ON DEMAND: When faced with potential violence in the workplace, employees need to know how to respond in the moment. While safety measures like Run, Hide, Fight, and other protection strategies can be valuable workplace violence prevention tools, individuals in an organization must be prepared to keep themselves and their peers safe through verbal de-escalation.
ON DEMAND: Video analytics has come a long way in the past two years. Improvements to edge-based data algorithms have helped companies like Public Storage reduce the number of false alarms and protect properties better than ever before.
ON DEMAND: Artificial intelligence (AI) has been at the forefront of security conversations for years. The recent advent of generative AI has driven security leaders to wonder what benefits — and risks — modern AI presents.
ON DEMAND: Security teams must be proactive in the face of modern cybercrime trends. Today, cybercriminals are targeting organizations through their multi-factor authentication (MFA) defenses.
In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.
ON DEMAND: Deep learning, a form of AI, is ushering in next-generation video analytics – enhancing detection capabilities even in congested scenes while ignoring disturbances like vehicle headlights or extreme weather.
ON DEMAND: Security leaders today must not only respond to but anticipate a wide range of emerging risks. To streamline risk management programs in an organization, security departments cannot underestimate the human factor.
ON DEMAND: How are you measuring the effectiveness of your security program? Whether you’re a security leader conducting routine internal reviews or an external stakeholder conducting an assessment of a program, it is important to always keep in mind that the scope and functions of a program are largely dependent on the priorities and needs of the business it is supporting.
ON DEMAND: In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats, and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities, or operations.