Data InnovationIn this webinar, Joe Young, Senior Vice President of Innovation for G4S, and Jonathan Moore, Product Director for AMAG Technology, will discuss innovative ways to leverage physical security data across an organization.
Active Threat: A Global Perspective WebinarActive threat incidents are escalating globally and create an immediate danger to corporate personnel in their proximity. This webinar will covers the active threat spectrum from vehicle ramming to weapon (knife/gun) attacks and share proven mitigation strategies. Learn about workplace violence identification and mitigation strategies as well as Active Threat scenarios that can be integrated into corporate protective/awareness strategies.
GLOBAL TRAVEL RISK MANAGEMENTWith global business travel experiencing rapid growth, organizations are increasingly challenged to monitor their travelers and to fully understand the ever-changing risk environments around the world. Most businesses are unaware of the level of advisement and protection they need when traveling internationally. This webinar covers regional risks and indicators, such as kidnapping, business espionage and general criminal activity as well as legal, regulatory, transportation and medical risks. Participants will also learn risk-mitigation strategies and best practices, and will hear select use cases.
Event Security: Tips, Tactics and Free Government ResourcesIn today’s constantly evolving risk landscape, securing special events has never been more challenging and complex. During this webinar, security professionals will learn about free government security resources, the essentials of event security management planning and incident and risk mitigation strategies.
You should have a good general knowledge of your security program and be able to rate the effectiveness of its components. Complete the risk survey, and receive an analysis of the highest rated security risks your organization faces. Your responses are compared against industry standards and generally accepted practices of security risk assessment.