We talk to Fred Burton, NYT best-selling author, former special agent, counterterrorism expert, and executive director of the Ontic Center for Protective Intelligence, about how protective intelligence can help keep athletes and their fans safe.
The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), private sector partners, local first responders, and state and federal partners held a tabletop exercise to test emergency response and recovery operations in preparation for the U.S. Olympic Team Trials – Track & Field, which will be held June 18-27 at Hayward Field on the University of Oregon campus.
As the light at the end of the tunnel becomes brighter, rethinking the hiring and onboarding process for security talent can be the difference between recovering out-of-work employees, getting them up to speed, and enduring unnecessary difficulties.
The nonprofit National Center for Missing & Exploited Children (NCMEC) will provide focused training on missing and exploited children, correct reporting, and signs of trafficking to more than 100,000 security officers.
The Goffert Stadium in the Netherlands needed to upgrade its legacy security system, which had fallen into disrepair and was no longer fit for purpose.
As COVID-19 remains a threat, security leaders at sporting events and entertainment venues need to pivot and change course as needed — relying on security technology, procedures and policies to support the health and safety of players, fans, visitors and staff. Here is a sampling of security technologies offered.
As COVID-19 remains a threat, security leaders at sporting events and entertainment venues need to pivot and change course as needed — relying on security technology, procedures and policies to support the health and safety of players, fans, visitors and staff. Here is a sampling of security technologies offered.
Changeover is inevitable at every organization, all the way up to the chief executive, but former employees with a motive can abuse their privileges to access information they deem valuable or useful in the future, causing irreparable harm to the enterprise and its operations. This insider threat is preventable. Find out how.