article thumbnail

Book Review: The Invention of Disaster

Recovery Diva

Book Review: The Invention of Disaster: Power of Knowledge in Discourses of Hazard and Vulnerability. Author : JC Gaillard, Professor of Geography, University of Auckland, New Zealand. The author also challenges the “inclusion” agenda of the Sendai and UN Climate Change frameworks. Series Editor: Ilan Kelman.

article thumbnail

Community Emergency Managers: Maximize Impact with B.C.’s New Indigenous Engagement Funding

CCEM Strategies

For example: Risk assessments and emergency and business continuity plans now need to consider Indigenous knowledge, climate change, cultural safety, and impacts on vulnerable persons, animals, places or things. Use the results to set engagement, consultation, and collaboration objectives and form the basis for long-term capacity development.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Mass Gun Violence Trends Should Inform Physical Security Planning

Security Industry Association

Still, many workers and visitors experience daily anxiety that comes with feeling exposed, vulnerable or targeted. Protecting Vulnerable Locations Locations that are at a heightened risk for gun violence must consider integrating ballistic protection. For example, many utilities offices have ballistic barrier systems in place.

article thumbnail

How AI Can Transform Integrated Security

Security Industry Association

With access control, AI can identify individuals through facial recognition and authorize or deny entry. Predictive Analysis Not only can AI detect unusual activities and potential threats in real time, but analytics can predict security issues by examining historical data and identifying patterns that indicate vulnerabilities.

article thumbnail

Securing Mass Gathering Events: A Simple Design Framework That Considers the Air Domain

Security Industry Association

He is also the author and provider of a series of online training courses. Like security program development, planning for an event is a “team sport” that begins with the foundational work of a threat, vulnerability and risk assessment (TVRA) and ends with internal and external stakeholder rehearsals and exercises. He is a retired U.S.

article thumbnail

Cloud Data Security Challenges, Part 3: Getting Control

Pure Storage

Preventive controls , which companies use to manage, strengthen, and protect vulnerabilities within a cloud. As an example, you should always require security verification (authentication and authorization controls) for downloads to and from unsecured devices. . Detective controls , which are used to identify or detect an attack.

article thumbnail

SIA New Member Profile: SecureBI

Security Industry Association

Brandon Reich : I have worked in leadership capacities for various security companies since 2000. The views and opinions expressed in guest posts and/or profiles are those of the authors or sources and do not necessarily reflect the official policy or position of the Security Industry Association. Tell us the story of your company.