cybersecurity

Federal cybersecurity agency launches program to boost support for state, local election offices

WASHINGTON (AP) — The nation’s cybersecurity agency has launched a program aimed at boosting election security in the states, shoring up support for local offices and hoping to provide reassurance to voters that this year’s presidential elections will be safe and accurate. Officials with the U.S. Cybersecurity and Infrastructure […] Click here to view original […]

security policy development

Security Policy Development – Global Expertise

Security Policy Development – The Why While an organization can implement security protocols and work on internal and external security measures, there are considerations that may not be addressed. These can be critical to a security policy and procedures for the safety of the workplace and personnel. The National Center for Education Statistics presents a […]

guard force management

Guard Force Management – Protection of Assets and Personnel

When security personnel and procedures are in place to protect people, assets, and property, efficient guard force management is imperative. The process of guard force management requires a thorough knowledge of the organization’s needs and development of a guard force management strategy that will be effective in protecting personnel and property. Guard Force Management Plan […]

workplace violence program

Is a Workplace Violence Program Right for Your Organization?

Importance of a Comprehensive Workplace Violence Program The U.S. Department of Labor has created and implemented a comprehensive workplace violence program for federal agencies. The instructions and the program as presented to federal agencies stresses that there is no flawless workplace violence program, but having one is critically important. It isn’t just the staff and […]

global security services

Threat Intelligence – Cyber Threat Monitoring

What is Threat Intelligence? The more complicated today’s organizational data systems, the higher the risk of cyber security breaches, and the greater the need for threat intelligence. As regards data systems, the threat intelligence expert(s) will implement systems and procedures to gather information concerning cyber threats. The data gathered will be analyzed, and the assessment […]

travel security

Travel Security Risk Management Programs

Travel security risk management involves all organization stakeholders in the assessment of potential risks to travellers and mitigation of risks for their safety.  Travel Security Risk Management Preparation Preparation for the management of travel security will involve asking organization stakeholders a number of questions in order to assess travel risks and then to formulate a […]

crisis management

Crisis Management – Programs and Plans Development

Crisis Management Expertise Mitch Price brings decades of crisis management experience to clients who want and need proactive planning for a crisis, from weather to pandemics, to terrorism. Selected by a Fortune 150 energy company as the initial executive to design, implement, and manage their enterprise crisis management program, Mitch aligned the program with the […]

aviation security

Aviation Security – Global Cooperation for Safety

The Scope of Aviation Security Cooperation While global airline traffic dropped during the COVID pandemic, it is climbing again and expected to reach and exceed the 2021 count of more than 40 million flights that year. Global annual airline passengers are expected to reach 9.4 billion in 2024, certainly pointing out the grave importance of […]

maritime security

Maritime Security – Internal and External Vessel Protection

What is Maritime Security? Maritime security is an overview term for the maritime industry. It involves protection from threats, both internal and external, to vessels. Thes threats may not necessaily be intentional, and these threats can include: illegal fishing pollution terrorism robbery piracy illegal trafficking (goods and people) Inspection, threat evaluation, and solutions proposals are […]