Hospital Incident Command Systems (HICS) are a component of security and emergency management that is often overlooked in many of the disaster plans in the United States.
Counterterrorist operatives perform drills on securing and neutralizing threats at major target areas. Although this is an extremely important concept to master, often ignored is one of the most important components in community disaster preparedness: the local area hospital.
Terrorism has emerged in the last decade as one of the most critical issues with which governments must contend, topping most Western nations’ agendas in terms of resource allocation. For example, some reports indicate the United States has spent more than one trillion dollars waging the “War on Terror” – money and resources that may have been allocated very differently in the absence of such threats.
Managing the perception of security officers plays a major role in personnel and corporate safety – how can a physical fitness build more confidence in the enterprise security department?
The foundation for creating a security department is risk evaluation and training, and taking training out of the binder and using it in the field could be the key to a thriving program.
For a long time, security was its own entity in the IT infrastructure. Security and IT didn’t always see eye to eye, and there were often points of contention. Nowadays, as collaboration between the two has become more common, both IT and security are combining forces to better understand the risks and threats to the enterprise.
Next Generation Security is not just the focus of the Security Industry Association’s (SIA) ISC West 2013 educational program; it’s the means by which leading security professionals create enterprise-wide value through security.
Employers have long recognized that conducting due diligence on new hires is a mission critical task. When it comes to any position dealing with Information Technology (IT), the stakes go up exponentially due to the sensitive nature of access to data and systems that operate the company.
Let’s start with the basics: the reason we take off our shoes at the airport is because the shoe bomber tried to get a bomb on a plane. The reason we can only carry on 3-ounce bottles? Someone tried to get a liquid bomb on a plane. Body scanners? Underwear bomber. But what if we took a look at suspicious behavior of the people attempting these acts of terrorism instead of relying primarily on machines to do our dirty work?