Solutions Theater (ST) – Open to All

ST1-3 WHO'S COMING IN YOUR BACK DOOR? Identify Trusted Resources and Manage Compliance

May 13, 2014

12:00 PM - 12:30 PM

Daniel W. Krantz

Managing Director & CEO

Real-Time Technology Group, (RTTG)

Identity verification, professional certification tracking, and credential management are critical elements in managing risk associated with sensitive facilities and critical infrastructure.

To assure the safety and security of operations, we must:  identify our trusted resources; document individuals’ professional training and credentials; and, maintain proof of compliance with regulatory requirements and SOPs.

Comprehensive identity profiles maintained in trusted communities protect against the risk of non-compliance, and enhance regional safety and security.

RTTG’s Subject Matter Experts will help attendees to better:

  1. Understand vulnerabilities associated with employees, contractors and vendors.
  2. Identify operational best practices for personnel risk mitigation.
  3. Utilize proven methodologies for secure collection, processing and management of sensitive Personally Identifiable Information (PII) and Sensitive Security Information (SSI).
  4. Engineer a framework for audited, need-to-know information sharing among key community partners.
  5. Define criteria for measurement of critical compliance requirements.


Asis International

Blutube










FCW Magazine




GCN Magazine








INFRAGARD National
Intelligence Community news
International Police Mountain Bike Association





NCS
NDPCI


Police One




Security Stockwatch








Free e-News Subscription

I agree to this site's Privacy Policy

Connect With Us

Facebook Linkedin Twitter Flickr