Menu
Log in


INTERNATIONAL FOUNDATION FOR
CULTURAL PROPERTY PROTECTION

Log in

News


  • October 11, 2018 9:13 PM | Anonymous

    Reposted from CNBC

    A Bloomberg BusinessWeek report that Chinese equipment manufacturer Super Micro may have allowed microchips used for spying into U.S. data center equipment run by AWS, Apple and others is likely to stoke trade tensions between the two nations over alleged espionage.

    Apple and AWS strongly dispute the Bloomberg report.

    Just Wednesday, the U.S. Department of Homeland Security urged companies to protect against cyberthreats from their managed service providers. It was the latest warning in a long series of ramped-up concerns over espionage from nation-states involving third-party products and services.

    The U.S. Computer Emergency Response Team, which provides disaster response and warnings about serious cybersecurity issues, published an alert that nation-states have been using shared cloud services and managed service providers — like those that provide outsourced handling of corporate functions — to launch advanced attacks and espionage campaigns against critical U.S. companies.

    The attacks have resulted in a variety of adverse consequences, including lost sensitive information, disruption of operations and leaks of proprietary material, according to the US-CERT. The agency said victims of the attacks have included information technology firms, health-care companies, communications providers and manufacturers. It did not identify them.

    China is not mentioned in the warning, but government agencies have grown increasingly wary about how vulnerable U.S. infrastructure may be to Chinese espionage, said Tom Kellermann, chief cybersecurity officer for security company Carbon Black and a former top cybersecurity official for the World Bank.

    "China's activities in this area have only become ramped up in recent years, particularly as trade tensions between China and the U.S. have increased," he said.

    More action on several fronts

    The Department of Justice has also boosted enforcement and rhetoric about espionage activities waged against corporations and enterprise infrastructure from China in recent months

    On Sept. 25, a Chinese national identified as Ji Chaoqun was arrested in Chicagofollowing a complaint accusing him of acting on behalf of Beijing to recruit spies from government contractors in the Midwest. Ji has denied the charges. The complaint is one of several in recent years calling out what the U.S. says are Chinese government-sponsored campaigns to steal huge amounts of U.S. intellectual property for use both by the government and competitively at Chinese-owned businesses.

    A focus on manufacturers

    China has repeatedly denied a role in espionage against the U.S. In August, Hua Chunying, a spokeswoman for China's foreign ministry, countered hacking claims by President Donald Trump, saying: "We are firmly opposed to all forms of cyberattacks and espionage."

    Equipment manufacturers have recently been targeted by the Trump administration, putting pressure on many large technology companies with roots in China.

    In July, the administration moved to block China Mobile from entering the U.S. market over "national security" fears. In August, mobile manufacturers Huawei and ZTE were banned for use in U.S. government agencies, in a bill signed by Trump. Earlier this year, digital surveillance camera maker Hikvision was also the subject of scrutiny after allegations the equipment, used on several military bases and overseas embassies, was capable of sending images back to China. (Some military officials disputed this view. In January 2018, U.S. Army Col. Christopher Beck said the decision to replace the Hikivision cameras was based on concerns about "negative perception" rather than actual security risk.)

    Huawei and ZTE have denied claims their technology has been used for espionage. Hikvision has said the alleged security vulnerabilities were bugs that have since been fixed.

    "Chinese commercial technology is a vehicle for the Chinese government to spy on United States federal agencies, posing a severe national security threat," Rep. Mike Conaway, R-Texas, said in January. "Allowing Huawei, ZTE, and other related entities access to U.S. government communications would be inviting Chinese surveillance into all aspects of our lives."

    See Original Post

  • October 11, 2018 9:09 PM | Anonymous

    Reposted from Denver7

    The Denver Zoo was evacuated Tuesday afternoon after what officials tweeted was a “credible security threat.” 

    According to Denver Police, the zoo received a call from an unidentified individual threatening to fly an airplane into the facility. They later determined the threat was not credible and announced the park would reopen Wednesday.

