Request a Demo

Fill in the form below and we will contact you shortly to organised your personalised demonstration of the Noggin platform.

The Noggin Platform

The world's leading integrated resilience workspace for risk and business continuity management, operational resilience, incident & crisis management, and security & safety operations.

Learn More
Resilience Management Buyers Guide - Thumbnail
A Resilience Management Software Buyer's Guide
Access the Guide

Who We Are

The world’s leading platform for integrated safety & security management.

Learn More
  • Home
  • security management

security management

Latest Articles

Explaining the Critical Entities Resilience (CER) Directive

Resilience isn’t just a priority for enterprises, agencies, and other organizations. But it’s become a governmental priority, too, especially in the...

Read Article

What Is an Incident Management System (IMS)?

Crises, emergencies, and events are a fact of life – inevitable. But preparatory measures go a long way to ensuring overall organizational...

Read Article

What is Workplace Violence?

April marks Workplace Violence Prevention Awareness Month and with it, a campaign to increase awareness to recognize, prevent, and respond to...

Read Article

The Role of Business Continuity Planning in Long-Term Strategy

Developing an effective business continuity plan (BCP) requires understanding your organization’s critical processes, dependencies, and risks. If...

Read Article

Critical Infrastructure Regulation in the EU

It's no secret that critical infrastructure assets are increasingly under threat. Lawmakers are pulling policy levers to ensure organizations in...

Read Article

Steps to Creating a Best-Practice Incident Action Plan (IAP)

A strong incident management program depends on a well-crafted incident action plan (IAP). A documented set of directives activated the moment an...

Read Article

What’s a Workplace Chemical Protection Program (WCPP)?

Heavily regulated, chemical substances can present an unreasonable risk of injury to worker health or the environment.

That’s why regulators often...

Read Article

5 Must-Have Incident Reporting Features in Crisis Management Software

When a crisis hits, teams need to be able to gather accurate information in a centralized, accessible space. That’s why crisis management programs...

Read Article

Physical and Cyber Security Management: How to protect your organization from threats

Cyber resilience is on everyone’s mind. But security threats don’t just come from cyber actors. There’s been a noticeable increase in so-called...

Read Article

4 Considerations When Choosing Emergency Management Software

With disasters on the rise, organizations can’t afford to rely on manual processes. They must, in fact, digitize their emergency and incident...

Read Article

The Role of Emergency & Incident Management Software in Operationalizing Your Incident Action Plan

When an emergency occurs, every minute matters. Your organization had other plans for how to spend its time and focus its efforts, but now, you must...

Read Article

Explaining the Critical Entities Resilience (CER) Directive

Resilience isn’t just a priority for enterprises, agencies, and other organizations. But it’s become a governmental priority, too, especially in the...

Read Article

Critical Infrastructure Regulation in the EU

It's no secret that critical infrastructure assets are increasingly under threat. Lawmakers are pulling policy levers to ensure organizations in...

Read Article

Physical and Cyber Security Management: How to protect your organization from threats

Cyber resilience is on everyone’s mind. But security threats don’t just come from cyber actors. There’s been a noticeable increase in so-called...

Read Article

What’s in the Updated National Cyber Incident Response Plan?

Late last year, the Cybersecurity and Infrastructure Security Agency (CISA) published the draft National Cyber Incident Response plan (NCIRP).

What...

Read Article

Watch These 4 Operational Resilience and Critical Infrastructure Security Regulations to Stay Compliant in 2025

As we look forward to next year, leading assessments indicate that organizations will become increasingly vulnerable to a variety of potential risks....

Read Article

Key Updates to the Cyber Security Governance Principles

Cyber security has been rocketing up the list of board priorities. As a result, the Australian Institute of Company Directors (AICD) and the Cyber...

Read Article

How to Respond to a Cybersecurity Threat in 2025

October marks Cybersecurity Awareness Month. How should your organization respond to a cybersecurity incident in the new year?

We looked at the best...

Read Article

5 Strategies to Reduce Cyber Security Risks

Cyber security consists of all the technologies and practices that keep computer systems and electronic data safe. Cyber security is critical,...

Read Article

U.K. Makes News, Adding Data Centers to List of National Critical Infrastructure

The U.K. recently made news in the push to protect its national critical infrastructure. Noting pervasive cyber vulnerabilities, the country granted...

Read Article

4 Sources of Threat Intelligence

With cyber threats becoming more prolific and pernicious, detailed, actionable threat information has become more valuable. That type of threat...

Read Article

3 Types of Cyber Issues and How to Prepare for Them

When surveyed, business leaders will acknowledge the severity of the cyber threat. But about which specific cyber issues are they likely to be the...

Read Article

Critical Infrastructure Protection Deadlines Approach

Prolific attacks on our most essential assets demonstrate how vulnerable critical infrastructure is. And so, policymakers have intervened to protect...

Read Article
1 2 3 4 5
Request a Demo of Noggin