Home
Search results “Human resources it security”
Human resource security requirements in ISO 27001 implementation
 
28:23
Annex A 7 of the ISO/IEC 27001 implementation - What are the requirements for the human resource security? We want to make sure that our employees and contractors understand their responsibilities and are suitable for the roles for which they are considered. What is the implementation guidance they should follow? Main points that have been covered are: • Implementation guidance • Management responsibility • Education and training in regards to the Information Security • Disciplinary process Presenter: Mr. Chandra Mohan Govindarajula’s record includes 10+ years of working experience as an Implementer, Lead Auditor, Trainer & Consultant. Chandra has worked in some big companies as a Lead Auditor, Trainer and Technical expert (i.e. TUV Rheinland, TUV India Private Limited). Currently, Chandra is working as a Lead - Information Security at ValueLabs LLP. Organizer: Ardian Berisha Date: December 14, 2016 Slides of the webinar: http://www.slideshare.net/PECBCERTIFICATION/human-resource-security-requirements-in-iso-27001-implementation ------------------------------------------------------------------------------- Find out more about ISO/IEC 27001 Information Security Management standard: Training: https://pecb.com/iso-iec-27001-training-courses Webinars: https://pecb.com/webinars Article: https://www.pecb.com/article/auditing-information-security Whitepaper: https://www.pecb.com/whitepaper/isoiec-27005-information-technology--security-techniques-information-security-risk-management ------------------------------------------------------------------------------- For more information about PECB: Website: https://pecb.com LinkedIn: https://www.linkedin.com/company/pecb Google +: https://plus.google.com/+PECBGroup Facebook: https://www.facebook.com/PECBInternational YouTube: https://www.youtube.com/PECBGroup Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Views: 776 PECB
The Human Resource Security Policy
 
04:39
The HR or Human Resource Security Policy The HR, or Human Resource Security Policy, is something quite misunderstood by companies. We think we have HR policies, training and orientation, so those are the same or we don’t need this policy. I'm going to share some of the questions and reasons for the HR Security Policy: 1.Why do we background check people and to what degree? 2.Why is there a separate Information Security Awareness Training? 3.Why do specialized jobs need specialized Information Security training? 4.Why are terminations as important as hiring? FIRST - Why do we background check people and to what degree? - We handle lots of confidential, classified, restricted and encrypted (sometimes unencrypted) data. We background check people based on the level of classification of the data they will handle. Think about it, even your receptionist may handle more than confidential data on some occasion. We want to be sure of the background of the people handling our data or our customers data. And by the way, our customer’s may ask too! SECOND - Why is there a separate Information Security Awareness Training? –because there are specific ways we are required or would like or are required to have our data and processes handled. We need to train them on the how. THIRD - Why do specialized jobs need specialized Information Security training? –because there are jobs that touch code, encrypted or unencrypted data and we want them trained on EXACTLY what is required or we expect! FORTH - Why are terminations as important as hiring? –because if there is a termination for cause, we don’t want that person to have access for ONE MINUTE longer than they are under our employ, AND we want no accounts to accidentally be left open for a possible future breach. So, what do you need to do: 1.Establish simple rules: background check type and for whom, training type and for whom, termination processes for all accounts 2.Create simple ideas of procedures follow those subjects 3.Compare those simple rules against the push back your culture, people or vendors may have 4.Determine what you are or are not willing to do 5.Compare that to your standards, compliance or regulatory requirements 6.Gain agreement with Senior staff 7.Make it a policy 8.Teach your employees that it’s a policy and ensure they follow through! Now, anywhere along the way, if you need assistance or this doesn’t make sense to you, reach out to ADHERE. We’re experts on helping you establish policies that are appropriate! Rauchus by Twin Musicom is licensed under a Creative Commons Attribution license (https://creativecommons.org/licenses/by/4.0/) Artist: http://www.twinmusicom.org/
Views: 59 ADHERE Inc.
ISO 27001 Human Resources Security (Part 11/18)
 
03:07
This section of ISO 27001 sets out the requirements around personnel security. this video explains what this means for an organisation. Find out more at www.certificationeurope.com
Views: 5961 Certification Europe
Human Resources - Domain 5 - Information Security & Privacy Program
 
