The benefits of owning a beach property come with a great risk of flooding. As Superstorm Sandy demonstrated in 2012, the National Flood Insurance Program cannot sustain rebuilding efforts at the existing insurance rates. This means making difficult choices: build and incur significant costs; raise properties into the air; or move away from flood zones.
A "cyber Pearl Harbor" is imminent, according to government and industry experts. Recognizing the threat and implementing programs and training to better guard against such threats is critical to protect the various U.S. infrastructure systems and networks.
One lesson learned from the National Security Agency leaks in 2013 is that disrupting terrorist activities in cyberspace requires more than just the latest technology. Human interaction plays a critical role in thwarting criminal activity while protecting personal information and privacy. Canada offers one example of leveraging human networks and professional information sharing.
Since 2003, the CHEMPACK program has been in place to help protect U.S. emergency responders and receivers, as well as civilians, in the event of a nerve-agent attack. By pre-positioning medical countermeasures, antidotes are readily available as needed. It is now time to reevaluate and update the program to include changes that have occurred over the past decade.
A zombie apocalypse or sharknado attack may not be imminent, but the opportunities they present to emergency management professionals are compelling. In Virginia, emergency planners are showing the human side of emergency management, connecting with community members, and influencing personal and community preparedness.
With more than 40 Olympic venues serving an estimated 14 million meals, the 2012 London Olympic Games were susceptible to many potential foodborne illnesses - both intentional and unintentional. However, through education, communications, surveillance, and a focus on surge capacity, London provided a model that could help protect the food supply at other mass gatherings around the world.
Recovery begins during the planning stage. As past unintentional cases of food contamination have shown, the effects of an intentional incident could be extremely costly to food processors and the nation as a whole. Understanding the features that processors should include in their recovery plans will help to quickly restore operations and public trust.
In the not-too-distant past, most food consumed by Americans traveled directly from the farm to the kitchen table. Today, there are a dozen or so stops of varying duration on the way - all of them vulnerable to mold, theft, sabotage, spoiling, and/or infection from zoonotic diseases.
In a state with a large agricultural and food industry, protecting that infrastructure is a difficult yet necessary task that New Mexico takes very seriously. Guidance and support from the U.S. Food and Drug Administration have helped initiate innovative programs and exercises to protect the state's cattle, alfalfa hay, milk, cheese, pecans, chile, and other agricultural products.
As security needs continue to change, the technology to meet those needs also must constantly evolve. In 2014, five key technology trends may change the way that business managers protect their employees, data, and facilities: cloud services, wireless technologies, standards, distance biometrics, and business intelligence.