Remove 2010 Remove Mitigation Remove Vulnerability
article thumbnail

Book Review: Case Studies in Disaster Recovery

Recovery Diva

This new book is the first released book (volume) of the four-volume series of Disaster and Emergency Management Case Studies in Adaptation and Innovation with three books forthcoming, each representing one of the four phases of disaster management (mitigation/prevention, preparedness, response, recovery). link] Contributors: Lucy A.

article thumbnail

Guest Opinion: Why It’s Time to Get Serious About the Risk of Commercial Drones

Security Industry Association

Since its 2010 inception, the commercial drone market is estimated to grow to an $11 billion enterprise by 2031. Comprehensive security program development continues to lag when it comes to drone threat assessments and risk mitigation action. Public space is more vulnerable to a myriad of threats posed by commercial drones.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 2019 Global Assessment Report (GAR)

Emergency Planning

Globally, about a thousand times as much is spent on hydrocarbon exploration and extraction than on the mitigation of the climate change that results from burning fossil fuels (Mechler et al. At Risk: Natural Hazards, People's Vulnerability and Disasters (2nd edition). GAR Distilled. Wisner, B., Blaikie, T. Cannon and I.

article thumbnail

Securing Mass Gathering Events: A Simple Design Framework That Considers the Air Domain

Security Industry Association

Like security program development, planning for an event is a “team sport” that begins with the foundational work of a threat, vulnerability and risk assessment (TVRA) and ends with internal and external stakeholder rehearsals and exercises. This approach is one way to add a layer of risk mitigation to your very busy public event calendar.

article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book is all about the Stuxnet malware, which was used around 2010, developed allegedly by the Americans and Israelis to sabotage the Iranian nuclear programme. The cyber attacks on the Ukraine Grid in 2015 led to 230,000 people being cut off from power is another example of how vulnerable utilities are to cyber attacks.

Malware 52
article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book is all about the Stuxnet malware, which was used around 2010, developed allegedly by the Americans and Israelis to sabotage the Iranian nuclear programme. The cyber attacks on the Ukraine Grid in 2015 led to 230,000 people being cut off from power is another example of how vulnerable utilities are to cyber attacks.

Malware 52
article thumbnail

What the Infrastructure Investment and Jobs Act Means for Security and Life Safety Companies

Security Industry Association

For example, 84% of transit buses have security cameras according to a recent survey by the American Public Transportation Association , up from around half in 2010. . Department of Energy (DOE) to implement a public-private partnerships program to “address and mitigate the physical security and cybersecurity risks of electric utilities.”.