03:36
The Information Security & Privacy Program's Human Resources domain focuses on people -- 38,000+ employees, including academic, staff, medical residents, and temporary workers -- all of whom have a fundamental role in information security and privacy.
Views: 204 Protect IU
What Every HR Executive Should Know About Outsourcing and Insourcing Cyber Security
 
03:32
In this interview, Premise Health CISO Joey Johnson discusses balancing Managed Security Service Providers (MSSPs) with in-house security operations.
Views: 265 HR Exchange Network
Human Resource Development Corporation Recruitment 2017 Apply For 620 Trainee Security Supervisor,
 
02:17
HRDC Recruitment 2017 - 2018 Human Resource Development Corporation has advertised a latest employment notification noticeable asHRDC Recruitment 2017 with thorough details. The organisation invites Offlineemployment form from eligible and competent job seekers to fill up 620vacant posts of Trainee Security Supervisor, Trainee Security Guardpositions. Aspirant with the required & essential eligibility criteria are most welcomed to grab this career option by applying Human Resource Development Corporation Offline Application Formearlier to the closure date (17th October 2017).Job finders those who are keen and qualified they may apply after getting the details through the below section of this page of www.nbjobjunction.com HRDC RECRUITMENT 2017 - 2018 DETAILS Name of Govt organisation: Human Resource Development Corporation Offered Posts Name : Trainee Security Supervisor, Trainee Security Guard NOTIFICATION and apply link -https://nbjobjunction.blogspot.com/?m=1
Views: 19865 JOB JUNCTION BHARDWAJ
Cyber Security Starts with HR, Says Analyst Josh Greenbaum
 
06:13
Renegade or careless employees are key to many cyber attacks. Clicking on a phishing e-mail link can be enough. Connect with Bill Kutik on: Columns: http://hrexecutive.com/author/bill-kutik/ Twitter: https://twitter.com/billkutik LinkedIn: https://www.linkedin.com/in/billkutik Radio Show: http://bit.ly/KutikRadio
Cyber Security & The HR Department
 
02:05
The HR department is taking an active role in securing companies against data breaches and security incidents. Clearswift’s VP of Human Resources, Julie Gordon, discusses how HR and IT need to work together to protect organizations.
Views: 42 Clearswift
Human Resources Compliance - Best Practices & Procedures
 
27:11
Managing talent and employee lifecycles can be challenging, but HR compliance is often the area that keeps HR professionals up at night. Paper-based HR departments with manual HR procedures remain commonplace in 2016, but many organizations are quickly pursuing an enterprise information platform such as OnBase to manage HR content electronically and efficiently. Join us for this upcoming 30-minute webinar where we’ll focus on some of these key ideas. Within this webinar, you’ll learn about: - Disaster Recovery - HR Audit Preparedness - I-9 Compliance - Security - HR Policies & Procedures - How to Get Started
Views: 8682 Naviant, Inc.
Manage Your Human Resource (HR) Department - Paperless Processes and Workflow  Automation
 
35:31
Paper-based Human Resource departments with manual processes remain commonplace. Shuffling through the piles of content associated with each employee, applicant, policy, handbook, etc. is annoying, time-consuming, and inefficient. Worst of all – can you say, with 100% certainty, your documents are in compliance? Are confidential files secure? Don’t let work keep you up at night anymore. Feel confident in your personnel document management with the security, organization, and efficiency an OnBase Human Resource solution can provide you. In return, you will have more time and energy in your day to focus on employee satisfaction and engagement throughout your organization. This video focuses on managing the lifecycle of an employee, HR compliance made easy, and secure employee documentation. Pre-Employment Document Sharing and Employee Onboarding Using a cloud-based document sharing solution like Hyland's ShareBase, you are able to securely share content with employees inside and outside of your organization. This allows you to easily share pre-employment documentation. As the HR Manager, you are able to create a secure link (can even be password protected) to send to send important documentation to new employees, manage the read/edit capabilities of the document, as well as create an expire period for the link to make sure documents are not out for too long. The best part is the ability to sync with ECM HR workflow to send out automatic notifications, quickly see what documents or steps are completed and what still needs to be followed-up on. Personnel Data Storage A paperless HR system allows you to manage all employee files digitally. It is essentially a digital filing cabinet, but with many benefits over the clunky, space consuming, filing cabinets you may be using today. You can set up security to restrict certain documents from others to see and allow managers to access the non-confidential pieces that they may need. All documents are assigned a date and this makes it much easier to follow a document retention protocol with a paperless HR solution. Document Review Compliance Document management for human resources like distributing and tracking all policies, procedures, notifications, and legal notices has historically been a massive headache and worry over compliance. With an HR document management software, you are able to distribute these types of documents electronically to employees. Employees will receive an email notification with a link to review the document you sent. The employee then clicks the link, reviews the document, and needs to mark the document as acknowledged. This whole paperless human resources process makes it much easier for your team to manage the distribution and compliance of important information. Performance Management Create digital performance reviews to be completed annual or quarterly, or whatever works for your organization with managers and their employees. This paperless process helps keep records of these conversations in one central and secure location making it easier to manage and keep track of employee performance reviews. An ECM HR solution also provides notifications and reminders automatically to managers taking the administration of these reviews off of your plate. Departures Employee departures can be a sensitive time for employees and employers. You can create an employee departure checklist in your HR records management software to make sure you complete all necessary steps every time. You can document what the tasks are as well as who completed them and on what date. An HR workflow for your departures can automatically send notifications to all people necessary to complete a departure and again, insurance that you have completed all necessary tasks.
Views: 150 Naviant, Inc.
Thinking About Cybersecurity for Human Resources Professionals
 
