This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
New Security Industry Association (SIA) member Trinity Consulting & Design offers comprehensive consulting and design solutions for physical security and telecommunications services to both private- and public-sector clients. After my service, I landed in the designing and consulting field over 20 years ago.
The podcast guest is Erika Andresen, JD, CBCP, MPA who is a recognized expert and consultant in Business Continuity. Erika left active duty in 2020 and has since started EaaS Consulting, LLC , with the goal of keeping business in business. Her varied experience gives her a unique perspective on Business Continuity.
It’s important to promote a safe learning environment for every student and protect the teachers, staff and visitors in our schools, and SIA appreciates the many talented security professionals who are working diligently each day to enhance the safety and security of our schools and mitigate active shooter threats.
Reputation Protection: Actively working to protect and even enhance the company’s reputation during and after the crisis. The Role of Ad-Hoc Members In addition to the core team, ad-hoc members are often brought in to provide specialized support for specific issues.
but with 243 million active users, it can be difficult to parse the good from the bad. iomart Group sales, consulting, techy, geek, nerd. Specialising in Cloud and Hosting sales and consultancy. Founder PIM Consultancy. BusinessContinuity industry author, speaker and blogger. Here is a great place to start.
New Security Industry Association (SIA) member Secure Direction Consulting offers expert independent security consulting. I established Secure Direction Consulting in 2015 but did not dive in full time until 2017. Secure Direction Consulting started out in South Florida and relocated to Richmond, Virginia.
Rubin is a consultant and social scientist with 44 years of experience in emergency management and homeland security. Rubin is the author or editor of five books and more than 100 articles for professional publications. Rubin is a consultant and social scientist with 44 years of experience in emergency management and homeland security.
Additionally, the committee guides SIA advisory boards, subcommittees and working groups on cybersecurity activities. By actively participating in Cybersecurity Awareness Month and implementing year-round security practices, we can collectively work towards a safer digital world.
In the UK, 245 people were arrested for terrorism-related activity in the 12 months before 30 September 2024, a 41% increase from the previous 12-month period. Since 2017, 15 domestic terror attacks have been executed in the UK, with 43 late-stage plots thwarted by counter-terrorism agencies.
New Security Industry Association (SIA) member Security Advisors Consulting Group, LLC , is a security consulting practice that specializes in optimizing the security of health care, educational institutions and other open environments. Tell us the story of your company. Drew Neckar. And what makes your offerings/company unique?
Successful risk mitigation requires that a central authority supervise controls following a coherent strategy. Related on MHA Consulting: Global Turmoil Making You Ill? The culprit in these cases is almost always the same: the lack of a central coordinating authority applying a coherent strategy.
Accountable The person with final authority over the task’s completion. Consulted Individuals with unique insights who provide input. With clear visibility into tasks and progress, all stakeholders can stay informed and make better decisions, supporting efficient consultation. Why Do You Need a RACI Model?
Related on MHA Consulting: Get Out the Map: Why Your BCM Program Needs a Roadmap The Power of the Map At MHA, we believe strongly in the value of roadmaps. This body must possess the authority to make decisions, resolve roadblocks, and obtain the necessary resources. We think they’re essential. BIAs, TRAs, RTOs, etc.)
This can easily be extended to any activity within the Kubernetes ecosystem, and 23 plugins are available for tasks such as maintaining PVs, deploying services, grabbing logs, or running internal jobs.
Industry regulators have taken notice and are making resilience a centerpiece of their activities. The action came after the Financial Conduct Authority (FCA) along with the Bank of England (BoE) and the Prudential Regulation Authority (PRA) issued their operational resilience policy in March 2021.
Our security expertise has since expanded to provide strategic security consulting for commercial facilities, higher education, health care and transit facilities. We want to be a part of the fabric of the communities we work in, and we do this by staying active and involved. And what makes your offerings or your company unique?
From there, she co-launched a consulting company, specializing in end-to-end business intelligence solutions tailored to the needs of banks and credit unions. If that wasn’t enough, Melody is also a prolific author, writing blog posts for Pure Storage , as well as currently working on her fourth book. Supporting Women in Tech.
New Security Industry Association (SIA) member MxV Security Solutions offers physical security consulting, solution design and online security training services. His experience includes solutions engineering, project managemen and consulting with various end users, dealers and manufacturers on the industry.
In this month’s update from the SIA Data Privacy Advisory Board , get the most current information on advisory board projects and events, then see updates on the latest privacy developments, legislative and regulatory activity and must-read articles on privacy topics. It does not contain a private right of action.
An active member of SIA with over 20 years of industry experience, Sean A. Ahrens leads the security consulting practice at Affiliated Engineers, Inc. Beyond this, he authored his own guide on safe involuntary termination strategies.
In other words, actively managing their reputation and protecting that 63% of market value from harm! For example, who is an authorized spokesperson? How can you actively build a cushion of goodwill to protect your reputation when it comes under attack? Oh, and don’t forget about home life too.
New Security Industry Association (SIA) member ProTecht Solutions Partners, LLC , is a boutique firm that provides security consulting and project management solutions through partnerships. ProTecht is a security technology consulting firm. ProTecht is a small, one-person consulting firm. We believe in #thinkoutsidethepanel.