    The Denver Zoo tweeted around 4 p.m. Tuesday that they received a "credible security threat" and that “The safety of our guests, staff and animals is our top priority and we are taking the necessary precautions.”

    They evacuated more than 1,000 guests from the park and moved animals to safety.

    Officers from the Denver Police Department were called in to help secure the facility. However, about 15 minutes later they tweeted that they are investigating but they have yet to deem the threat credible at this time. 

    Dozens of evacuated guests were seen at the corner of East 23rd Avenue and York Street. A short time later, police allowed patrons who were evacuated to retrieve their vehicles. 

    A spokesperson for the zoo told Denver7 that they are preparing to reopen the park Wednesday. The zoo released the following statement:

    "Our top priority is the safety and comfort of our guests, staff and animals. We take every threat very seriously and consistently review and practice our procedures to maintain the utmost safety standards. Denver Police has reopened 23rd Ave. and Denver Zoo will open tomorrow with normal hours (9 a.m. to 5 p.m.)."

    Police said they are working with their federal partners to determine where the threat came from. 

    See Original Post

  • October 11, 2018 8:31 PM | Anonymous

    Reposted from Campus Safety Magazine

    Campus Safety magazine has found that more than nine out of 10 schools are using security camera systems. Additionally, K-12 campuses are adopting other security measures to improve safety, but do they make students feel safer on campus?

    Not all of them, according to Professor Sarah Lindstrom Johnson of Arizona State University who explored the question, reports ASU Now. Her study found that students feel less safe, as well as less support and equity when there are high numbers of security cameras inside their schools (installed in entrances, hallways, stairwells and cafeterias).

    “The big take-home to this is that there may be a cost to these security measures if they are not done well,” said Linstrom Johnson, who studies school environments and their effect on students.

    The researchers looked at how outdoor cameras, indoor cameras and security personnel affected students’ feelings about their school in regards to safety, support and equity.

    “High levels of cameras inside the school were negatively related to student’ perception of safety, student’s perception of support and their perception of equity,” she said. She believes students see inside cameras as a way for the school to monitor behavior such as cutting class.

    A notable exception, however, was the perceptions of black students. The study found that they viewed the inside cameras less negatively than their white peers. The researchers surmised that black students felt this way because the cameras document what happens to them, which they might believe helps to keep them safe.

    Outdoor cameras were positively related to support, and the presence of security resource officers was positively related to safety, research showed.

    As for security officers on campus, Lindstrom Johnson says more needs to be done in regards to their disciplinary role, the weapons they carry and training to work with adolescents. She added that Arizona is one of the few states that provides training programs for school resource officers.

    Although students have mixed feelings about security cameras, most public safety and security professionals believe they are effective.

    Earlier this year, Campus Safety surveyed more than 700 school, university and hospital protection professionals on the effectiveness of video surveillance on their campuses.  Almost all (96 percent) said these cameras frequently or sometimes provide evidence for investigations. Four out of five said the cameras frequently or sometimes prevent crime, and 74 percent said their video surveillance systems frequently or sometimes act as force multipliers. CS’ survey, however, didn’t differentiate between exterior cameras and ones installed inside a building.

    The subject of school security and the impact it can have on students has been studied many times before. Most are based on self-reporting of security measures by students or school administrators.

    What Lindstrom Johnson believes sets her research apart from other studies is that it objectively looks at security measures. The professor and her team published the study in the Journal of Adolescent Health that included surveys and independent assessments from more than 54,000 students in 98 middle and high schools in Maryland.

    When it comes to how schools should use their money to increase safety, Lindstrom Johnson believes the mental health of students should be more of a priority.

    She says research supports mental health resources on campus are effective in reducing student behavior problems and improving academics.

    “This work suggests that cameras outside the school and security officers might improve students’ feelings of safety and support, but we also have a body of research that shows that evidence-based mental health resources in schools are effective,” she said.

