Security Technology Executive

JUL-AUG 2018

Issue link: https://securitytechnologyexecutive.epubxp.com/i/1013012

Contents of this Issue

Navigation

Page 40 of 83

Inspire Children and families in crisis across the USA need our help – and yours. And as a 501(c)(3) organization, Mission 500 now has even greater flexibility to work with local charities to better support existing and new sponsors and volunteers. But even with over 1100 children sponsored and many acts of charity performed to date, there's still a great deal of work to be done. Get involved today! Visit mission500.org for more information. Supporting Families Across America What all of this information shows is that real- time awareness of campus security incidents is vital, and social media is emerging as the best way to find this information efficiently. There are a few reasons for this: • Coverage: Social media provides details about virtually all events that are relevant to the cam- pus, from the robbery happening across the street from a dorm to the broken water main preventing access to the ER ambulance bay. It is unlikely that conventional news channels would provide any details about these inci- dents, let alone in real time. • Speed: Social media content is typically posted within minutes of any given event that has eye- witnesses. With the right technology in place, campus security teams can find relevant con- tent more quickly, gaining extra time that can be used to coordinate a more efficient and strategic response. • Corroboration: One great strength of social media is that it often comes directly from eyewit- nesses, meaning it is not curated or edited by traditional media channels. Of course, this also means its accuracy must be verified and not pre- sumed. But social media offers an unbiased view of events on the ground, and as such, it can serve as an important resource for corroborating details of events affecting your campus. Use Social Media Technology to Your Advantage Whether or not a threat or security incident is relevant to your campus is for your team or GSOC to decide. The ability to make this choice, however, depends on the ability to access relevant content within the almost inconceivably vast sea of "big data" that is social media. This is where technology plays a key role in the GSOC or security team. In short, manually monitor- ing social media platforms is a highly inefficient pro- cess. It is unrealistic to expect to find relevant threats or incidents with manual keyword searches. What campus security teams need instead are tools that are specifically designed to identify and deliver applicable content automatically. No matter what technology your campus security team chooses to manage social media, the value of this content to your mission can't be denied. It is a largely untapped resource that can transform the way your team protects employees, students, patients, and others. Most importantly, social media can fuel real-time alerts that provide more detail, faster than traditional sources. With this extra time, your team can make bet- ter assessments, develop more strategic responses, and execute them more efficiently to keep your cam- pus secure. Notes: 1 https://www.csmonitor.com/EqualEd/2018/0406/ Social-Media-threats-and-school-The-scramble-to-balance-safety-justice About the author: Ed Monan is Director of Corporate Securit y Sales for Dataminr, a leading real-time information discovery company for enterprise clients. Dataminr transforms the public Twitter stream into actionable alerts, identif ying the most relevant information in real-time for clients in Finance, News and the Public Sector. Using powerf ul, proprietary algorithms, Dataminr instantly analyzes all public t weets and delivers the earliest warning for breaking news, real-world events, off-the- radar content and emerging trends. Dataminr clients receive information first, ahead of traditional sources. Dataminr was founded in 2009 and is headquartered in New York , N Y, with satellite offices in Washington, DC and Bozeman, MT. Request information: www.SecurityInfoWatch.com/10487869

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - JUL-AUG 2018