/21
Contact: Vania

Trends in Security Pay & Bill Rates - How Do You Stack Up?

ON DEMAND: In this webinar, we’ll share quantitative, real-world pay and bill rate data from hundreds of security firms across the U.S. to identify common trends. We’ll review how companies price their services based on location, type of post, and the size of the firm.

Read More

Webinar Solutions by Sector

3/26/20 to 3/26/21
Contact: Vania

Passive vs. Active Video Surveillance at Yale University

ON DEMAND: This webinar will cover the design phase of the Yale Police Department’s existing radar layout at the Yale Bowl and the security challenges it has presented. It will also discuss the need to keep the historical nature of the Yale Bowl building in mind while designing a new surveillance system. In addition, the webinar will cover how the Yale public safety team is using the new surveillance system to identify a suspect to decide, in real time, whether or not to dispatch additional resources.

Read More

Webinar

1/24/13
Contact: Jacqlyn Ucinski

Realizing the Quadrant 4 Vision: How Convergint Technologies Became an Enterprise Integrator

AVAILABLE ON DEMAND Convergint Technologies describes Quadrant Four as the highest level of enterprise integration. It is where IT, applications and product knowledge are combined to develop solutions that solve customers’ business problems and help them drive business excellence. The development of the Quadrant Four vision, the strategy for how it is being implemented in the market, and the positive results it has garnered are what earned Convergint Technologies SDM’s 2012 Systems Integrator of the Year Award.

Read More

Webinar

6/12/12
Contact: Jacqlyn Ucinski

How to Create High-Tech Value in Retail

AVAILABLE ON DEMAND This webinar examines how Brown Shoe Company uses security technology in its more than 1,300 locations. Join Protection 1’s Lisa Ciappetta, Senior Director Marketing, and Jim Shepherd, National Account Manager, together with their customer, Kevin Darnell, Director of Loss Prevention at Brown Shoe Company, for this webinar!

Read More
Previous 1 2 3 4 5 Next
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • sponsored-content-BNP-covid__3J9FMQPY3I__
    Sponsored bySureView Operations

    How command centers are responding to COVID-19

Popular Stories

ransomware - cyber

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

Potawatomi Casino implements temp detection and touchless weapons detection for improved safety and security

Milwaukee-based Potawatomi Hotel & Casino implements touchless screening for guests

Security guards Allied, gardaworld and G4S

GardaWorld and Allied Universal to enter bidding war over G4S

SEC0321-Cover-Feat-slide1_900px

The 2021 Top Cybersecurity Leaders

water utilities security

Hacker breaks into Florida water treatment facility, changes chemical levels

2.16_SEC_SBS_REV_360X180_customcontent

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing