In this special episode of The Security Podcasts, our multimedia specialist Layan Dahhan sits down with Fred Burton to reflect on the 20 years since 9/11 and how enterprise security has changed for this special episode of The Security Podcasts.
It’s challenging to find feasible solutions to an ongoing risk of flight attendants and frontline transportation workers being subject to workplace violence or physical altercations with customers or the public. Risk professionals should ensure these employees have access to self-defense training and others tools, as well as look to implement a zero-tolerance policy for passenger disruptions.
By reimagining access control and use of existing system data, Yale’s Public Safety Systems and Services team was able to centralize and organize security technology operations, while providing further value across the entire university.
Once Yale University closed due to the pandemic in March 2020, the Public Safety Systems and Services team quickly realized that they could change the way access control was used and programmed across campus, while also streamlining security and operations.
New Chief Security Officers who approach the role with a strong focus on understanding organizational culture for the first 90 days are likely to enjoy success. Here, CSOs provide advice on how to start off on the right foot.
The first 90 days of a Chief Security Officer in an organization are critical for his/her success or failure in the new position. Successful individuals will be the ones who establish trusting relationships, learn the organizational culture, and lay the ground foundation for a security program.
In today’s digital world, personal security is directly tied to corporate security. Therefore, it is critical for organizations to implement employee security guidelines and best practices to improve not only the employees’ digital hygiene and personal security but also the company’s security.
Take a crash course in the evolution of armored vehicles and physical security for assets on the move. While the first armored vehicles was built around 1870, advanced technologies have turned protection vehicles into sensing and surveillance machines.
Whether your organization is migrating its physical security technology or any other operational technologies or processes onto the cloud, all security leaders need to migrate security controls and good security practices with those changes – or risk disaster.
Nick Heywood, Associate Vice President at Guidepost Solutions, talks to Security magazine about the physical, environmental, and cybersecurity issues behind long-empty offices that are reopening as restrictions lift.
ON DEMAND: This webinar will describe the unique challenges each school faced in revamping their security programs, each under the leadership of Joe Souza, who worked for UCF for four years and is now the Director of Security at UF.
ON DEMAND: With the advent of Internet of Things (IoT) technology and Industrial Internet of Things (IIoT), the cyber security practices are increasingly getting integrated with the physical security practices.
ON DEMAND: Physical security is the first line of defense in cyber security. Protecting data centers, home to many companies’ IT infrastructure and networks, demands a four-tier approach to physical security.
In this webinar, we review the results of a benchmark study that asked security professionals about their past, present and future outlook on manned guarding. Want to know what your peers are saying about their weekly billed hours? Join us to find out!