This initiative, presented by the SIA Women in Security Forum , honors 100 women in the security industry each year who are role models for actively advancing diversity, inclusion, innovation and leadership in the community. Anne Magner, Zoom Video Communications, Inc. Abigail Maines, HiddenLayer, Inc.
and consulting and audit of software solutions in physical security. IK : We are confidently and actively driving interoperability in the industry by collaborating with leading manufacturers in Europe and North America to create, adopt and implement standards. We also plan to take part in security trainings provided by SIA.
s recent allocation of $18 million for Indigenous engagement is a critical opportunity for communities to increase preparedness through consultation and collaboration and meet new emergency management legislative requirements. Contribution Agreements need to include a brief description of the activities you will use the funding for.
Harrison is responsible for the coordination of stakeholder engagement activities and helps to identify biometric identity management solutions in support of existing OBIM stakeholders. Most is the author of numerous research reports, as well as a contributor to several books.
Panelists will include system designers, integrators, former utility employees and consultants who actively design and operate defenses in this space. “I’m 21, 9:30-10:15 a.m. 21, 1:00-1:45 p.m. The post Five Can’t-Miss Sessions on Critical Infrastructure Protection at ISC East appeared first on Security Industry Association.
NVT Phybridge is headquartered in Ontario, Canada; its IP products are manufactured in North America and are Trade Agreements Act and National Defense Authorization Act-compliant; and it serves several geographic markets worldwide, including North America, South America, Europe, the Middle East, Africa and Asia.
Get familiar with the new Act and stay up to date: Changes to this legislation will bring significant ripple effects for emergency and disaster management planning, which is likely to impact business activities. Although the new legislation will be phased in over time, staying up to date will help you develop a strategic approach forward.
The planning should also include critical infrastructure such as Active Directory and DNS. It’s important to create and update lists of cell phone numbers and alternate email addresses for contacts within IT and security teams, senior leaders, and outside security consultants such as the retained forensics team. .
Co-authored by Daniel Covey, Solutions Architect, at CloudEndure, an AWS Company and Luis Molina, Senior Cloud Architect at AWS. When designing a Disaster Recovery plan, one of the main questions we are asked is how Microsoft Active Directory will be handled during a test or failover scenario. An understanding of Active Directory.
Related on MHA Consulting: The ABCs of ERM: The Rise of Enterprise Risk Management Introducing Enterprise Risk Management In addition to being a business continuity consultant, I’m a business owner. It increases the organization’s chances of being able to carry on its most important and productive activities steadily and safely. (It
There were also police boats in place to stop any protestors or publicity seekers (like at the Oxford and Cambridge boat race) getting near the Queen and there was an emergency lane which could be used by the Police and the Port Authority in the event of a ship breaking down or an emergency.
There were also police boats in place to stop any protestors or publicity seekers (like at the Oxford and Cambridge boat race) getting near the Queen and there was an emergency lane which could be used by the Police and the Port Authority in the event of a ship breaking down or an emergency.
In a briefing yesterday, global risk consultancy Control Risks discussed some of the risk management considerations and steps companies need to take as the sanctions landscape continues to evolve. Consider any impact winding down activities in one area may have on other business areas. What risks are you exposed to? How do you respond?
Additionally, the definition of ICT third-party providers not only includes cloud services but also network services, hardware services, and ICT consulting. Under DORA, risk teams must take on a more active role in procurement to assess potential risks before a contract is enacted.
Bill would authorize more than $850 billion for national security programs. Congress has advanced the final version of the National Defense Authorization Act (NDAA) for fiscal year 2023 (FY 2023); included in the legislation is the authorization for more than $850 billion for national security programs.
However, there may still be room to improve your practices, and it might even be the case that your activities aren’t necessary. Auditors sometimes try to stamp their authority by pointing out areas of non-compliance as soon as possible. They use the audit to generate consultancy work. They feel obliged to find errors.
The news very quickly turned from why the crash occurred, to why the co-pilot deliberately crashed the plane, with the media and German authorities busy searching through his past and questioning anyone who knew him, to find out why. The post 27/03/2015 A Threat From Within appeared first on PlanB Consulting.
The news very quickly turned from why the crash occurred, to why the co-pilot deliberately crashed the plane, with the media and German authorities busy searching through his past and questioning anyone who knew him, to find out why. The post 27/03/2015 A Threat From Within appeared first on PlanB Consulting.
In this blog from SIA Cybersecurity Advisory Board member Pauline Norstrom – founder and CEO of Anekanta Consulting – learn about mitigating artificial intelligence-driven cybersecurity threats to physical security products. Introduction Pauline Norstrom, founder and CEO of Anekanta Consulting, serves on the SIA Cybersecurity Advisory Board.
AcceleRISE 2024 – a three-day program featuring industry-leading subject matter experts and emerging security leaders – offered inspiring talks and panel discussions, interactive workshops and lively activities on a variety of topics in leadership, career development, technology, fostering the future of the security industry and more.
From the beginning, we have utilized a consultative approach, ensuring lifetime support for all our customers. What sets us apart is our deep expertise in ID technologies and our commitment to a consultative approach. Access control systems will no longer serve as the sole automated authority on identification and permissions.
This includes representatives of Departments for the Disaster Relief Office (BRA), Fire Department, Aruba Police Force (KPA), Department of Public Health (DVG), Department of Social Affairs (DSZ), Public Works (DOW), Aruba Ports Authority (APA), and tourism. WEB thanks all participants for their active participation.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content