BEWARE OF GSX LIST AND HOUSING SCAMMERS – view the official ASIS/GSX vendors

 ASIS International

Allison Sands on De-escalation Training

Security professionals are trained for worst case scenarios, creating a mindset that every interaction with the public is potentially dangerous. Allison Sands started Project Hummingbird to teach practitioners that most public interactions are peaceful and to offer training on how to connect with the public effectively. In this GSX 2021 SM Live studio interview, Sands discusses how to effectively use de-escalation and conflict resolution training.

SM Live interviews were conducted by Security Management Editor-in-Chief Teresa Anderson for virtual attendees during each of the three days of the live show. SM Live featured interviews with CSOs, industry veterans, innovators, and more—brought to you from the broadcast studio, the learning theatres, and the exhibit hall floor.

Michael Haggard on Mass Shootings and the Pandemic

Our world works differently after the onset of the pandemic. In this GSX 2021 SM Live studio interview with Michael Haggard, managing partner at the Haggard Law Firm, Haggard explores how issues such as workplace violence, mass shootings, and human trafficking were affected by pandemic lockdowns and what is likely to happen as the world opens up to a new pandemic landscape.

SM Live interviews were conducted by Security Management Editor-in-Chief Teresa Anderson for virtual attendees during each of the three days of the live show. SM Live featured interviews with CSOs, industry veterans, innovators, and more—brought to you from the broadcast studio, the learning theatres, and the exhibit hall floor.

Inside GSX: 2022 Selection Committee Chair Keith McGlen, CPP

Recently, ASIS launched the call for presentation proposals and reviewers for GSX 2022. We took this opportunity to sit down with the Chair of the GSX 2022 Selection Committee, Keith McGlen, CPP, Vice President, Security Services at UCHealth, to discuss learning and volunteer opportunities at this highly anticipated global event.

As the Chair of the GSX 2022 Selection Committee, what excites you most about this year’s event?

It’s both an honor and a privilege to serve in this role. Those Chairs that came before me did a terrific job at creating the “gold standard” for learning within the security profession, and I plan to honor that legacy and progress our efforts further in 2022.

Four things, in particular, excite me most about this year’s GSX event.

  1. GSX has led, and will continue to lead, in the area of offering the highest quality education – providing professional guidance for security management professionals around the world.
  2. GSX allows security management professionals the opportunity to dive deep into important case studies, best practices and leading trends throughout the security profession.
  3. I am always impressed at how ASIS looks at GSX through the lens of inclusivity. Having access to global subject matter experts (both virtually and in-person) is a key differentiator at GSX.
  4. As a volunteer leader, GSX is also a great opportunity to volunteer serve in the role of review. GSX is developed for security professionals by security professionals. Serving on the review committee has a profound impact, which reverberates globally. You can apply to be a reviewer here.

What are key things the Selection Committee will be looking for in submission proposals?

My first piece of advice is to familiarize yourself with the Call for Presentations page on the GSX site. If you are considering submitting a presentation proposal, make yourself aware of the types of topics covered at GSX. Here’s a partial list of a number of topics that will be considered:

Active AssailantAI/AR/VR and SecurityData Protection, Privacy, and TransparencyDiversity, Equity, and InclusionDigital Transformation
ESRM Best PracticesInsider ThreatSecurity LeadershipSoft Target ProtectionWorkplace Violence

We will be seeking proposals from security professionals that reflect the most significant, innovative, and high-quality thinking in security management. The professional expertise and experience of those who submit a proposal(s) are integral to delivering a robust education program that continues to shape the security management profession year after year. To deliver high-quality sessions that reflect the best security management concepts, knowledge, and practice, preference will be given to proposals aimed at our audience –Global security practitioners at the management and senior/executive levels across the spectrum of security, managing risk, active threats, cybersecurity, loss prevention, and more in both private and public sectors.

Lastly, get to know the process that is in place. It’s of the utmost importance that individuals follow the step-by-step process, instructions and timeline (i.e., deadline dates) as described on the GSX site.

