Jenny Radcliffe on People Hacking
Glenn Ware on Threat Management
Sanjay Subramanian: Information Siloes Exacerbate Threats
In a world where threats to our personal and professional safety are constantly evolving, how prepared are you and your clients—really? Join us for our webinar program, “How Vulnerable Are You? Identifying, Mitigating &...more
As we learned in part one of this strategic planning series, strategic planning is a critical tool to help behavioral intervention and threat assessment teams (BIT) meet the mission, vision, and internal/external mandates of...more
Imagine, if you will, that you have survived a horrific plane crash on top of a snowy mountain. Littered next to you are pieces of the plane, limited supplies, and one other survivor coming in and out of consciousness. Your...more
Organizations around the world face substantial and increasing cybersecurity-related threats to operations, reputation, and the bottom line. Cyber risk profiles are changing, particularly in light of the increase in agile...more
You probably will not be surprised to learn that students with disabilities are more likely than their general education peers to be referred for a threat assessment. Indeed, students who have deficits in social...more
Is your school threat assessment team in place and ready to act in order to meet upcoming legal deadlines? Does it understand the interaction between threat assessments and special education evaluations? Is it adequately...more
Franczek P.C. is pleased to announce the publication of its annual Legislative Update for schools. With the flood of legislative changes in Illinois this year, it is more imperative than ever for education stakeholders to...more
Governor Pritzker recently signed into law Public Act 101-0455 amending the School Safety Drill Act (105 ILCS 128/1) to require threat assessment procedures and the creation of threat assessment teams in school districts...more
In its recent Cybersecurity Strategy, the U.S. Department of Homeland Security (DHS) defined “cyberspace” as “the independent network of information technology infrastructure, including the Internet, telecommunications...more
• In recently released guidance, the U.S. Department of Defense (DoD) confirms a "one size does not fit all" approach to contractor compliance with its cybersecurity clauses that cover the safeguarding of contractor networks,...more