G4S Academy EXPERTS
Joe YoungSenior Vice President of Innovation at G4S overseeing new strategies, business and technologies. With 13+ years of experience, Joe has designed complex IP solutions that have helped to craft the future vision around unified solutions in the security industry.
Rachelle LoyearAs Vice President of the Integrated Security Solutions Management at G4S, Rachelle Loyear leads the team responsible for our establishing the G4S Security Risk Management Model and the associated business development and operational management approaches, as well as the G4S Integrated Practices.
Jason DavidAs Sr. Director of Intelligence and the Risk Operations Center (ROC) for G4S Corporate Risk Services Jason David is responsible for leading enterprise risk strategy, intelligence and security operations. David's expertise includes global intelligence, security operations, business continuity, insider threat and crisis management.
Jonathan MooreAs Product Director at AMAG Technology, Jonathan Moore manages product development for AMAG’s enterprise solutions. He recommends present and future product lines by reviewing product specifications and requirements, and manages all product development throughout its lifecycle.
Bruce WimmerAs Senior Director of Corporate Risk Services at G4S, has been involved in investigations and security consulting for more than 40 years. He is also the author of the book: Business Espionage: Risks, Threats & Countermeasures.
Kami DukesAs Director of Business Development and AMAG Technology, Kami and her team work closely with end users and the consultant community to drive new opportunities and manages the complexities of the largest strategic accounts.
Kim RahfaldtKim Rahfaldt is the director of media relations for AMAG Technology. Kim has worked as a public relations professional in the security industry for 20 years.
You should have a good general knowledge of your security program and be able to rate the effectiveness of its components. Complete the risk survey, and receive an analysis of the highest rated security risks your organization faces. Your responses are compared against industry standards and generally accepted practices of security risk assessment.