    You can find the full ASU study here.

    See Original Post

  • October 11, 2018 8:27 PM | Anonymous

    Reposted from Multibriefs.com

    It’s not a topic that anyone wants to think about, but companies should be preparing workplace violence prevention and response plans. According to the U.S. Department of Labor’s Occupational Safety and Health Administration (OSHA), workplace violence can include verbal abuse and threats, physical assaults, and homicide. Employees, customers and clients, and visitors can be the perpetrators or victims of workplace violence.

    While over 2 million American workers a year report being a victim of workplace violence, OSHA notes that millions of other incidents are never reported.

    According to a report by XpertHR, workplace violence and active shooter situations are among the most challenging HR compliance issues in 2018. Close to half (45 percent) of respondents felt that preparing for or responding to these types of situations was very or extremely challenging.

    Risk Factors

    No one is immune to workplace violence but some environments and professions are more susceptible than others.

    For example, jobs that involve working in high-crime areas, and working with the general public — especially when exchanging money, or working with unstable people or individuals who have been drinking — have a higher risk. Employees who work at night or alone are also more susceptible. OSHA lists some of these jobs as delivery drivers, law enforcement personnel, healthcare professionals, customer service agents, and public service workers.

    However, it’s important to note that even though some categories of workers are more likely to encounter workplace violence, these situations can occur anywhere.

    MultiBriefs asked XpertHR to tell us more about the report and how companies can prevent and/or respond to workplace violence.

    An Employer’s Obligation

    It’s not enough for employers to hope the company is never the scene of a workplace violence incident. They have an obligation to work proactively to prevent such an occurrence.

    "Employers have a duty under the General Duty Clause of the federal Occupational Safety and Health (OSH) Act to provide a workplace free from recognized hazards that are likely to cause death or serious physical harm to employees, which may include preventing acts of workplace violence," according to Beth Zoller, J.D., legal editor of XpertHR.

    However, she says there are several ways for employees to prevent and respond to violence in the workplace.

    "Draft, implement, and enforce policies and practices that increase awareness and reporting of violence or potential acts of violence that may affect the workplace," Zoller says. By creating a workplace violence prevention program, she says this demonstrates that the employer has a zero-tolerance policy for such acts.

    Defining and Reporting Workplace Violence

    Employers should also make sure that everyone understands the definition of workplace violence. "It is defined as any conduct that is sufficiently severe, offensive, or intimidating as to cause an employee to reasonably fear for his/her personal safety or the safety of his/her family, friends and/or property, such that employment conditions are altered or a hostile, abusive or intimidating work environment is created," Zoller explains.

    While most people understand that shooting, hitting, and other forms of physical abuse are considered workplace violence, she says threats of violence, intimidation, and surveilling and stalking are also included. In addition, Zoller says workplace violence is not limited to behavior that takes place on the employer’s premises, but also extends to actions outside the workplace if these actions affect working conditions.

    "Companies should implement a clear structure for reporting acts of violence and ensure that all complaints or concerns with respect to workplace violence are handled carefully, properly investigated, and promptly remediated," Zoller says.

    Providing Training/Developing Response Plans 

    Training is another important part of workplace violence prevention and preparation. Zoller says employees should be trained to know what to do if an incident occurs. This includes being able to identify the sound of gunshots, knowing where to take cover in safe spots, and also knowing how to react when law enforcement arrives.

    "Designate a team to respond to any acts of violence that may affect the workplace," she recommends. "The team may include representatives of senior management, human resources, security, and in-house legal counsel, as well as outside professionals, local law enforcement authorities, and outside counsel." These individuals should also be trained.

    In addition to designating a team, Zoller says an emergency response plan should be developed. "This should detail how an incident of workplace violence will be managed — including securing the premises, contacting law enforcement, informing employees of impending danger, notifying families during and after an incident, dealing with media, and providing any counseling or other employee assistance after an act of violence has occurred."

