Companies lacking a clear, memorable, embraced strategy will struggle with implementation, thwart tactical execution, and blunt their own effectiveness.
TABLE OF CONTENTS
FrontLine Safety & Security 2015: ISSUE 2
The revived National Strategy for Critical Infrastructure has been unable to escape two long-standing structural issues that will continue to limit its effectiveness if they do not receive careful consideration.
The role of a director of security takes a different road with the new trends in self-initiated attacks by individuals, with no demonstrable planning or coordination from a larger organization. This type of threat is challenging traditional ways of securing our environment.
Is law enforcement's paramilitary culture and its inherent warrior ethos incongruous with today’s society? Does it improve or hinder mission success?
As law enforcement training grows in importance, it is critical that a comprehensive training curriculum be in place – one that integrates marksmanship training and judgmental training scenarios.
Storms are fascinating, and part of everyday life in many parts of the world. North America just happens to be one of the most dynamic places on earth for severe weather. There are ways to adapt and prepare.
There is an urgent need for new solutions to improve the safety and security of humanitarian healthcare workers deployed in the field.
FrontLine readers consistently rate cybersecurity, critical infrastructure protection, and the health and safety of frontline responders as top priorities. I encourage all of you to continue emailing me with article suggestions.
Due to its broad reach and interconnectedness, CI is often viewed by cyber criminals as a prime target for malicious intent.
Public safety is a complex challenge requiring a multi-agency response capability. The main constraint to interoperability remains the inability of responders to communicate across jurisdictions in an emergency.
Recruitment, training, planning and coordination of attacks, intimidation tactics, and displays of weaponry and power have all been achieved online. Social media has become a new and wildly dangerous weapon of war.
Being part of a massive data breach is like losing your wallet at the mall – there is no way to tell who has it, how they will use it, when they will use it, or if they will use it at all. Only one thing is certain: you must take precautions.