59:05
We are pleased to present a webinar concerning cybersecurity with Isaac Allman and Jack Graham of Wilson Worley PC. In this presentation, we will cover: 1. Cybersecurity issues as they relate to business/employment law Bring Your Own Device policies Access and Usage policies Company-owned equipment Insurance--needs and considerations 2. Public Relations--suggestions for media requests and inquiries Common point of contact Legal requirements Containment of information Communications with your staff
Views: 31 hrsimple
How an HR Executive Should Think About Security
 
03:05
Roland Cloutier, Chief Security Officer, ADP
Views: 88 ADP
webinar on "Improve Human Resource Security using ISO 27001:2013"
 
22:59
webinar on "Improve Human Resource Security using ISO 27001:2013" for more info- www.cunixinfotech.com
Views: 47 CUNIX
HRIS Security
 
03:11
Information privacy and security are particularly important issues for HRIS because unlike many other organizational systems, an HRIS includes a great deal of confidential data about employees.
Views: 493 Gregg Learning
NGA Human Resources: Trust and Productivity
 
02:05
Data security is not the only major gain NGA Human Resources received once they moved off G Suite to Office 365. Global staff are far more productive, efficient, and collaborate easily. Privacy counsel deputy data protection officer and the Global PR and External Communications Lead share why they prefer Office 365, see what they have to say. Learn more at: http://o365.com/ngahr
Views: 1902 Microsoft Office 365
Security Service Federal Credit Union Human Resources Video
 
01:05
Learn why Security Service is consistently rated a top workplace. We are Security Service Federal Credit Union. Since 1956, we've been dedicated to improving lives of people in the communities we serve. People helping people. For more information, visit https://www.ssfcu.org today!
Human Resources  Social Engineering In The 20th Century
 
01:59:24
Re-upload with permissions If audio is muted, please contact ----------------------------------------------- Human Resources: Social Engineering in the 20th Century explores the rise of mechanistic philosophy and the exploitation of human beings under modern hierarchical systems. Topics covered include behaviorism, scientific management, work-place democracy, schooling, frustration-aggression hypothesis and human experimentation. Scott Noble, the filmmaker behind the extraordinary and informative documentary "Psywar" has made another revelatory and important documentary, available free to the public, called "Human Resources: Social Engineering in the 20th Century". "Essentially", says Scott, "this film is about the rise of mechanistic philosophy and the exploitation of human beings under modern hierarchical systems." The film includes original interviews with: Noam Chomsky, Howard Zinn, Rebecca Lemov (World as Laboratory), Christopher Simpson (The Science of Coercion), George Ritzer (The McDonaldization of Society), Morris Berman (The Reenchantment of the World), John Taylor Gatto (Dumbing us Down), Alfie Kohn (What does it mean to be well educated?) and others. Read David Ker Thomson's review of the film. He writes: It answers the significant events of the last century the way a glass answers the implicit questions of a man who peers into its reflective surface, point for point. It corresponds, in short, to reality.
Views: 20318 ANDERSON
Human Behavior in Cybersecurity
 