    Additional Steps

    There are other ways that companies can lessen the chances of workplace violence. For example, Zoller says supervisors can be trained how to recognize signs of potential workplace violence. "Also, background screen applicants for red flags that may indicate potentially violent behaviors," she says.

    Another step is to institute a no-weapons policy on the employer’s premises. Zoller says there should be strict consequences for violations.

    "I also recommend conducting a safety and security audit to identify and correct gaps in safety and security in the employer’s workplace such as broken locks and malfunctioning security systems," Zoller says.

    While workplace violence isn’t entirely preventable, taking a proactive approach that includes increasing awareness, providing training, and developing violence prevention policies and procedures, can help to provide the safest work environment possible.

    See Original Post

  • October 11, 2018 8:21 PM | Anonymous

    Reposted from CNBC

    The digital economy is set to unlock tremendous economic value for countries over time. But a common setback for the use of various new technologies is their vulnerability to hackers.

    That's because companies and individuals are not taking cybersecurity seriously, according to Erik Brynjolfsson, director at the MIT Initiative on the Digital Economy and a professor at MIT Sloan School.

    The threat of cyber attacks "can be addressed much more effectively than it has been," he told CNBC's "Street Signs" at the annual Barclays Asia Forum in Singapore. "I think we're just not taking it seriously enough."

    Brynjolfsson was commenting on the news that a Google bug exposed the account information of 500,000 users, spurring the tech giant to make a slew of privacy changes and shut down the Google Plus service for consumers.

    "The story here isn't really about Google, it's about our atrocious cybersecurity — not just in social networks, but in banking or voting systems," he said. "Whenever I talk to the real cyber experts, they tell me the lights are blinking red, that we're so vulnerable, and we need to do a lot more to make our information system secure."

    There have been numerous incidents in recent years where technology companies suffered breaches that resulted in user data getting compromised: Uber was fined for a 2016 data breach, Facebook recently discovered a security issue that allowed hackers to access information that could have let them take over around 50 million accounts, and the personal information of millions of Americans was affected in a data breach at credit reporting firm Equifax last year.

    Combating cyber threats "boils down to prioritizing at a higher level," Brynjolfsson said. Some of the fixes are straightforward: For example, he said, two-factor authentication might prevent unauthorized logins and machine-readable paper ballots could make voting systems more secure.

    "These small additional steps, they may slow down some of the processes incrementally, add a little bit of cost, a few percent here and there, but they'll make us tremendously more secure," he said.

    In cybersecurity, he explained, using publicly available cryptography is usually more secure than proprietary systems that are built for specific companies — that's because the former is extensively tested by the cryptography community.

    Digital economies are set to grow as companies spend more money to transform their businesses using technology. International Data Corporation said that in 2018, worldwide spending on digital transformation will shoot past $1 trillion.

    Cybersecurity challenges aside, there are plenty of benefits in a digital economy, according to Brynjolfsson.

    Artificial intelligence, for example, can make the world more interconnected and specific developments in areas of vision systems, speech recognition, decision-making about credit or hiring are creating plenty of opportunities, he said. Still, it will be a challenge for society to help workers who lose their jobs to automation transition into new roles, Brynjolfsson added.

    See Original Post

  • October 11, 2018 8:16 PM | Anonymous

    Reposted from BBC News


    A man who threatened to kill his ex-partner with a World War One replica gun he stole from a museum has been jailed for four years.

    Lee Rousseau, 48, took the replica Luger pistol after ripping the arm from a mannequin on display at the Museum of Lincolnshire Life.

    He then took it to his former partner's home, Lincoln Crown Court heard.

    Rousseau admitted possession of an imitation firearm with intent to cause fear of violence.

    The court heard Rousseau, of Turner Avenue, Lincoln, removed the pistol from the mannequin's arm in the toilets of the museum in Lincoln on 14 March.

    Prosecutor Gurdial Singh told the court Rousseau claimed "he shook the mannequin's hand and the arm fell off".

