Welcome!

News Feed Item

AlliedBarton Security Services and Academy for Critical Incident Analysis Host Emergency Preparedness Symposium

NEW YORK, NY -- (Marketwired) -- 04/07/14 -- AlliedBarton Security Services, www.alliedbarton.com, the industry's premier provider of highly trained security personnel, and the Academy for Critical Incident Analysis, http://aciajj.org/, which promotes scholarly research relating to the emergence, management and consequences of critical incidents, will conduct their second annual symposium. The emergency preparedness symposium will be held on Wednesday, April 23, 2014, from 8:00 a.m. to 1:00 p.m., at John Jay College of Criminal Justice.

John Tello, Assistant Director of Safety and Security at Boston Properties, will present the keynote address on the critical incident response and lessons learned from the Boston Marathon bombing.

Tello's keynote will be followed by a panel discussion relaying additional lessons learned from the Boston Marathon bombing and its effect on the 2014 Superbowl in New York. Facilitated by George Anderson, Vice President of Operations at AlliedBarton, the distinguished panelists include: Jeff Miller, Vice President and Chief Security Officer, NFL; John Keenan, former Director of Security Operations, NFL; Dan Grossi, Director of Security for Special Events, NFL; and Hugh O'Rourke, Chief Innovation Officer, MSA Security.

A second panel discussion will focus on the technology that can prevent or assist in future critical incident response facilitated by Victor Herbert of John Jay College, with panelists Giovanni Giaccione, Engineer, Genetec, and Kevin Comerford, Director of Sales and Marketing at MSA Security.

The symposium also includes an introduction to the Critical Incident Response Simulator, recently completed by John Jay College. Attendees who remain after lunch can participate in a demonstration and discussion group.

Media interested in attending this event are encouraged to RSVP to the press contact in this release.

About The Academy for Critical Incident Analysis
The Academy for Critical Incident Analysis, at John Jay College of Criminal Justice, has been established with the support of the Dart Foundation, to promote and disseminate scholarly research relating to the emergence, management and consequences of critical incidents. ACIA sponsors scholarship and research, hosts conferences and symposiums, and maintains research archives of incident records. ACIA also supports the development and dissemination of course curricula and supporting media for the teaching of critical incident analysis, and supports related instruction at the graduate and undergraduate level at John Jay College.

About AlliedBarton Security Services
For more than 50 years, AlliedBarton Security Services has provided superior security officer services to protect people, homes and businesses. AlliedBarton tailors security programs to meet clients' needs with committed professionals who enhance clients' brands. More than 60,000 employees and 120 offices serve thousands of clients with levels of protection that anticipate needs and build enduring relationships. For more information call 1.866.825.5433 or visit www.alliedbarton.com.

Facebook: http://www.facebook.com/home.p#!/pages/AlliedBarton-Security-Services/239838067452?ref=search&sid=1595856124.1976210655
Twitter: http://twitter.com/alliedbarton
LinkedIn: http://www.linkedin.com/company/alliedbarton-security-services?trk=hb_tab_compy_id_162381
YouTube: http://www.youtube.com/AlliedBartonSecurity
Blog: http://www.alliedbarton.com/AboutUs/Blog.aspx

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Nancy Tamosaitis
Vorticom Public Relations
Phone: 212.532.2208
Email: Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
You deployed your app with the Bluemix PaaS and it's gaining some serious traction, so it's time to make some tweaks. Did you design your application in a way that it can scale in the cloud? Were you even thinking about the cloud when you built the app? If not, chances are your app is going to break. Check out this webcast to learn various techniques for designing applications that will scale successfully in Bluemix, for the confidence you need to take your apps to the next level and beyond.
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...