In this episode, host Matthew Lewis, Director of Product Marketing, is joined by Don Campbell, Senior Director of Product Management, and Scott Galvin, Pre-Sales Senior Solutions Architect, for a deep dive into the evolving landscape of physical security in financial services. Together, the trio explores: Insider threat types and how to detect themThe role of visitor management in preventing social engineeringHow mobile credentials are reshaping secure accessDesigning frictionless environment...
All content for HID - Workforce Identity and Access Management is the property of HID and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode, host Matthew Lewis, Director of Product Marketing, is joined by Don Campbell, Senior Director of Product Management, and Scott Galvin, Pre-Sales Senior Solutions Architect, for a deep dive into the evolving landscape of physical security in financial services. Together, the trio explores: Insider threat types and how to detect themThe role of visitor management in preventing social engineeringHow mobile credentials are reshaping secure accessDesigning frictionless environment...
The alarming rate of violence against healthcare workers underscores the urgent need for comprehensive security measures within medical facilities. As incidents continue to rise, it's imperative that proactive strategies are employed to safeguard the well-being of patients, visitors and staff. In this episode, Paulina Rios Maya from EM360 speaks to Sheila Cook, Chief Experience Officer at the University of Illinois Hospital & Health Science System, and Clete Bourdeaux, Healthcare Bu...
HID - Workforce Identity and Access Management
In this episode, host Matthew Lewis, Director of Product Marketing, is joined by Don Campbell, Senior Director of Product Management, and Scott Galvin, Pre-Sales Senior Solutions Architect, for a deep dive into the evolving landscape of physical security in financial services. Together, the trio explores: Insider threat types and how to detect themThe role of visitor management in preventing social engineeringHow mobile credentials are reshaping secure accessDesigning frictionless environment...