Preparing the Next Generation for War on the Virtual Battlefront

by Rodrigo (Roddy) Moscoso -

A "cyber Pearl Harbor" is imminent, according to government and industry experts. Recognizing the threat and implementing programs and training to better guard against such threats is critical to protect the various U.S. infrastructure systems and networks.

Cyber Grand Strategies: Technology vs. Human Interaction

by Bonnie Butlin -

One lesson learned from the National Security Agency leaks in 2013 is that disrupting terrorist activities in cyberspace requires more than just the latest technology. Human interaction plays a critical role in thwarting criminal activity while protecting personal information and privacy. Canada offers one example of leveraging human networks and professional information sharing.

CHEMPACK 2.0: A Policy Roadmap

by Timothy Stephens -

Since 2003, the CHEMPACK program has been in place to help protect U.S. emergency responders and receivers, as well as civilians, in the event of a nerve-agent attack. By pre-positioning medical countermeasures, antidotes are readily available as needed. It is now time to reevaluate and update the program to include changes that have occurred over the past decade.

Virginia - Using Social Media the Right Way

by Tanya Ferraro -

A zombie apocalypse or sharknado attack may not be imminent, but the opportunities they present to emergency management professionals are compelling. In Virginia, emergency planners are showing the human side of emergency management, connecting with community members, and influencing personal and community preparedness.

'Game Day' Food Defense: Enhanced Business as Usual

by Michéle Samarya-Timm -

With more than 40 Olympic venues serving an estimated 14 million meals, the 2012 London Olympic Games were susceptible to many potential foodborne illnesses - both intentional and unintentional. However, through education, communications, surveillance, and a focus on surge capacity, London provided a model that could help protect the food supply at other mass gatherings around the world.

Food Processors - Recovery Before a Recall

by Wm. Mark Cosby -

Recovery begins during the planning stage. As past unintentional cases of food contamination have shown, the effects of an intentional incident could be extremely costly to food processors and the nation as a whole. Understanding the features that processors should include in their recovery plans will help to quickly restore operations and public trust.

Checklists for All-Hazards Food Defense Planning

by Kay C. Goss -

In the not-too-distant past, most food consumed by Americans traveled directly from the farm to the kitchen table. Today, there are a dozen or so stops of varying duration on the way - all of them vulnerable to mold, theft, sabotage, spoiling, and/or infection from zoonotic diseases.

New Mexico - 'Defensive' About Agriculture & Food

by Kelly J. Hamilton -

In a state with a large agricultural and food industry, protecting that infrastructure is a difficult yet necessary task that New Mexico takes very seriously. Guidance and support from the U.S. Food and Drug Administration have helped initiate innovative programs and exercises to protect the state's cattle, alfalfa hay, milk, cheese, pecans, chile, and other agricultural products.

Security Technology Trends to Watch in 2014

by Jay Hauhn -

As security needs continue to change, the technology to meet those needs also must constantly evolve. In 2014, five key technology trends may change the way that business managers protect their employees, data, and facilities: cloud services, wireless technologies, standards, distance biometrics, and business intelligence.

Reducing Risk, Building Resilience

by Sherri Goodman & Gretchen Hund -

The devastating impacts of Hurricane Sandy and other natural disasters that have followed stress the importance of improving disaster-response planning. By gathering and sharing information, however, everyone can play a greater role in reducing risk and creating communities that are more resilient.