Our country’s reliance on the internet cannot be overstated: Beyond its use for leisure, Western society is so dependent that contemplating its disappearance is an exercise in horror.
One of the most challenging aspects of a security program is translating the administrative security into its logical counterparts. While it may sound easy to say, “I want a website for e-commerce and nothing else,” it is not always easy to create that website in a secure fashion, even though implementation has gotten better over time.
Cyberattacks have the potential to cripple public safety departments and jeopardize first responders' ability to protect lives and property. Download this free digital magazine created to help public safety leaders navigate unavoidable issues related to cybersecurity.
Good leaders should always follow the principles of CARET, which stands for communication, accountability, respect, education and trust.
Associate Professor, Health Sciences at American Public University System
- Health Policy
- Population Health
- Health and Wellness Management
- Health Administration
- Program and Project Management
- Multi-Department Management
- Training and Development
Expert in Law Enforcement Investigation Techniques and Policies
- Community policing
- Allocation and deployment
- Emergency operations
- Capabilities development
This On-Demand presentation focuses on the various types of forensics within the framework of training academies, colleges, and universities and how to prepare individuals for the shift from traditional to digital forensics including the use of an alternate interaction methodology, Visual Analytics by Demonstration, which allows people to provide visual demonstrations to interactively explore data in visual analytic applications.
This On-Demand presentation will introduce participants to the National Consortium for the Study of Terrorism and Responses to Terrorism (START), the TEVUS Portal, and the TEVUS Database. The Terrorism and Extremist Violence in the United States (TEVUS) Portal is a free, public-facing online interface and visualization tool that compiles behavioral, geographic, and temporal characteristics of extremist violence in the U.S. dating back to 1970.
The use of social media has become a vital part of information collection that contributes to the situational awareness of the intelligence, law enforcement, and other communities. As with any information collection method, there are inherent concerns with privacy and oversight. This On-Demand presentation will look at procedures and challenges associated with collecting data through social media.