03:16
Experts estimate that 70-80% of the costs attributed to cyber attacks are actually the result of human error. That's why ideas42 is applying a behavioral science lens to what has traditionally been considered a technological problem. Read more about this work on our website: http://ideas42.org/cyber Connect with us: instagram: @ideas42 facebook: ideas42 twitter: @ideas42 linkedin: ideas42 http://ideas42.org/ To learn more about how we use the power of behavioral science for social good, contact [email protected]
Views: 3321 ideas42
HRIS (Human resource information system) Manager job description || HRIS Manager life in company
 
01:49
Human resources information systems (HRIS) is system software that automates processes such as payroll information and benefits, and it can also be utilized across a company as a functioning intranet for communications among employees and supervisors. An HRIS manager is in charge of implementing and maintaining the software platforms that facilitate these features for a company. hr systems coordinator hr systems manager salary hr systems project manager human resource information system software human resources information systems degree hr systems officer hr system human resource information system human resource system hr job description sample human resource information systems hr systems administrator jobs hris systems hr systems project manager jobs hr systems manager hr systems job description human resources job description sample human resource information system ppt what does a computer and information systems manager do human resource information system definition hr systems manager job description computer information systems manager hr information system hris program hr information systems hris management types of human resource information system hris program manager hris system administrator salary human resources systems analyst hris systems list human resources manager job posting example of human resource information system what is a systems manager hris management information system what is hris systems hris meaning it system management hr information systems analyst define hris hr systems analyst jobs hris full form human resource management human resources management information system hris experience project management information systems computer and information systems managers hris applications hris definition computer and information systems manager education requirements hr systems administrator job description hr information management hris description hrmanager information technology job duties hris director job description what is human resource information system careers in human resource management hr systems jobs human resources information systems analyst hris functions it manager description hris administrator information systems manager how to become an information systems manager information technology analyst job description functions of human resource information system information about human resource management computer and information systems managers job description it manager roles and responsibilities myhris portal what is hris in hr human resources project manager job description human resource executive job description computer information systems job description hr systems analyst job description information technology manager job description computer analyst job description human resources associate job description hr coordinator job description human resources director job description job description in hrm human resource management description hr manager job description human resource management definition hr supervisor job description director of information technology job description human resources job description for resume information technology administrator job description hris analyst job description hris manager job description computer systems manager technology manager job description information systems security manager job description it manager job description vp of human resources job description hr executive job description information systems manager job description senior human resources manager job description it manager job description and duties business systems manager job description human resources specialist job description human resources job description and duties human resources payroll job description human resources information systems jobs info hr hris project manager management information system definition information technology project manager job description functions of human resource management what is computer and information systems managers hr information information systems job description it systems manager job description management information systems career human resource management skills management information systems salary human resources coordinator job description human resources supervisor job description what is management information system management system definition hr manager information technology manager jobs information systems security job description hris administrator job description it management careers
Views: 352 Self Motivation
Critical Information Systems and Cybersecurity - Thales
 
02:17
Thales, a global leader in cybersecurity and in cryptographic security solutions, is there to advise you and help you fight against the most sophisticated cyberattacks. Thales’s cybersecurity offering consists of implementing the IT solutions and human resources needed to protect information systems and to monitor, detect, analyse, visualise and counter all types of current and future cyberattacks. Follow the latest from Thales: Twitter: https://twitter.com/thalesgroup LinkedIn: https://www.linkedin.com/company/thales Instagram: https://www.instagram.com/thalesgroup/?hl=en Facebook: https://www.facebook.com/thalesgroup/
Views: 175 Thales
Domains of ISO 27001Information Security) Standard
 
01:13:18
http://www.techgig.com/expert-speak/IT-Security-Series-Session-7-Domains-of-ISO-27001-Information-Security-Standard-354 Key discussion points: The domains covered by ISO 27001 include Security policy Organization of information security Asset management Human resources security Physical and environmental security Communications and operations management Access control Information systems acquisition, development and maintenance Information security incident management Business continuity management Regulatory compliance
Views: 11822 TechGig
human resource information system (HRIS) PHR SPHR Human Resources License Exam VocabUBee.com
 