What are the benefits to presenting at GSX?

The are numerous benefits to presenting at GSX, including —

  • The opportunity to be recognized by your peers regarding your subject matter expertise.
  • The opportunity to share your insights with global security management professionals.
  • The opportunity to expand your global network.
  • The opportunity to acknowledge your presentation in your own career development efforts (via your resume, LinkedIn, or in interviews).

If you are interested in presenting at GSX 2022 or becoming a reviewer, please visit the Call for Presentations page and submit your application by 1 February 2022.

Be Intentional with Your Timing

By Scott Briscoe | 28 September 2021 | GSX Daily, 2021

Daniel Pink’s keynote message from Global Security Exchange (GSX) 2021, “How to Make Time Your Ally and not Your Enemy,” can be distilled down to three main points:

  1. Our cognitive abilities don’t remain static during the course of the day.
  2. These daily fluctuations are more extreme than we realize.
  3. The best time to perform a task depends on the nature of the task.

The Peak, the Trough, and the Rebound

Pink’s research took him to study after study that yielded a similar pattern. Everybody has a rhythm to their day, and it looks like this:

Daniel pink graphic.jpg

Each day has three distinct phases, and for most people, it builds to a peak, tumbles to a trough, and rebounds. Everybody, everyday, experiences these three phases.

In his presentation, and in his book, When: The Scientific Secrets to Perfect Timing, Pink cited dozens of academic research studies in a variety of fields that illustrate this pattern. One example examined hundreds of millions of tweets using artificial intelligence. The study concluded that in their tweets, people are happier, more upbeat, and more positive in the late morning to early afternoon and are decidedly less happy and more negative in mid-afternoon before rebounding as evening approaches.

The same pattern emerges in other settings. An analysis of thousands of pages of earnings calls corporate executives have with investors yielded a similar positive (in the morning), then negative (in the afternoon), emotional curve. The study showed real-world consequences as a result: Companies that held afternoon calls had real, if temporary, negative effects on their stock prices compared to companies that held the calls in the morning. Another analysis with critical real-world results found that hospitals make more mistakes resulting in worse patient outcomes when procedures are performed in the afternoon compared to procedures performed in the morning.


Read more about Daniel Pink’s GSX 2021 keynote in the GSX Daily.

The Insider Threat: What Hath COVID-19 Wrought?

By Michael Gips, CPP, principal, Global Insights in Professional Security

The COVID-19 pandemic may well be the most consequential phenomenon that the security profession has had to deal with. One slice of that consequence, albeit a big slice—has come in the form of increased insider incidents and threats. Having presented last month on a GSX panel on that topic, I offer some context and recommendations.

Let’s look first at what COVID hath wrought. Phase 1 covers the first few months after the pandemic set in. I call it “The Great Dislocation.” This phase was characterized by (1) rapid transition to work-from-home, (2) quick dispatch (or purchase) of devices that may not have been updated or configured correctly to (3) workers who were not used to using network resources from home and (4) had little security training. This resulted in (5) basic security protocols being ignored. Capping it off, (6) security was bombarded with new duties, including health screening, access control, and social-distance monitoring.

Phase 2 I refer to as “The Great Hibernation.” People realized that the pandemic would not be fleeting, and their lives filled with Zoom meetings, cabin fever, and the blurring of lines between home and work life. Children might play games on Mom’s work computer or use apps on her smartphone. In one case, a child took and posted a photo that happened to capture a parent’s computer monitor that displayed highly sensitive proprietary information.

As the pandemic dragged on, fears rose—what I call “The Great Trepidation.” Staff worried that their jobs, benefits, or even employers wouldn’t last. Many became distraught, depressed, and emotionally unstable. An American Psychology Association survey shows that half of all adults have exhibited negative behavior due to the pandemic, such as lashing out at loved ones. These feelings sometimes engendered resentment of their employer and a desire to get what they thought they deserved, perhaps through theft, sabotage, or corporate espionage. Security, HR, and management had to address concerns such as abusive staff behavior or violence committed at home.

