Managing security & risk 2.0
Learn how enterprises are taking advantage of new tools to identify & manage risk, & how digital transformation is evolving essential business continuity & risk management process.
Learn how enterprises are taking advantage of new tools to identify & manage risk, & how digital transformation is evolving essential business continuity & risk management process.
Take advantage of new techniques and technologies to assess threats, locate resources, and act during critical events.
Take advantage of the network effect: a paradigm of inter-organizational information sharing that can increase situational intelligence during an emergency.
Explore the challenges, as well as strategies and techniques for mitigating and managing pressure-filled critical event situations.
With the increase of terrorist attacks across the globe, a holistic security approach is needed to enable organizations to prepare for, and plan for new threats and attacks.
A NIMS Discussion as two guest speakers from FEMA discuss recent changes updates to NIMS/
Learn about what responses can be taken, how plans can be improved, what long-terms actions can aid recovery, & recent technological improvements that can offer greater assistance.
Steven Crimando, expert in homeland and private security, violence prevention and crisis management shares best practices and real-life examples to help modernize your response.
Dr. David Levine, MD, MA from Brigham & Women’s Hospital leads an in-depth discussion on the concept of “home hospital.”
You have heard of “active shooter,” this series will focus on an “active assailant,” which is a person (or group of persons) actively engaged in killing or attempting to kill or ca
George Spalding, EVP of Pink Elephant, and Vincent Geffray of Everbridge discuss the process that ITIL forgot: Security Incident Response.
Discover the latest research on how to design and disseminate alerts and warning information that encourages public action.