Welcome!

News Feed Item

AlliedBarton Security Services and Academy for Critical Incident Analysis Host Emergency Preparedness Symposium

NEW YORK, NY -- (Marketwired) -- 04/07/14 -- AlliedBarton Security Services, www.alliedbarton.com, the industry's premier provider of highly trained security personnel, and the Academy for Critical Incident Analysis, http://aciajj.org/, which promotes scholarly research relating to the emergence, management and consequences of critical incidents, will conduct their second annual symposium. The emergency preparedness symposium will be held on Wednesday, April 23, 2014, from 8:00 a.m. to 1:00 p.m., at John Jay College of Criminal Justice.

John Tello, Assistant Director of Safety and Security at Boston Properties, will present the keynote address on the critical incident response and lessons learned from the Boston Marathon bombing.

Tello's keynote will be followed by a panel discussion relaying additional lessons learned from the Boston Marathon bombing and its effect on the 2014 Superbowl in New York. Facilitated by George Anderson, Vice President of Operations at AlliedBarton, the distinguished panelists include: Jeff Miller, Vice President and Chief Security Officer, NFL; John Keenan, former Director of Security Operations, NFL; Dan Grossi, Director of Security for Special Events, NFL; and Hugh O'Rourke, Chief Innovation Officer, MSA Security.

A second panel discussion will focus on the technology that can prevent or assist in future critical incident response facilitated by Victor Herbert of John Jay College, with panelists Giovanni Giaccione, Engineer, Genetec, and Kevin Comerford, Director of Sales and Marketing at MSA Security.

The symposium also includes an introduction to the Critical Incident Response Simulator, recently completed by John Jay College. Attendees who remain after lunch can participate in a demonstration and discussion group.

Media interested in attending this event are encouraged to RSVP to the press contact in this release.

About The Academy for Critical Incident Analysis
The Academy for Critical Incident Analysis, at John Jay College of Criminal Justice, has been established with the support of the Dart Foundation, to promote and disseminate scholarly research relating to the emergence, management and consequences of critical incidents. ACIA sponsors scholarship and research, hosts conferences and symposiums, and maintains research archives of incident records. ACIA also supports the development and dissemination of course curricula and supporting media for the teaching of critical incident analysis, and supports related instruction at the graduate and undergraduate level at John Jay College.

About AlliedBarton Security Services
For more than 50 years, AlliedBarton Security Services has provided superior security officer services to protect people, homes and businesses. AlliedBarton tailors security programs to meet clients' needs with committed professionals who enhance clients' brands. More than 60,000 employees and 120 offices serve thousands of clients with levels of protection that anticipate needs and build enduring relationships. For more information call 1.866.825.5433 or visit www.alliedbarton.com.

Facebook: http://www.facebook.com/home.p#!/pages/AlliedBarton-Security-Services/239838067452?ref=search&sid=1595856124.1976210655
Twitter: http://twitter.com/alliedbarton
LinkedIn: http://www.linkedin.com/company/alliedbarton-security-services?trk=hb_tab_compy_id_162381
YouTube: http://www.youtube.com/AlliedBartonSecurity
Blog: http://www.alliedbarton.com/AboutUs/Blog.aspx

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Nancy Tamosaitis
Vorticom Public Relations
Phone: 212.532.2208
Email: Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, discussed how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved efficienc...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Containers, microservices and DevOps are all the rage lately. You can read about how great they are and how they’ll change your life and the industry everywhere. So naturally when we started a new company and were deciding how to architect our app, we went with microservices, containers and DevOps. About now you’re expecting a story of how everything went so smoothly, we’re now pushing out code ten times a day, but the reality is quite different.
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.