Then we pivot to what has been commonly called “The Great Resignation,” in which millions shed their employment. Factors were many: fear of contagion at work, shifting life priorities, caring for children not physically attending school, the dread of commuting, vaccine mandates, and so on. More than 11 million U.S. workers quit their jobs from April to June 2021 alone. Another 4.3 million quit in August. Almost 50 percent of employees are actively seeking new opportunities. Another 41 percent of workers are considering quitting, including 54 percent of the youngest cohort, Generation Z.

It’s become common for companies to poach workers and for interviewees to ghost prospective employers. Human resource departments have become so desperate for talent that they might lower standards or sacrifice background checks—thus introducing further insider risk.

Overlapping The Great Resignation is a phase I’ve dubbed “The Great Reallocation.” Organizations are figuring out what constitutes the new normal, such as staggered schedules, hybrid office and work from home, and social distancing. Companies are finding that staff have forgotten basic policies and procedures, requiring re-onboarding much of the workforce. Meanwhile, returning workers who have built new lifestyles worry whether their employers have revisited their policies on maternity/paternity leave, elder care responsibilities, working with unvaccinated people, and creating a hybrid workstyle that is fair to all staff. This web of issues potentially creates a toxic and volatile workplace.

If that wasn’t enough of a perfect storm of insider threat, add the following: (1) political, economic, and social turmoil involving social justice groups, antigovernment agitators, anarchists, QAnon, antimaskers, anti-police protesters, and so on; (2) distrust of basic institutions such as health authorities (COVID denial, etc.), the voting system (a “stolen” presidential election, etc.), and anti-corporate activists (China targeting large Western brands such as Nike and H&M, etc.); and (3) ransomware actors reaching out to alienated staff, offering life-changing paydays.

So how do you navigate this treacherous landscape? Here are my top 10 considerations.

  1. It all begins with people. Listening to, showing empathy for, regularly engaging with, and providing meaningful work and growth opportunities to your staff are all imperative. A fulfilled and respected worker is a loyal and happy worker.
    • Regular check-ins (at least weekly) with remote workers
    • Periodic in-person check-ins with direct reports
    • Revisiting policies and procedures in the new WFH environment
    • If you will be using productivity-monitoring tools, be transparent about it and explain the rationale
    • That culture must permeate the enterprise, including sponsorship, support, and commitment from the very top and across departments and divisions.
  2. Likewise, an insider-threat program must have the commitment of leadership and buy-in across the enterprise
  3. The best time to address insider threats is before hire; conduct background checks, etc. accordingly
  4. Most insider activities are identified through worker tips. Maintain an easy-to-use anonymous reporting system
  5. Inventory measures that you already have
  6. Consider pilot activities and iterative short-term tasking
  7. Institute regular security awareness training and refreshers, with positive incentives; consider gaming approaches to training
  8. Don’t forget to consider the full range of insider threat beyond espionage, fraud, etc. and identify who will have responsibility (e.g. drug trafficking, smuggling, sabotage, harassment)
  9. Also don’t forget to include contractors, business partners, clients, visitors, and staff family members among potential insiders
  10. Consider an insider-threat working group to implement strategy, collect metrics, adjust policies, and track goals and milestones

Thanks to Randy Trzeciak, my GSX copresenter, for his contribution to this list.

Stay for the Encore

The Global Security Exchange (GSX) All-Access Pass unlocks the second complimentary Encore Event, taking place 10 November 2021! Not only will attendees be able to experience the top attended GSX sessions during the rebroadcast through the GSX Platform, they’ll also have a rare opportunity to chat with a few of the speakers and continue the powerful conversations that began at GSX.

Join us for frontline insights on how to deescalate conflict and prepare for worst-case scenarios. Then, continue your learning with ALL sessions available on demand until 31 December 2021.

10 NOVEMBER ENCORE EVENT PREVIEW

Join us for a rebroadcast of these two top attended sessions. Plus, select speakers will be in attendance to continue the critical conversations started at this year’s GSX.