01:39
human resource information system (HRIS) database designed specifically for HR functions The general meaning of an information system is a networked computer system that contains relevant information for the business. In HR, the relevant information is information on people, their backgrounds, values, skill sets, tax information, retirement information, performance review information and compliance information. Immediately, security comes to mind. All of these issues require privacy and protection. If security can be guaranteed, then the issue of usability comes into mind. Can the system further the goals of the organization through its people and the people it is trying to attract? Ultimately, information systems are databases. A Human Resource Information System (HRIS) is a sophisticated database for managing specific HR information. Multiple Choice Question human resource information system (HRIS) A hiring detectives to find truth about candidate backgrounds B database designed specifically for HR functions C analyzing external factors which potentially threaten plans D single function software like Word, Excel, and Powerpoint Correct Answer: b If you would like to suggest corrections to this word, email us at [email protected] Thank you. This word appears in the book Vocab-U-Bee PHR SPHR Professional In Human Resources License Exam Top Pass Words PHR and SPHR are registered trademarks of Human Resources Certification Institute Find links to all our playlists at VocabUBee.com Vocab-U-Bee Values: Consistency First, One Small Step Each Day and the 42 Bee March Thank You! and Good Luck!
Views: 3892 Act Level 42
STROBO Security Robotics
 
02:48
ST Engineering's Autonomous Security Robotics Solution can be deployed 24/7, providing a collaborative, intelligent and dependable system to complement existing security operations. Adopting artificial intelligence and machine perception, the solution can pick up anomalies in the environment and effectively detect intruders or blacklisted persons. It allows security service providers to deploy human resources for higher level tasks, thereby facilitating man-unmanned operation for increased operational effectiveness. Learn more: http://www.stengg.com/en/land-systems/capabilities/robotics-and-autonomous-systems/
Views: 423 ST Engineering
Codifying the Brain: Automation, Alerts and a Human Resource Answer
 
33:21
Grady Summers, Chief Technology Officer, FireEye The security industry faces a well-documented talent crunch. Security risks in the Internet of Things and attacks against critical infrastructure will further strain our personnel pool. Automation is the future that limits the human effort needed to address both simple and severe security incidents. This session offers case studies and best practices of moving toward security automation to kill the talent crunch. http://www.rsaconference.com/events/us16
Views: 507 RSA Conference
BambooHR - 2min Product Summary - Features, Mobility, Security, Integrations & Pricing
 
01:42
BambooHR is HR software for small business. Complete analysis on GetApp: https://www.getapp.com/hr-employee-management-software/a/bamboohr-saas-hr-software/ 2min overview of BambooHR Key Features of BambooHR - Employee profile directory - Employee profiles w/ custom fields - Training & benefits tracking - Job & salary history - Online document storage - Employee self-service - Custom access permissions - Time off requests & approval - Time off reporting - Staff calendar hr manager,what is human resource management,business management software,hris software,hr management,human resources training,software for small business,payroll programs,applicant tracking software,what is a human resource,hr systems,human resources software,hris system,managing human resources,employee management software,small business management software,hr management software,what is human resources management,human resource training,hr resources,human resource software,human resource information systems,hr companies,employee database,hr system,human resource management system,hrms software,hr tools,free hr software,human resources information systems,human resources services,small business software free,hr programs,human resources programs,hr websites,uk human resources,hr bamboo,hr software for small business,hr management system,human resource management software,payroll program,human resource services,human resources management software,free small business software,what is hr management,how to work in human resources,software for business,human resources information system,human resources management system,hr information systems
Views: 3641 GetApp
16 ISO 27001 2013 A7 HR security Part 1
 
11:51
This video focuses on the annexure controls of ISO 27001:2013 standards. The annexure control A7 relates to 'Human Resource Security'. Ref: http://www.ifour-consultancy.com http://www.ifourtechnolab.com Custom software development companies #ISO #SoftwareDevelopmentCompanies #CustomEcommerceServiceProvider #CustomeCommerceWebsiteDevelopment
Views: 884 Hitarth Shah
Intelligence Community Centers for Academic Excellence
 
03:44
Whether you have a background in budget and finance, education and training, security, logistics, communication, human resources or national security, the Intelligence Community Centers for Academic Excellence program is for you! The IC CAE is a congressionally mandated program established in 2004 to develop, prepare and educate the next generation of intelligence professionals.
Giving the HR Administrator visibility into HRSD Security: Kingston HR Service Delivery
 
