1. Dr. Jay P. Singh Webinar: Common Statistical Misconceptions in Violence Risk Assessment

    01:00:59

    from Jay Singh / Added

    8 Plays / / 0 Comments

    For Consultation, E-mail Dr. Singh at jaysingh@gifrinc.com The Global Institute of Forensic Research is pleased to have provided this FREE 1-hour webinar on common statistical misconceptions in violence risk assessment with Dr. Jay P. Singh, winner of the 2015 Saleem A. Shah Award for Early Career Development in Psychology and Law. Description: Underlying currently perceived strengths and limitations of risk assessment tools and unstructured clinical judgment are misconceptions resulting from a misunderstanding of statistics. The aim of this webinar is to identify the most common misconceptions and equip attendees with the ability to effectively defend their use of evidence-based risk assessment techniques to administrators, policymakers, and the Court.

    + More details
    • Fundamentals of Project Management - introduction

      02:38

      from Andy Hockley / Added

      10 Plays / / 0 Comments

      What is the Sue Leather Associates "Fundamentals of Project Management" course? This short video explains

      + More details
      • Dr. Jay P. Singh Webinar: The History of Violence Risk Assesment

        47:31

        from Jay Singh / Added

        133 Plays / / 0 Comments

        The Global Institute of Forensic Research is pleased to have provided this FREE 1-hour webinar on the history of violence risk assessment with Dr. Jay P. Singh, winner of the 2015 Saleem A. Shah Award for Early Career Development in Psychology and Law. Description: How did the use of violence risk assessment evolve over the course of the past four centuries? From the days of mercantile insurance in Spain to measuring the skulls of rapists in Italy to the current development of structured risk assessment tools, this field has a fascinating history.

        + More details
        • How to conduct effective, robust and efficient facility siting studies

          49:08

          from DNV GL - Software / Added

          553 Plays / / 0 Comments

          This case study introduces how to conduct a thorough facility siting studies by using DNV GL’s Phast software. The facility siting process, modelling process, analysis and conclusions are discussed in the presentation.

          + More details
          • LENSEC Step into School Safe - Bomb Threats How to Respond Using Best Practices - December 17, 2014

            57:11

            from Keith Harris / Added

            4 Plays / / 0 Comments

            In this webinar, Gary L. Sigrist, Jr., was introduced as our panelist. Gary is a nationally know speaker, consultant, author and expert on emergency preparedness. During his 30 year career, he has been an educator, administrator, and police officer. Gary's background gives him a unique point of view on safety and preparedness in education environments. Gary is the president and CEO of Safeguard Risk Solutions. The company helps its clients identify vulnerabilities, plan accordingly, train thoroughly and respond effectively. In the webinar, Gary covered best practices for responding to bomb threats in schools. The webinar is part of LENSEC's Step Into School Safe series. This is a professional development series for educators and school administrators. Attendees learned about: • Protection of Students, Staff and Property • Minimizing Disruption of the School Day or Events •Working Together With First Responders •Developing a Response Plan •Controlling Access to the School Building •Practicing Prevention •Treating the Threat Appropriately •Identifying Risks

            + More details
            • Change Manager Product Tour

              22:11

              from Skybox Security / Added

              Take a virtual tour of our firewall change management solution: Change Manager

              + More details
              • The Measured CSO

                58:19

                from Deepsec Conference / Added

                This presentation is the key note of the DeepSec 2014 conference: „One of the most significant changes technology has wrought over the last decade is the current movement to use data and quantification as a means to better our everyday lives. In both our work life and leisure life, almost no aspect of modern life has escaped our desire to become better using evidence, data, and quantitative methods. This talk discusses one method to help a Security Department build a better understanding of historically amorphous goals like "effectiveness, efficiency, secure, and risk" using data and models.“

                + More details
                • Skybox Security Change Manager

                  01:10

                  from Skybox Security / Added

                  Our animated video illustrates the added security benefits Skybox Change Manager can bring to your enterprise’s firewall change process. See how Change Manager simplifies and secures your firewall change management workflow by automating path analysis, assessing the risk of proposed changes before they are implemented, and performing ticket-to-change reconciliation while creating an audit trail. To learn more about how Change Manager can reduce risks to your organization as well as time and cost, visit http://www.skyboxsecurity.com/products/changemanager.

                  + More details

                  What are Tags?

                  Tags

                  Tags are keywords that describe videos. For example, a video of your Hawaiian vacation might be tagged with "Hawaii," "beach," "surfing," and "sunburn."