Best of GSX 2021: Risk, Threat and Vulnerability Assessments
Nonmember Price: $100.00
Member Price: $75.00
Stay up to date on risk, threat, and vulnerability assessments with this curated package of GSX recordings.
Risk, threat, and vulnerability assessments are foundational to security. This Best of GSX package features 5 sessions to keep you up to date on best practice.
- Proven Approaches: Case Studies on Modern Risk Assessment
Businesses that adapt to change evolve. They harness the opportunity to be better equipped to work smarter and do better. Accomplishing this requires an understanding of best and proven practices as well as experiences that would shape and enable smart, risk-based decision making. Security risk assessments must look at security across the enterprise, like transportation, private residences, personal protection, and other activities related to corporate operations and security programs. A holistic strategy guarantees your security is greater than the sum of its parts. Our panel of experts will share their experiences, decisions made, and respective outcomes from varying projects.
- Risk Assessment vs Risk Analysis: The Digital Transformation into Dynamic Risk Analysis Data
In this session, you will learn how the digital collection of risk assessment information is revolutionizing the ways in which we are able to analyze the dynamic nature of risk. Learn how digital collection of risk assessment information is revolutionizing the ways in which we are able to analyze the dynamic nature of risk. Discover how the traditional method of risk analysis was limited by static reporting and liability concerns. Understand the difference between risk assessment and risk analysis and the inherent advantages of collecting more actionable data for trend analysis. Explore how proactive risk managers are embracing more sophisticated data collection models and optimizing their risk and cost decisions. Examine how a leading financial institution has transformed the way in which they collect and analyze risk data to continuously monitor and adjust for the complex and changing nature of risk.
- Security as an Assumption: Case Studies in Safety and Security Complacency at Highly Respected Organizations
This presentation will examine safety and security failings at organizations that were widely perceived to have the strongest safety and security standards in their respective fields. The session will focus on how issues such as prior successes, poor internal communications, and changing priorities contributed to the Boeing 737 MAX disasters, the death of Jules Bianchi in a Formula 1 race, and the 6 January, 2021 attack on the U.S. Capitol. The presentation will emphasize how the organizations’ excellent prior safety records caused leaders to treat safety and security as assumptions instead of priorities, which contributed to fatal outcomes.
- Threat Assessment Best Practices: From the White House to the Workplace
Every business, venue, or organization needs a threat management plan, program, and team— because the safety of your people depends on how well you identify, assess, and manage individuals and the concerning behavior they exhibit. To ensure a safe and secure workplace, you must develop tools to assess threats, implement strategies for intervention and managing threatening individuals, standardize documentation in a case management system, and train your employees to recognize warning signs and how to report them. Learn threat management best practices from a former United States Secret Service agent and former Northwestern University Police Department Director of Threat Assessment as they share techniques to identify behavioral indicators suggestive of a pathway to violence.
- Six Fundamental Questions That Identify At-Risk Individuals on Their Pathway To Violence
This session will provide answers to the critical questions surrounding at-risk individuals on their pathway to violence. This presentation will focus on the six fundamental questions that are always asked in post-incident reports and compel the audience to consider: "If we can answer these questions in post-incident reports, why can't we answer them while an at-risk individual is progressing up his or her pathway to violence?” We will discuss the pathway to violence and examine the stages where the warning signs exist and what methods are available to discover a pathway to prevention.
Write Your Own Review