Modernizing Dam Safety - Digital Innova...
With a growing number of dams approaching their design service life, dam safety engineers are looking for ways to mitigate the risks related to public safety, aging infrastructure and rising maintenance costs. Modernizing dam monitoring and maintenance practices with digital advancements, including the latest automated condition monitoring solutions, drone-captured reality modeling and digital twins, are giving public sector dam operators tool...
March 14, 2024
Organizer:
FedInsider Location:
Webcast
Physical Security Engineering Convergen...
With electronic technologies quickly converging in the physical security vertical it is paramount to understand; first, the basics of physical security, ssecondly, how this new technology will effect the physical security landscape of the future, and thirdly, how the correct physical security environment can actually enhance the technology's effectiveness. Every good physical security program starts with assessing and quantifying criticality,...
Open Source Digital Forensics Conferenc...
The 10th Annual Open Source Digital Forensics Conference (OSDFCon) will be held October 15-17, 2019 in Herndon, VA. This event allows attendees to learn about new software and meet the developers. Oct 15: Workshops: A series of 3-hour in-depth workshops (need separate ticket to attend) Oct 16: Conference: A full-day of 35-minute talks focused exclusively on open source digital forensics tools Free for government attendees through Oct. 5 Oct 17...
Webinar: Findings of the Oroville Dam S...
At a height of 770 feet, Oroville Dam is the tallest dam in the United States. On February 7, 2017, a section of the concrete chute slab of the service spillway at Oroville Dam failed during spillway discharge. Several days later, as the California Department of Water Resources was evaluating and managing discharges through the damaged service spillway during a large rainfall event, the emergency spillway activated for the first time in the pr...
Designing Secure Buildings: Integrating...
(DSB) Designing Secure Buildings – This 3-day workshop is designed to familiarize students with twenty-one design principles used in preventing and detecting criminal activity and reducing the effects of acts of terrorism on the safety of personnel and damage to facilities and critical infrastructure. Specific modules include; Terrorism Ideologies, Security Basics, Philosophies and Design Strategies, Blast Fundamentals, Glazing and Windo...
ERUdyne's Basic Drone Operations Class
ERUdyne has established our Drone Flight School to fill a gap in commercial drone operations training for people that want to build, or switch to, a career using drones to impact safety and security of our Nation's infrastructure, including crisis management and disaster response and recovery support. We teach our students about the business application of drone usage, how the data drones provide is accessed and utilized, and the industry pote...
May 6-8, 2019
Organizer:
ERUdyne Inc Location:
Kilmarnock, VA
Security Criteria Development: Exceedin...
(SCD) Security Criteria Development: Exceeding DHS Guidelines – A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into...
Security Criteria Development: Exceedin...
This course focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also le...
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
Using Building Design to Reduce the Efe...
Based on the assumption that preventive measures must be in place to be effective, students learn 25 mitigation strategies that when successfully applied reduce the impact of terrorist attack. We examine the current state of terrorism in the United States, its evolving nature and the future use of weapons of mass destruction. A variety of options are explored for addressing the most common manmade threats we face today and for the foreseeable...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.