    Mr Singh said after taking the gun Rousseau - who the court was told was obsessed with guns and was a regular visitor to the museum - went to the home of his ex-partner Cheryl Smith.

    The court heard he was told to leave but started "kicking the front door and threatening to kill her" when she told him she was seeing somebody else.

    "He appeared to make off and thrust a gun through the letter box," Mr Singh said.

    "She was in the kitchen with her child. She saw the tip of the barrel."

    The court heard Rousseau had 26 previous convictions for a total of 49 offenses.

    In addition to the charge of possession of an imitation firearm, he admitted theft and criminal damage.

    Rousseau also pleaded guilty to three charges of possession of a knife from an incident 10 days earlier.


    See Original Post

  • October 11, 2018 8:09 PM | Anonymous

    Reposted from the New York Times

    The Trump administration vowed to fight “radical Islamist” militants, as well as Iran, as part of a multifront campaign to eliminate the terrorist threat to the United States, according a long-delayed counterterrorism strategy released on Thursday by the White House.

    Administration officials promoted the strategy, the first released since 2011, as a new approach to fighting terrorism in a “landscape more fluid and complex than ever.” It embraced, however, many of the principles adopted and refined by both the Bush and Obama administrations.

    The 25-page document noted that extremist groups, armed with encrypted communications and savvy social media skills, are dispersed globally more than ever before. After 17 years of armed conflict, the document said, the United States has had only “mixed success” in preventing attacks against American interests.

    “While we have succeeded in disrupting large-scale attacks in the homeland since 2001,” the report said, “we have not sufficiently mitigated the overall threat that terrorists pose.”

    The sobering assessment of a persistent, resilient threat seemed to contrast with other parts of the strategy that flatly assert the administration will wipe out terrorism against Americans — a goal most counterterrorism experts say is unrealistic.

    It was also somewhat at odds with the Trump administration’s National Defense Strategy, released this year, which pivoted the military away from counterterrorism to face threats from a pair of strategic adversaries, Russia and China.

    The plan was delayed by many months, a victim of fierce internal debates over counterterrorism policy as well as a bureaucratic tug of war between President Trump’s two top former security advisers, Lt. Gen. H. R. McMaster and Thomas P. Bossert, according to a person familiar with the situation.

    The strategy went through multiple drafts early in 2017 before languishing in the National Security Council. An early draft leaked to Reuters in May 2017 did not include the phrase “radical Islamic terrorism,” which Mr. Trump used regularly during the 2016 presidential campaign but which General McMaster urged N.S.C. staff members to avoid.

    General McMaster was forced out of the White House in April, and Mr. Bossert was fired days later, after Mr. Trump appointed John R. Bolton to replace General McMaster.

    The final document mentions “radical Islamist terrorism,” a term that refers to acts of terrorism by Sunni Muslim-affiliated networks like the Islamic State, according to a senior administration official, who spoke on the condition of anonymity to discuss the report before its release.

    But by substituting “Islamist” for “Islamic,” the official said, the strategy seeks to avoid condemning Islam as a whole.

    The new strategy bears the imprint of Mr. Bolton with its emphasis on the threat from Iran, which he described in a White House briefing as “the world’s central banker of international terrorism since 1979,” supporting militant and terrorist groups across the Middle East. Iran’s role was previewed in the State Department’s annual list of global terrorist threats last month.

    The strategy set an uncompromising goal, declaring, “We will eliminate terrorists’ ability to threaten America, our interests and our engagement in the world.” And it embraced the martial language that former President George W. Bush used after the Sept. 11, 2001, attacks. “We are a nation at war,” the document said, “and it is a war that the United States will win.”

    That reverses a position taken by former President Barack Obama, who said in May 2013: “Our systematic effort to dismantle terrorist organizations must continue. But this war, like all wars, must end.”

    Mr. Bolton argued that it was wrong to lull Americans into thinking that the war on terror, which he characterized as a long ideological struggle, was over. “The idea that somehow we can just say, ‘Well, we’re tired of this war and it will go away,’ I think is a mistake,” he said.