A Survivor’s Story: The Nashville Christmas Day Bombing

11:00 AM ET
Listen to a personal account of the 2020 bombing that left a wake of destruction and forced law enforcement to invent new ways to react quickly and skillfully. This session will include a discussion of the actions of law enforcement at all levels. Attendees will also learn about the intra-department collaboration phase from Doug Korneski, FBI Special Agent in Charge, Memphis Field Office.

Speaker: Douglas Korneski, Special Agent in Charge, Memphis Field Office at Federal Bureau of Investigation

De-escalating Conflict: Creating Critical Space Between Initial Encounter and Physical Response

12:00 PM ET
How can you prepare for the worst while also doing your best to ensure that public interactions are peaceful? Discover how de-escalation and conflict resolution training can create a critical space of stability prior to the use of force that can prevent violence and save lives.

Speaker Allison Sands, President at Project Hummingbird, is not able to participate in the live Q&A during the rebroadcast. She encourages you to reach out to her with any questions via submission on her website, www.projecthummingbird.org.


JOIN US ON 10 NOVEMBER

You will have received an invitation to the GSX digital platform from Pathable. Didn’t get an invitation? Contact [email protected]

Celebrating Women in Security

By Michael Gips, CPP, principal, Global Insights in Professional Security

If the measure of a society is how it treats its women, then the security industry has taken enormous strides in the last 15 years or so. At GSX, more and more women are presenting sessions—by my count, about 20 percent of the speakers this year were female. And women now regularly keynote a General Session. This year we heard journalist Amanda Ripley discuss “good conflict,” and recent shows have featured cybersecurity expert Keren Elazari, tech policy analyst Tarah Wheeler, former deputy national security advisor K.T. McFarland, and fighter pilot Carey Lohrenz.

At GSX we see female security experts, technicians, business development experts, thought leaders, entrepreneurs, and CEOs. Credit goes to the many trailblazers who defied stereotypes, fought through harassment, and contributed new perspectives to a hidebound profession.

Recognition is due in a lot of places, but ASIS launched perhaps the first community to specifically support females in the security industry, called ASIS Women in Security (WIS), in 2009. Other organizations soon followed suit.

When I worked at ASIS International headquarters, the impetus came from Jenny Hartman, my colleague in the Strategic Operations department. Strategic Operations was the home of the CSO Roundtable (now CSO Center for Leadership and Development), and WIS arose as a CSO Roundtable initiative. I recently talked to Jenny about champions of the cause, and she reminded me that, “Without a doubt, the number one supporter was Marene Allison,” then CSO of Medco and now CISO at Johnson & Johnson. Linda Harmon, then of Accenture, came on board next, and Accenture sponsored some of the first events. Other members of the inaugural committee were Judy Matheny (now at the Federal Deposit Insurance Corporation), Natalie Runyon (now at Thomson Reuters), Normadene Murphy (now at BASF Catalysts Division), executive recruiter Kathy Lavinder, and Lorrie Navarro (now at Biogen).

Creating a community for women was controversial. Some female security practitioners thought it implied that women couldn’t succeed on their own. An ASIS staff member wondered whether we would next be creating a group for bald, left-handed men named Mike.

That cynicism eventually dissipated, and WIS is one of ASIS’s strongest communities. It has liaisons in more than 125 ASIS chapters around the world, 957 community subscribers on ASIS Connects, and 5,700 group members on LinkedIn. A new generation of female leaders has taken the reins, including Loye Manning, Brittany Galli, Mary Gamble, Donna Kobzaruk, Deborah Allen, Lynn de Vries, and Nicole Fikes. Their events occur regularly around the world, ranging from virtual happy hours to career coaching to business and security skills.

Our work is far from done, but ASIS and its members can feel proud for beginning to change the narrative.

