A properly constructed threat hunting program is one of the most effective ways to drive positive change across an organization's entire security posture.
The Indian Institute of Technology Delhi (IIT Delhi) recently migrated their physical security solution to one that includes artificial intelligence (AI)-powered video surveillance. Find out more about the solution in this case study.
Can a high-tech, high-cost video surveillance system be wasted on its monitors?
August 1, 2014
According to Royce Jeffries, the VP of Security Risk Management for Cornhusker Bank, the area had been affected by “lane gang crimes” – thieves break into vehicles or homes to take wallets and checkbooks. Then they drive to the bank with a check and the account holder’s ID, go to the furthest drive-through lane, often in disguise, and try to cash checks.
ON DEMAND: This presentation will focus on where to apply forensic investigations to your incident response plan utilizing resources from CISA and NIST.
ON DEMAND: Navigate the complexities of collaborative investigations with insights into the technologies and methodologies that enhance teamwork across diverse investigative units.