Displaying results 51 - 53 of 53

… should be used as the basis for determining the protective security requirements and identifying appropriate protective security measures.  The temporary nature of an event may … from conducting an attack by making each element appear too physically or technically difficult to achieve. An example …
… such as your website news section, your safety and security webpage, or emails to customers. All assets in the … them to promote the campaign; our counter terrorism security advisors (CTSAs) are working with partners to … Portrait Image Police officer Call to action, tell staff, security or police when using around supporting events where …
… your organisation upon receipt of the threat, e.g. building security and senior manager, as they will need to make an … and 48 hours after)   Remember: Seek advice from the venue security/operations manager as soon as possible. All bomb … people closer to the hazard specified or to other forms of physical attack, e.g. the possibility of a vehicle as a …