There’s More to Discover

With your Global Security Exchange (GSX) 2021 All-Access Pass, you get complimentary access to two exclusive Encore Events on 20 October and 10 November 2021 –– and all sessions on demand through the end of the year.

20 OCTOBER ENCORE EVENT PREVIEW

Join us tomorrow for a rebroadcast of these three top attended sessions. Plus, each speaker will be in attendance to continue the critical conversations started at this year’s GSX.

Mass Shooting Liability: What Every American Business Has to be Concerned With

11:00 AM ET
Tune in to hear examples of these tragic incidents and how the liability landscape has changed throughout the courts of America focusing on hotel chains, but also to educational facilities, shopping malls, apartment complexes and places of business.


Using Metrics to Support the Value Proposition of an Organization’s Security Operation

12:00 PM ET
Join us and walk through the creation of a metric-evaluation program, how to use metrics to measure the performance of your security program and examine case studies of existing programs. This presentation consists of a panel of data experts presenting several case studies and examples of effective metric management.


Effective Presentations to the Senior Executive Team and Board of Directors

1:00 PM ET
Understand why some security leaders dread the offensive task and learn how to turn the opportunity into a constructive conversation about managing risk. Learn practical tips to gain allies on the board or senior team as well as how to communicate in clear concise terms that leave the audience with a sense of trust in the presenter.


JOIN US ON 20 OCTOBER

You will have received an invitation to the GSX digital platform from Pathable. Didn’t get an invitation? Contact [email protected]

Face Forward: Opportunities and Pitfalls with Facial Recognition

Originally published by Security Management magazine

By Sara Mosqueda | 29 September 2021 | GSX Daily, 2021

Getting to Orlando, Florida, for GSX 2021 was in some ways a return to normal, especially once I arrived at a busy and crowded airport—featuring both patient and disgruntled travelers waiting to be screened by TSA, children with overstuffed backpacks that would look more at home atop a donkey, and airline staff scanning boarding passes and ushering in passengers.

Different, however, were the hundreds of eyes sitting above masks with that look of trying to remember how to travel, as well as the signage throughout the airport reminding everyone that masks needed to cover mouths and noses unless someone was actively eating.

So, when Don Zoufal, CPP, safety and security executive at CrowZ Nest Consulting, Inc., explained that some airlines are using facial recognition to replace boarding passes, it’s hard not to smile—under the mask, of course—at the irony.

Zoufal, who presented “Face Forward: Legal Issues with Facial Recognition and Other Artificial Intelligence” in the Defensive Strategies Theater, noted that facial recognition has become increasingly common in combining surveillance with customer experience. Beyond the air travel industry, commercial uses for this technology include timekeeping, certifications, and enhancing customers’ experience for a smoother interaction.

On the security side, facial recognition is commonly used for digital or physical access, surveillance, identifying fraud or identity theft, and investigations.

But for all of its advantages, there remain some facets of facial recognition that can hurt an organization’s relationship with the public.

During the session, Zoufal pointed out that people in his hometown of Chicago, Illinois, were unhappy last year when they learned that the Chicago Police Department (CPD) used images from the Illinois Department of Motor Vehicles and Clearview AI without their knowledge or approval, such as when law enforcement agencies source photographs from the Department of Motor Vehicles or other image databases.

“People are creeped out by the fact that their photo may be utilized by police officers in an investigative context,” Zoufal said. Clearview later canceled the two-year contract with the CPD after being named in a civil liberties suit filed by the American Civil Liberties Union.

And there are other uses of facial recognition that are raising legal concerns and the ire of civil liberties groups. From real-time use (essentially, tracking a person through facial recognition) to racial bias to geospatial tracking (such as facilities where employers track the movements of staff) to unauthorized dissemination or use of the data, organizations must remain aware of the shifting regulatory environment.

While Illinois remains ahead of most U.S. states with its Biometric Information Privacy Act (BIPA)—which bars private companies from collecting a person’s biometric data without written notification and consent on how that data is used—Zoufal said he expects similar laws to emerge in other U.S. states.