27:40
What you need to know about Application Restricted Caller Access. Are you a ServiceNow customer looking to give more visibility into security for your HR Administrator? Are you looking to take advantage of all the latest features and functionality available in our new release? If yes, then don’t miss this session! We will be discussing the benefits of the Application Restricted Caller Access module and where this new feature can help you identify potential issues.
SID News & Views; Mr Carlini of DG Human Resources Defends the EU Commissions HR Policy
 
05:16
Here Mr Carlini of DG Human Resources brilliantly proves that the EU Commission's 3b Contract Agents are NOT precarious. (Perhaps, for the sake of enhanced credibility, he should give up his post as a Director and go to work as a 3b Contract Agent. Don't hold your breath!) S olidarity with those who work for their money I ndependence from the others D emocracy in all decisions taken by groups of sane, adult humans is a trade union of European Public Service workers . See http://sidtu.org/v2 .
Views: 189 ashbrmi
Human Resource Management in Hindi Part 1
 
02:05
What is Human Resource Management?? website:http://hrconsultantservice.blogspot.in Human Resource Management tutorial are provided by Hindi and Urdu.
Views: 190172 swati srivastava
IBM Helps Morneau Shepell Secure Their Sensitive Data
 
01:57
Watch how Morneau Shepell, a human resources consulting and technology company, kept both its clients’ and its own sensitive data secure and protected with IBM Security Guardium. To learn more about Guardium—and how it helps enterprises protect critical assets including data, applications and infrastructure—join us for a complimentary webinar by registering at http://ibm.biz/BdsRhZ
Views: 1114 IBM Security
ServiceNow HR Module Deep Dive
 
50:05
Part of Aptris' AccellerateNOW Webinar Series, Eros Canabrava led a deep dive into robust ServiceNow HR Service Management Module
Views: 9523 Aptris
Human resources security - Termination or change of employment
 
02:41
http://ytwizard.com/r/mVqM2j http://ytwizard.com/r/mVqM2j ISO/IEC 27001. Information Security Management System. Learn how your company can protect its information and get certified to ISO/IEC 27001
Views: 2 Content Channel
Conducting a Library Facility Security Assessment
 
01:29:46
Most library staff think you need to hire an expensive security consultant to conduct a site security assessment of their facilities. While it’s true security professionals do have a certain expertise, it often helps to consider the in-house experience and knowledge of the facility that the library leaders and employees can bring to the assessment process. It is possible to use the same techniques, questions, and assessment instruments as a security professional for your library. You can ask and answer the various questions about critical facility security components for your library, including: access control; visitor and vendor management; cameras; alarms; interior and exterior lighting, IT protections and controls; perimeter protections; and emergency evacuations. This webinar helps library professionals to create a report that provides an overview for themselves and other library safety and security stakeholders: city or county attorneys, elected officials, law enforcement officers, insurance representatives, and risk managers, IT directors, and facilities directors. The goal of the session is to help library professionals - who know their facilities better than any security consultant could ever - to perform a thorough assessment, write a draft report for feedback, and then create a finished report that can be used as a reasonable template for security improvements, policy changes, and training suggestions. Presenter: Dr. Steve Albrecht Since 1987, Dr. Steve Albrecht has consulted and trained on issues related to HR and security issues, team performance, conflict reduction, and social intelligence. His Colorado-based firm specializes in performance-improvement training, coaching, and leadership skills. He is board certified in human resources, security management, employee coaching, and threat management. He has written 19 books on business, security, and law enforcement subjects.
Insider Threat Kill Chain: Detecting Human Indicators of Compromise
 
14:30
Your organization’s greatest assets are also its greatest threat: People. Your greatest risk is those you trust. Last year, more than a third of data breaches were perpetrated by a malicious insider, such as an employee, contractor or trusted business partner. On average, an attack by an insider is also more likely to cost the most, averaging $412K per incident. The intentions of these insiders can be sabotage, fraud, intellectual property theft or espionage. However, in many cases, patterns of detectable behavior and network activity emerge that provide indicators of risk, assist in early detection and in speeding up response time of an actual incident. In this webinar we will: • Discuss how human resources, legal and IT can work together to help prevent insider threats before they become a problem. • Identify risk indicators with employee attitudes and behavior and how it correlates to their patterns of activity on your network. • Show how you can use log intelligence and security analytics to automate actions and alerts and rapid reporting and forensics.
Views: 673 Tripwire, Inc.
Intelligence Community Centers for Academic Excellence with captions
 
