article thumbnail

Progress and Lessons Learned Using NFPA 3000 in Augusta, GA

National Fire Protection Association

In 2018, Augusta, Georgia, became the first community to implement NFPA 3000®, Standard for an Active Shooter/Hostile Event Response (ASHER) Program, to address mass casualty event mitigation, planning, response, and recovery. has increased from 273 in 2014 to 646 in 2022, with a high of 690 in 2021. The Gun Violence Archive. “All

article thumbnail

Tech Trends for 2023: Don’t Fall Behind

NexusTek

Broad Trend: Zero-Trust Cybersecurity. Under the traditional perimeter-based cybersecurity model, a company grants trust to users located inside the business’ network, denying trust to those located outside of that perimeter. We need a new paradigm of security: Zero-trust cybersecurity. 2022, November 2014). The answer?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

SIA New Member Profile: ECD Systems

Security Industry Association

Mike Bradley : ECD Systems was formed in October 2014 to purchase the low-voltage contracting business assets of Safeguard Security following the sale of the rest of Safeguard. ECD owns its own data and cybersecurity business, which has become the glue for each of the disciplines. Tell us the story of your company.

article thumbnail

Security Industry Association Names Kim Loy and Brendan McFall as 2023 SIA Chair’s Award Honorees

Security Industry Association

In her most recent role as chief product officer for ACRE, she oversaw the company’s brands, strategic product planning and cybersecurity strategy and provided direction for messaging strategy and communications development. McFall began his career in 2014 as executive assistant for Northland Control’s CEO, Pierre Trapanese.

article thumbnail

SIA New Member Profile: Seneca, an Arrow Company

Security Industry Association

In August 2014, we became an Arrow Electronics company. Cybersecurity concerns are going to be a bigger influencer than ever before, as companies look to deploy new tools (both hardware and software). DC : Initially, we intend to grow our market awareness through our SIA membership with active participation in various programs.

article thumbnail

Audit Checklist for SOC 2

Reciprocity

If your clients are worried about cybersecurity, you’ll have to prepare materials for a SOC cybersecurity audit. Before 2014, cloud storage providers only had to meet SOC 1 (previously known as Statement on Standards for Attestation Engagements no. Monitoring activities. Determine the Scope of Your SOC 2 Audit.

Audit 52
article thumbnail

3 Steps to Prepare for 2024 and Beyond with the Risk Maturity Model

LogisManager

From economic fluctuations to cybersecurity threats, from regulatory changes to environmental hazards, the risk landscape is constantly evolving, and organizations must be agile and proactive to stay ahead. This can be achieved by using technology that connects people and resources to policies, risks, controls, and monitoring activities.