And although the United States lacks a federal mandate or regulation on the use of facial recognition or other biometric data, the European Union’s General Data Protection Regulation impacts any business with clients or users living in the EU.

Ultimately, Zoufal said transparency and informed consent are the two practices organizations should consistently commit to if they plan to successfully deploy and retain facial recognition for either surveillance or commercial uses.

The ASIS International Security and Applied Sciences Community is studying the future of artificial intelligence applications. To learn more about its work and the community, check out Zoufal’s article from the April Artificial Intelligence issue of Security Technology.

Sara Mosqueda is assistant editor for Security Management, the parent publication of The GSX Daily. Connect with her at [email protected]. Follow her on Twitter: @XimenaWrites.

Hybrid GSX Demonstrates Strength of the Security Community, Attracting 8,600 Global Registrants

The synchronous portion of Global Security Exchange (GSX) 2021 has concluded at the Orange County Convention Center (OCCC) in Orlando, FL. Presented by ASIS International, the world’s largest association for security management professionals, the event offered discussion and idea exchange for the global security community. Attendance exceeded projections, with 8,600 registrants from more than 80 countries and 300 exhibitors demonstrating the latest security solutions. More than 7,200 of the registrants were for the in-person portion of the event – creating an estimated economic impact of $18.5 million for the community.

“We are thrilled to welcome back GSX 2021 to the Center of Hospitality,” said OCCC Executive Director Mark Tester. “Both the digital and in-person experience provided an opportunity for attendees to connect and serve the needs of global security professionals. I look forward to welcoming back ASIS to the OCCC for many years to come.”

The main event began on Monday 27 September. Following an 8:30 a.m. “How to Make Time Your Ally, Not Your Enemy” general session presentation by bestselling author Daniel Pink, the exhibit hall opened at 9:30 a.m. —marking a change to the GSX footprint where the exhibit hall is now open each day of the in-person event. Exhibiting companies Azena, Boon Edam, Cognyte, Cloudastructure, Evolv Technology, Everbridge, OnSolve, RaySecur, Smiths Detection, Trackforce Valiant, and Thermal Radar debuted products on the GSX exhibit hall.

“I’m proud of my friends and colleagues for arranging what is by all metrics a fantastic GSX,” said John A. Petruzzi, Jr., CPP, 2021 president, ASIS International. “We’ve received an overwhelming response from exhibitors and attendees commenting on the high quality of this year’s show. We’re pleased that the new event footprint—placing learning theaters in the exhibit hall—was well received, allowing for ease of access between our event’s best-in-class education and the solutions offered by our exhibiting companies. I’m incredibly thankful to our show’s international contingent for the lengths that they went to in order to gather here in person. The dedication of these individuals just proves the commitment of our profession to make GSX the industry’s premier event.”

Military and Law Enforcement Appreciation Day (MLEAD), the final day of GSX, featured a “Leading Through Uncertainty” general session presented by Lieutenant General (ret) Nadja West. As a thank you to all active duty and veteran military, law enforcement, and first responders, these groups were invited to attend GSX for free this day. More than 90 individuals registered using the MLEAD discount code.

While the in-person portion of GSX has concluded, on-demand broadcasts of all sessions will be available to All-Access attendees through the digital platform until the end of 2021. During encore events taking place 20 October and 10 November, ASIS will rebroadcast top-attended sessions from GSX with presenters in attendance to answer audience questions in real-time.

GSX heads to Atlanta, GA in 2022. The OCCC is slated to welcome back GSX in 2024 and 2028.

Key Management: Extending the Reach and Value of Access Control Systems

Businesses go to great lengths adding layers of security to keep their employees, customers, and organization safe. According to Gartner’s data on IT industry metrics, companies spend an average of 6 percent of their IT budget on security each year.

Access control, video surveillance, fire protection, and cybersecurity precautions usually lead the way; however, safeguarding physical keys and employee-used devices is often ignored as a fundamental element of security. As such, most businesses overlook adding them to their security program, but physical key security and device management should be a priority. Not necessarily because of the value of the key or asset, but because of what the key or asset has access to or authorizes. That’s the greater value, and potentially the greater risk, to an organization.

