article thumbnail

School Security & Active Shooter Interdiction: A Q&A With Vince Riden

Security Industry Association

It’s important to promote a safe learning environment for every student and protect the teachers, staff and visitors in our schools, and SIA appreciates the many talented security professionals who are working diligently each day to enhance the safety and security of our schools and mitigate active shooter threats.

article thumbnail

How to Work With DHS S&T: 8 Programs Security Vendors Need to Know About

Security Industry Association

It analyzes emerging technology, market and global competition, and evaluates technology from more than 1,000 startup companies each year. Eligible innovator types: entrepreneurs and startups, international To learn more and get involved, contact S&T at sandt.innovation@hq.dhs.gov. small businesses with 500 employees or fewer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Understand resiliency patterns and trade-offs to architect efficiently in the cloud

AWS Disaster Recovery

Firms designing for resilience on cloud often need to evaluate multiple factors before they can decide the most optimal architecture for their workloads. Example Corp has multiple applications with varying criticality, and each of their applications have different needs in terms of resiliency, complexity, and cost. Trade-offs.

article thumbnail

Misgivings Cloud First-in-Nation Colorado AI Law: Implications and Considerations for the Security Industry

Security Industry Association

Jared Polis signed into law Senate Bill 205 ( SB-205 ), making Colorado the first state in the nation to enact a measure regulating artificial intelligence (AI) that is applicable broadly. Keep in mind, this term is only applicable in the context of a “consequential decision,” under the definition of high-risk artificial intelligence system.

Security 105
article thumbnail

Download Your Planning Templates

Disaster Recovery Journal

This template guides you through the development of a management decision-making framework necessary to coordinate response activities following the onset of a disruptive incident. IT Application Recovery Template. IT Application Recovery Template. Department Recovery Plan Template. IT Infrastructure Recovery Template.

article thumbnail

What to Know About Colorado’s New Biometric Data Requirements

Security Industry Association

Any controller that controls or processes “any amount” of biometric identifiers or biometric data will be subject to the requirements, removing the applicability threshold. Subsection III exempts activities to assist law enforcement investigations.

article thumbnail

Transportation Worker Identity Credential: Reviving the Qualified Technology List With Simple Self-Certification Approval Process

Security Industry Association

TSA is responsible for enrollment of applicants, background vetting, card issuance and life cycle management of the TWIC credential. The application form includes a series of boxes to check such as type of reader (handheld/portable or fixed mount), biometric matching capability, type of card-to-reader interface (contact or contactless), etc.