Remove 2016 Remove Benchmark Remove Vulnerability
article thumbnail

School Security & Active Shooter Interdiction: A Q&A With Vince Riden

Security Industry Association

In 2016 I began my developing my patent, USPTO #11125537 B2, essentially an active shooter interdiction system. I taught the teachers how to use these systems, taught the principals how to manage these systems and instructed county employees on how to maintain these systems. Even some newer schools are designed and built “campus-style.”

article thumbnail

Singing the Same Tune: The Case for Regulatory Harmonization

FS-ISAC

While cybercrime has been around for decades, the 2016 cyber heist against Bangladesh Bank was a watershed moment for financial authorities around the world. The related controls and processes for handling vulnerabilities are quite similar. This would save cyberattack victims precious time and resources just when they need it most.

article thumbnail

What Is Risk Management?

LogisManager

This involves tracking your company’s technological resources, making sure their vulnerabilities are under control and creating policies and procedures that are compliant with today’s evolving regulations. IT Governance & Security : Protecting your company’s assets, data and reputation by assessing risk and responding to incidents.