    In contrast to Mr. Trump’s confident public statements, the report took a sober view of the threat posed by the Islamic State. Despite losing all but 1 percent of the territory it previously seized in Iraq and Syria, it remains a potent threat to the United States, the document said.

    The extremist group is still supported by eight official offshoots and more than two dozen related networks that regularly conduct attacks across Africa, Asia, Europe and the Middle East.

    Similarly, the strategy said Al Qaeda’s global network “remains resilient and poses an enduring threat to the homeland and United States interests around the world.”

    The assessment calls for a panoply of familiar tactics.

    Military, diplomatic and law enforcement officials will apply constant pressure on terrorist networks. Government experts will sleuth ways to cut off terrorist financing and disrupt terrorist travel. Border security will be tightened. Increased attention will be paid to thwart terrorists’ use of the internet to plot attacks, raise money and attract new recruits.

    “The debate is really about how to calibrate and where to deploy those tools, and increasingly how to do so in a world in which America’s high-end capabilities are also needed for other pressing threats,” said Joshua A. Geltzer, who was senior director for counterterrorism in the Obama administration and is now the executive director of Georgetown University’s Institute for Constitutional Advocacy and Protection.

    Mr. Trump came into office without a clearly articulated philosophy for using the military to fight terrorist groups. He had promised to be more aggressive in taking on the Islamic State — even suggesting during the 2016 campaign that he had a secret plan — but also signaled a desire to rein in the United States as the world’s peacekeeper.

    Surrounded by generals who have been at the center of a decade-long shift toward relying on Special Operations rather than ground troops, Mr. Trump has chosen to maintain the same approach as Mr. Obama but has given the Pentagon more latitude in conflict zones like Somalia and Yemen.

    The strategy also emphasizes the need for allied partners to help conduct counterterrorism missions — something France is now doing in West Africa and the United Arab Emirates in Yemen.

    There are demonstrable shifts in at least some of the tools the United States can bring to bear.

    The strategy, for example, calls for employing cyberoperations against terrorist foes. Last week, White House officials said Mr. Trump had authorized new, classified orders for the Pentagon’s cyberwarriors to conduct offensive attacks against state and nonstate adversaries more freely and frequently.

    The administration acknowledged that another information-age goal — fighting extremist ideology, including terrorist organizations’ ability to continue attracting new recruits — remains one of counterterrorism officials’ most intractable problems.

    “Unless we counter terrorist radicalization and recruitment,” the document concluded, “we will be fighting a never-ending battle against terrorism in the homeland, overseas and online.”

    See Original Post

  • October 11, 2018 8:03 PM | Anonymous

    Reposted from ArtCrimeResearch.org

    The Association for Research into Crimes against Art (ARCA) warmly invites applications to its postgraduate certificate program in the study of art crime and cultural heritage protection.  In 2019, the program will be held from May 31 through August 15, 2019 in the heart of Umbria in Amelia, Italy.

    In its 11th year, this academically-challenging, eleven course program will provide in-depth, postgraduate level instruction in important theoretical and practical elements related to art and heritage crime. By examining art crime’s interconnected world, participants will experience an integrated curriculum in a participatory setting.  The program’s courses will include comprehensive, multidisciplinary lectures, classroom-based discussions and presentations, and field classes that serve as the backdrop for exploring art crime, its nature, and its impact. 

    Each course associated with the program has been selected to underscore the value of, and necessity for, a longitudinal multidisciplinary approach to the study of this type of criminal behaviour, as well as its trends and motivating factors.  Designed to expose participants to an integrated curriculum in a highly interactive, participatory, student-centered setting, the ARCA professional development program utilises instructional modules that include both classroom and in situ field lectures as well as “hands-on” learning from case studies, organised research, and group participatory assignments and discussions.