Craig Newell, Traka Americas ASSA ABLOY’S vice president of business development, sat down with GSX.org host Chuck Harold to discuss Traka’s involvement in Global Security Exchange 2021, taking place 27-29 September in Orlando, FL.

The two discussed how Traka works to understand an organization’s needs and implement a key or asset control system that gets to the heart of each risk and challenge a security and facilities team will face in 2021.

Check out the video to hear more about how key and asset management can extend the reach and value of a physical access control system by:

  1. Taking inventory
  2. Driving operational efficiency
  3. Bridging offline with online security
  4. Auditing the process
  5. Providing accountability and control

Managing Risk Intelligence More Effectively with Artificial Intelligence

We’ve been through a storm of critical events this past year. There’s a proliferation of data on everything from changing weather patterns to fires, chemical spills and cyberattacks. However, without understanding how these threats will potentially affect your operations, that data is useless.

Thanks to AI and machine learning, validated data can now be correlated with a company’s operations, enabling security professionals to see how employees, customers, suppliers and physical assets will be impacted, in time to make a difference and mitigate damages. This is how mere data alerts are transformed into true actionable intelligence during a critical event – so you can make better decisions and manage risk.

Let’s take a look at five of the top trending risks businesses face today and how AI-powered risk intelligence makes it possible to manage these risks and improve resiliency.

1. Cybersecurity

Ongoing incidents of hacking into U.S. government systems show that no organization is immune to cybercrime. Risk intelligence provides pertinent information about an attack, such as the type of threat, the scope and how it might impact your operations. You’ll be able to respond swiftly, activating the appropriate crisis management team and informing employees and executives about what they need to do to manage the risk. 

2. Post-Pandemic Recovery

The new model of work combines different percentages of remote, in-office and hybrid schedules. To make way for this shift, direct investments into digital transformation are projected to total $6.8 trillion  by 2023. Right now, it’s vital to ensure business continuity and resiliency so the next crisis doesn’t derail progress. This necessitates timely and accurate risk intelligence to tell us what’s happening, collaborative incident management to get everyone on the same page and robust, global communications to keep everyone updated.

3. Infodemic Misinformation

More than 1.1 million articles contained misinformation about the pandemic from January to May 2020, according to a study by Cornell . And COVID isn’t the only topic where this is happening. If your risk intelligence doesn’t filter for valid sources, your data is open to infection by rumors and speculation. AI and machine learning weed out invalid sources, so you’re armed with reliable information. You can focus on protecting your people, places and property and notify employees about the truth using critical communications – before they fall prey to speculation.

4. Severe Weather

Whether it’s a hurricane, wildfire or flood, severe weather events are becoming more frequent and less predictable, not to mention more costly. During the first half of 2021, there were eight weather/climate disaster events in the U.S., with losses exceeding $1 billion each. Fortunately, security and emergency teams can leverage the power of risk intelligence to identify threats using leading global sources like the World Meteorological Organization (WMO) and FEMA. Armed with relevant, actionable data, your organization is better equipped to keep employees safe and informed, and able to take proactive steps to protect facilities and vital business operations.

The Big Picture

By going from mere data alerts to true actionable intelligence, AI-powered risk intelligence enables organizations to respond quickly and effectively to critical events, mitigating the damage and improving resiliency. The trending risks we’ve discussed here are part of the larger, ever-expanding risk landscape businesses must face – the elephant in the room, if you will. To finish eating it, we must break it down into manageable bites. Risk intelligence filtered by AI and machine learning gives us the means to consume everything on our plate while saving room for more, because more is always coming.

OnSolve® looks forward to talking to you more about this topic at the upcoming 2021 Global Security Exchange Conference. Stop by booth #733 to learn more about how the OnSolve Platform for Critical Event Management can help you manage risk and build resilience for the remainder of this year and throughout the next.