2). The second essential component is that of assessing and identifying all true Critical Assets. This is the identification and prioritizing of those company assets…
Indeed, every project commences with a Threat Assessment together with a site visit to assess the local geographic environment, as well as studying the existing…
There are many excellent security contractors and integrators, but there are also more than a few that quite frankly should not be allowed near security…
In June 2002, the President signed into law the Public Health Security Bioterrorism and Response Act (PL107-188) which resulted in the Environmental Protection Agency mandating…