Guidance to individuals and organizations on how to improve the security in your workplace. No workplace—be it an office building, construction site, factory floor, or retail store—is immune from security threats.
Employees are often the target of these threats as well as the organization\'s first line of defense against them. Threats endanger the confidentiality, integrity, and security of your workplace, as well as your virtual workplace and computer systems.
An active shooter is an individual actively engaged in killing or attempting to kill people in a confined and other populated area. In most cases, active shooters use firearms and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly.
All employees can help prevent and prepare for potential active shooter situations. This course provides guidance to individuals, including managers and employees, so that they can prepare to respond to an active shooter situation.
Preparing to assist with State-delivered emergency management training. This course provides a foundation from which participants can develop or enhance their instructional delivery skills within a classroom setting. The focus is how to present an existing lesson plan or training materials.
Webinar - Preventing Workplace Bullying with Timothy DimoffCase IQ
Timothy Dimoff, President of SACS Consulting and Investigative Services Inc., shares tips for preventing workplace bullying. The webinar, presented by i-Sight, also reviews the importance of employee handbooks, the effects of bullying in the workplace and the importance of investigating allegations of bullying.
Guidance to individuals and organizations on how to improve the security in your workplace. No workplace—be it an office building, construction site, factory floor, or retail store—is immune from security threats.
Employees are often the target of these threats as well as the organization\'s first line of defense against them. Threats endanger the confidentiality, integrity, and security of your workplace, as well as your virtual workplace and computer systems.
An active shooter is an individual actively engaged in killing or attempting to kill people in a confined and other populated area. In most cases, active shooters use firearms and there is no pattern or method to their selection of victims. Active shooter situations are unpredictable and evolve quickly.
All employees can help prevent and prepare for potential active shooter situations. This course provides guidance to individuals, including managers and employees, so that they can prepare to respond to an active shooter situation.
Preparing to assist with State-delivered emergency management training. This course provides a foundation from which participants can develop or enhance their instructional delivery skills within a classroom setting. The focus is how to present an existing lesson plan or training materials.
Webinar - Preventing Workplace Bullying with Timothy DimoffCase IQ
Timothy Dimoff, President of SACS Consulting and Investigative Services Inc., shares tips for preventing workplace bullying. The webinar, presented by i-Sight, also reviews the importance of employee handbooks, the effects of bullying in the workplace and the importance of investigating allegations of bullying.
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
The cyber insecurity conundrum cuts across all things digital or networked. How can we prioritize defensive efforts across such a vast domain? This talk will describe a framework for engineering systems and policymaking based on the work factors for cyber attack and defense. After developing the work factor concept, it will be illustrated in several examples
8 Tips on Creating a Security Culture in the WorkplaceTripwire
October is National Cyber Security Awareness Month (NCSAM). We asked experts in the field how companies can motivate their workforce to help strengthen their IT security posture. Read the full article on The State of Security here: http://tripwire.me/2d2INVY
Peter Wood has worked as an ethical hacker for the past 20 years, with clients in sectors as diverse as banking, insurance, retail and manufacturing. He will describe how advanced persistent threats operate from a security intelligence perspective, based on published case studies and analysis. He will highlight APT entry points and exploitation techniques and suggest practical prevention and detection strategies.
In each and every company there is an RFP response factory working around the clock with no guarantees that their RFP response will even be considered. When and how do we respond to RFP's is a key ingredient for success in today's competitive world.
This is a very valuable course for ANY company in the marketplace that does business using RFP's.
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
The cyber insecurity conundrum cuts across all things digital or networked. How can we prioritize defensive efforts across such a vast domain? This talk will describe a framework for engineering systems and policymaking based on the work factors for cyber attack and defense. After developing the work factor concept, it will be illustrated in several examples
8 Tips on Creating a Security Culture in the WorkplaceTripwire
October is National Cyber Security Awareness Month (NCSAM). We asked experts in the field how companies can motivate their workforce to help strengthen their IT security posture. Read the full article on The State of Security here: http://tripwire.me/2d2INVY
Peter Wood has worked as an ethical hacker for the past 20 years, with clients in sectors as diverse as banking, insurance, retail and manufacturing. He will describe how advanced persistent threats operate from a security intelligence perspective, based on published case studies and analysis. He will highlight APT entry points and exploitation techniques and suggest practical prevention and detection strategies.
In each and every company there is an RFP response factory working around the clock with no guarantees that their RFP response will even be considered. When and how do we respond to RFP's is a key ingredient for success in today's competitive world.
This is a very valuable course for ANY company in the marketplace that does business using RFP's.
1. Emergency Management Institute
This Certificate of Achievement is to acknowledge that
JEFF MARK PHIL SMITH
has reaffirmed a dedication to serve in times of crisis through continued
professional development and completion of the independent study course:
IS-00106.11
Workplace Violence Awareness Training 2011
Issued this 25th Day of December, 2011 Vilma Schifano Milmoe
Superintendent (Acting)
Emergency Management Institute
0.1 IACET CEU
2. National Emergency Training Center
U.S. Department of Homeland Security
16825 S. Seton Avenue
Emmitsburg, MD 21727-8998
CONGRATULATIONS!
It gives me great pleasure to congratulate you on the successful completion of your recent course at
the Emergency Management Institute (EMI). EMI is celebrating a 60-Year Legacy of Training and
Education in Emergency Management during 2011. This anniversary year, you have joined other
distinguished emergency management professionals who have completed training through EMI.
This year, the total number of course completions has already exceeded 22 million.
Please accept my sincere gratitude for your continued support of the emergency management
profession. My staff and I wish you the best of luck in your emergency management career.
Sincerely,
Vilma Schifano Milmoe
Superintendent, (Acting)
Emergency Management Institute
www.fema.gov