    Participants are encouraged and challenged from the outset of the program to develop their scholarly interests, and to evolve as independent thinkers and researchers while simultaneously contributing to the theoretical discourse. 

    At the conclusion of the program, participants will have a solid mastery of a broad array of concepts pertaining to provenance, art market due diligence, illicit trafficking, cultural property protection, and cultural security.

    Accepted Candidates Explore

    • art crime and its prevalence
    • art crime policing and investigation
    • art and heritage law and international legal instruments
    • illicit trafficking and its impact on the licit art market
    • Provenance and the challenges of recovering looted assets
    • criminological theories and their application to the study of art crime
    • art crime during war and armed conflicts
    • the art market and its associated risk
    • art insurance and fine art underwriting
    • risk management and crime prevention in museum security
    • art forgery motives and methods
    • art, antiquities and cultural identity

    November 30, 2018 – Early Application Deadline
    January 30, 2019 – General Application Deadline

    Minerva scholarship applications will be accepted through February 01, 2019.

    As spaces on the program are limited, candidates are strongly advised to submit their application materials as soon as possible. Applications are reviewed on a rolling basis until census is achieved, after which candidates will be placed on the waiting list.

    See Original Post & More Information


  • October 11, 2018 7:57 PM | Anonymous

    October 16, 2018 12:00 PM - 5:00 PM

    6250 Hollywood Boulevard 
    Los Angeles, California 90028

    Free

    Catastrophic ​events ​caused ​by ​severe ​weather, ​increasingly ​sporadic ​threat ​conditions, ​and ​malicious ​behavior ​continue ​to ​change ​how ​we ​live, ​work ​and ​play. ​Although ​preventing ​all ​critical ​events ​​is ​out ​of ​our ​control, ​the ​use ​of ​global ​threat ​intelligence ​in ​conjunction ​with ​proactive ​response ​planning ​and ​strategies ​can ​help ​you ​rapidly ​respond ​to ​- ​and ​even ​avoid ​- ​sudden, ​unexpected ​disruptions. To ​help ​address ​some ​of ​the ​common ​challenges ​security, ​business ​continuity, ​operations ​and ​risk ​professionals ​face ​when ​managing ​critical ​events, ​we ​have ​organized ​a ​series ​of ​concentrated ​half-day ​workshops​. ​​Attendees ​will ​walk ​away ​with ​actionable ​best ​practice ​strategies ​to ​ensure ​employees ​are ​kept ​safe ​and ​business ​disruptions ​are ​minimized ​or ​even ​avoided ​altogether. ​ Hear ​​from ​​industry ​​experts ​​who ​​are ​​using ​​best ​​practice ​​strategies ​​and ​​leveraging ​​technologies ​​to ​​keep ​​their ​​employees ​​safe, ​​assets ​​protected, ​​and ​​their ​​businesses ​​running. ​​Faster. ​​ ​This ​is ​an ​event ​run ​in ​collaboration ​with ​ASIS ​International ​and ​their ​Security ​Management ​Publication. 

    Click here to Register Now!

  • October 11, 2018 7:24 PM | Anonymous

    HEART (Heritage Emergency and Response Training) 2018 will take place December 10–14, 2018, at the Smithsonian Institution in Washington, DC. This year’s HEART program builds upon the program launched last year in DC and further refined through regional programs in Puerto Rico and the US Virgin Islands. HEART 2018 seeks applications from cultural heritage professionals and emergency management professionals from all 56 states and territories and Indian Country. 

    The application deadline is October 9, 2018. For complete details about this program and instructions on how to apply, please visit   https://culturalrescue.si.edu/hentf/training/

    HEART is sponsored by the Heritage Emergency National Task Force, a public-private partnership co-sponsored by FEMA and the Smithsonian Institution. This training is made possible by the generous support of The Andrew W. Mellon Foundation.

  
 

1305 Krameria, Unit H-129, Denver, CO  80220  Local: 303.322.9667
Copyright © 1999 International Foundation for Cultural Property Protection.  All Rights Reserved