03:43
Whether you have a background in budget and finance, education and training, security, logistics, communication, human resources or national security, the Intelligence Community Centers for Academic Excellence program is for you! The IC CAE is a congressionally mandated program established in 2004 to develop, prepare and educate the next generation of intelligence professionals.
Workplace Violence: Prevention, Training, Examples & Tips
 
01:00:46
Before the Storm - New Approaches in Identifying & Preventing Workplace Violence Workplace Violence: Prevention, Training, Examples & Tips The aftermath of the Empire State Building Shooting has prompted a much-needed discourse on workplace safety, with attention directed at adopting stronger security measures and learning certain warning signs that can help business owners and supervisors pin down suspicious activity or behaviors. We invite you to sit back, listen to our expert panelists discuss key topics, and most importantly, learn helpful tools and practices to improve workplace safety in your office or storefront. Who's it For? - Business Owners - Human Resources Professionals - Building Managers - Insurance Professionals - Building Owners and Operators - Security Professionals What Will You Learn? - How to prevent and respond to workplace violence - Establishing effective workplace violence policies - Communicating with law enforcement - Latest advancements in surveillance technology Panelists Include: Josh Daniels, President of VideoSurveillance.com Mr. Daniels is an ardent entrepreneur with years of experience in the security and IP video surveillance markets. His business experience paired with his vast industry knowledge has been instrumental in helping countless organizations improve their safety and security efforts. Mr. Daniels is a graduate of Stanford University and The Wharton School. Tess C. Taylor, PHR, Human Resources Expert Tess C. Taylor is the founder of HR Writer and a 14-year veteran to Human Resources. As a thought leader in the Human Resources industry, Tess has been a featured contributor to multiple career and business publications, including The US Chamber of Commerce and Dale Carnegie Institute, among others. Joel A. Dvoskin, Ph.D., ABPP (Forensic) Dr. Dvoskin is a Senior Psychologist with Threat Assessment Group, Inc. (TAG). He has specialized experience in mediating disputes within workgroups, managing workplace violence issues in heavily unionized environments, and conducting on-site interventions with threatening employees. He teaches on the faculty at the University of Arizona College of Medicine. Beth Mirza, Online News Content Manager for SHRM and Webinar Moderator At Society for Human Resource Management, Beth reports on many aspects of HR, including employment law, employee relations and, most recently, safety and security in the workplace. The Society for Human Resource Management (SHRM) is the world's largest association devoted to human resource management.
Views: 4183 VideoSurveillance
ServiceNow HR Service Management and Workday
 
07:29
Transform your HR Service Delivery
Views: 14584 ServiceNow
Human Resources Outsourcing Services | Jumpstart:HR, LLC
 
01:01
Visit www.jumpstart-hr.com to learn how we can serve your small business or startup.
Views: 260 Jumpstart:HR
Intelligence Community Centers for Academic Excellence short
 
01:00
Whether you have a background in budget and finance, education and training, security, logistics, communication, human resources or national security, the Intelligence Community Centers for Academic Excellence program is for you! The IC CAE is a congressionally mandated program established in 2004 to develop, prepare and educate the next generation of intelligence professionals.
Employer of Choice: Jana Zimova, Human Resources Director, Eastern Europe
 
02:03
"Our 2,000 employees speak more than 11 languages, so its a very diverse and interesting region." Get to know Jana Zimova, Human Resources Director for ASSA ABLOY East Europe.
Views: 772 ASSA ABLOY
An HR Manager's Guide to Privacy and Security – HIPAA and Beyond
 
57:50
Health care isn't the only industry that has to stay in compliance with privacy and security regulations. Join us to get an update on the Office of Civil Rights enforcement of the HIPAA Privacy and Security Rules, plus other laws that impact the privacy or security of employee health data. Learn about the latest security threats facing your company, including phishing and ransomware, and learn about the newest technologies that are raising privacy and security concerns for companies. Whether you're new to the human resources field or need an in-depth refresher, you won't want to miss this!
What can be done to ensure food security and preserve water resources? l Inside Story
 
25:23
Over 800 million people live in hunger-stricken areas. The majority of those live in conflict zones. Ensuring quantity and quality of water for survival, but also for food production in the context of agricultural intensification is essential to mitigate the risk of mass migration conflict. On this special edition of Inside Story from the Doha Forum we ask: Are the current world food governance support systems enough to mitigate current risks? And what can be done to avoid price volatility and its impact on the poorest? Presenter: Dareen Abughaida Guests: Pablo Campana, Ecuador's Minister of Foreign Trade and Investments Bader Al-Dafa, Executive Director of the Global Dryland Alliance (GDA) Miguel Angel Moratinos, Future UN High Representative for the Alliance of Civilizations Djimé Adoum, Executive Secretary of the Permanent Interstates Committee for Drought Control in the Sahel, CILSS. Subscribe to our channel http://bit.ly/AJSubscribe Follow us on Twitter https://twitter.com/AJEnglish Find us on Facebook https://www.facebook.com/aljazeera Check our website: http://www.aljazeera.com/ #Aljazeeraenglish #News
Views: 6055 Al Jazeera English
Jen Ughetta: “It’s really all about the safety and security of our folks.”
 
01:05
In the wake of recent storms, our teams across the region have been hard at work responding to the needs of our customers and clients. According to Jen Ughetta, Head of Human Resources for Munich Re, US, HR has had a different focus: our people.
Views: 331 Munich Re, US
A combination of RFID technology and Face Recognition for Entrance Checking System
 
03:01
Entrance checking and human resources management are among the areas in which technology have been used to replace the traditional manual checking process done by human. RFID or Radio Frequency Identification technology has been used widely as a convenient method to manage the flow of people entering a building. This method requires people to carry with them an identification card and swipe it over a reader in order to check for their validity of entering the building. However, the RFID system cannot distinguish whether the person swiping the card is the same as the one with the identity on it. This drawback can lead to certain problems. For example, in human resources management where entrance timing is important to evaluate performance of an employee, one can ask their friends to swipe his card for him to make sure his entrance time is correct while he is not coming to the company on time. Or more seriously, stranger can steal an employee's card and go into the company to take out important information or materials. In this situation, the innocent employee's name is recorded in the system in that time period and therefore held responsible for all the damages. As a result, more advanced technologies are used to complement the RFID drawbacks. These enhanced systems take advantage of the human characteristics such as voices, eyes, fingerprints and facial appearance which are hard to fake. Among these identity attributes, the facial appearance is favoured for its affordable cost and acceptable performance accuracy. It is a contactless and non-intrusive authentication process. Applying only one of the above measures is proven to be not reliable, since even human faces or fingerprints can be counterfeit. As a result, a combination of more than one security checking method is desired to enhance the effectiveness of the overall system. This project aims at implementing an intelligent human resources management system which combines the RFID and face recognition method. The proposed system will have a camera to capture the faces of people and a RFID reader to check the ID numbers. If both of the verifying processes return a "Pass" signal, then a successful entrance signal is generated.
Views: 3048 Nguyen Van Duc
HR Management: Health & Safety
 
07:21
This episode focuses on health and safety in the work environment with a special emphasis on OSHA and the rules and regulations they enforced. Indiana University Southeast Instructor: Alysa Lambert
Views: 69924 IUSoutheast
Betsy Otto, Global Director, Water, World Resources Institute-Water Security in a Changing World
 
08:15
Secure water supplies are critical to future sustainable economies and societies. Unprecedented human impact is directly degrading resource quality on every continent and, through global warming, threatens vast change in hydrological systems, with impacts on water availability and access in nearly all parts of the world. Those with fewest resources to tackle these changes will inevitably suffer the most. Please join us as we inaugurate IWMI’s US-based office in Washington, DC, with a discussion of our collaborative research to tackle these complex challenges. The seminar will focus on new and promising solutions to ensure a more water-secure future with less risk and greater equity for rapidly growing populations and economies worldwide.
Views: 67 IFPRI
What are Human Resources Management in a Hotel ?
 
01:54
Who are Human Resources ? Are they the Good. The Bad. Or The Ugly? Do we need them? Are they a waste of Money? It is intended for hotel workers, supervisors and managers who are (or want to become) actively engaged in learning and development around the world. It is highly moderated and aims to keep this forum SPAM-free, focused and productive. It is the intention of the group to assist hospitality students and workers in the Global Hospitality Industry to train and develop using Social Media
Views: 1223 Stephen Sawyers