INTERNATIONAL FOUNDATION FORCULTURAL PROPERTY PROTECTION
News
Reposted from CISA
Great Day SCC Members and Sector Management Leadership,Please mark your calendars for the CF Fall Summit 2024! We are excited to bring together our SCC and GCC for a pivotal event at Hudson Yards in New York City. This summit will be a key opportunity for collaboration and innovation in our sector.More details, including the agenda and logistics, will follow soon. Stay tuned for updates! Please save these dates and be on the lookout for further communications.We look forward to your participation!
See Original Post
Reposted from Cultural Rescue
Cultural and historic resources are held in the public trust by a range of cultural institutions that include, but are not limited to, libraries, museums, archives, historical societies, municipal offices, and historic and archeological sites and properties. These institutions hold the collective history of our communities, our states, and our nation. Ensuring that these institutions are prepared for emergencies and disasters contributes to a community’s resilience. When disaster strikes, the recovery of these institutions and their collections is essential for the successful recovery of the Whole Community.
Founded in 1995, HENTF was co-sponsored by the Federal Emergency Management Agency (FEMA) and the private nonprofit Heritage Preservation until Heritage Preservation was dissolved in June 2015. During those two decades, under the leadership of Heritage Preservation, HENTF exemplified the very best in public-private partnerships to ensure that museums, libraries, archives, historic sites, and the public at large have the tools and resources to prepare for, respond to, and recover from disasters.
Today, HENTF is co-sponsored by FEMA and the Smithsonian Institution, an original member of the Task Force. The partnership of more than 60 national service organizations and federal agencies continues to address cultural heritage concerns across all five FEMA mission areas – prevention, protection, response, recovery, and mitigation.
HENTF’s mission is to protect cultural heritage in our nation’s states, tribes, territories, and local communities from the damaging effects of natural disasters and other emergencies.
HENTF focuses on these five strategic objectives:
Reposted from Safehaven Security
In today’s dynamic business landscape, ensuring the security of an organization goes beyond just safeguarding physical assets and digital infrastructure. One often overlooked, yet critical, aspect of organizational security is the proper documentation of employee performance.
In this article, we look at three areas that have a direct correlation to enhancing the overall security and safety of an organization.
Meet an Expert
Dan Carney, Security Operations and Consultant
As a New York City Police Officer, Dan patrolled Times Square, Madison Square Garden, the Empire State Building, the South Bronx, and Midtown Manhattan, keeping tens of thousands of people safe at significant events you may have even watched on television!
Upcoming Training
Troublesome Terminations: Controlling the Confrontation
Webinar | August 21 | 11:00am CST
This webinar will take a deeper look at our 10 Tips for Troublesome Terminations and focus on prepping for the interview, and how to manage the atmosphere, emotions, and circumstances within the room.
Reposted from EMR-ISAC
The U.S. Senate first designated June as National Internet Safety Month in 2005, primarily to raise awareness of internet dangers and highlight the need for education about online safety, especially among young people. In the years since then, with the rise of smartphones, social media and other new technologies, the amount of time people spend online has grown enormously—as have the risks.
Most of the time, cyberattacks occur due to poor cyber hygiene. Fortunately, there are four simple things we can all do to help protect ourselves and, by extension, others:
On May 20, the Department of Labor announced a final rule to implement a major update to the Occupational Safety and Health Administration’s (OSHA’s) Hazard Communication Standard. Chemicals in the workplace should carry clear labels and easy-to-understand information about their hazards. OSHA’s Hazard Communication Standard provides a standardized approach to workplace hazard communications associated with exposure to hazardous chemicals. It was established in 1983 and was last updated in 2012 to align with the third revision of the Globally Harmonized System of Classification and Labeling of Chemicals (GHS). The changes will improve the amount and quality of information on labels, safety data sheets, and small packaging. This will allow workers and first responders to react more quickly in an emergency. The update will also help ensure trade secrets no longer prevent workers and first responders from receiving critical hazard information on safety data sheets. The 2024 update is aligned primarily with the seventh revision of the GHS. It addresses issues that arose since the implementation of the 2012 standard and improves alignment with other federal agencies and Canada.
This report contains information about incidents that occurred in 2023 in which law enforcement officers were feloniously or accidentally killed or assaulted in the line of duty. This data was voluntarily submitted to the Law Enforcement Officers Killed and Assaulted (LEOKA) Data Collection by the FBI's law enforcement partners. To create this report, LEOKA staff analyzed details from the incidents—such as the types of offenses, locations, and weapon types—to identify potential trends in the past 5 to 10 years. The goal of the LEOKA Data Collection is to compile and publish information about the nation's officers who were killed or assaulted in the line of duty for the benefit of officer safety and public awareness.
Reposted from Tim Richardson
I found an extra day this week. I had traveled to the Midwest to give a presentation. Normally, I try to get home relatively quickly after my work is done. I technically could have made it back the day of my presentation, but it would have been rushed as it would have been midnight when I arrived home, so I took an “extra day”. The extra day gave me time to spend time individually with audience members who heard me speak. My extra day allowed me time to evaluate my presentation and get immediate feedback from my client. The extra day gave me the opportunity to see audience members in action implementing what they learned and reinforcing my important message. But that’s not all. My extra day gave me time to have a nice and relaxing dinner and a long walk afterward. I was able to think through my time there, the good and the bad. I had several moments of pausing to be quiet and still, thinking about my recent birthday and what the next year will bring. As I watched nightfall unfold, listening to its sounds and capturing the beauty of the changing skyline I thought about my grandparents’ front porch. There, my grandparents practiced extra day living every day. They were purposeful in fully embracing moments hurried people would miss.
During my extra day, I didn’t work on a chapter of my next book. I didn’t work on an upcoming speech. I didn’t work on a pending proposal. I didn’t get lost in my email. But that doesn’t mean I wasn’t productive. I would guess that most professionals resist regular extra days because of the demands of their career. They equate busyness with productivity. Stop doing that. Focus on the work that matters, do it quickly, and then give yourself margin to be creative, introspective, and grateful. Following that course will show you the obvious value of finding extra days in your schedule.
Find an extra day.
Reposted from AAM
Register for The Way Forward by June 28 for a chance to win one free night at the Hilton.
That's right! Registering in advance is a great way to save, but the deal just got sweeter with a chance to win one complimentary night at the Hilton Columbus at Easton, our beautiful conference hotel. All attendees who have registered for the conference by Friday, June 28, and who have booked their stay at the Hilton, will be entered to win. We'll award one free night to the reservations of 4 lucky attendees (to be applied during their stay).
P.S. If you hit any roadblocks while booking your room, let us know. We can add rooms to the block while they are available or help you find another nearby place to stay.
NEW RELEASE-Welcoming Museum Visitors with Unapparent Disabilities
In this actionable volume, discover how US and international cultural organizations including museums are serving individuals with mental health and neurodiverse challenges. Opening chapters explore the status of mental health in society today, and why it is crucial for museums to consider inclusive design. In subsequent chapters, organized by unapparent disability, you will learn more about the condition, find personal accounts of how it impacts the museum-going experience, and dive into actionable case studies of how this hidden disability has been supported or addressed at other museums.
Reposted from CISA/DHS
The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with U.S. and international partners, published a joint report, Modern Approaches to Network Access Security, that urges organizations to move toward more robust security solutions such as Secure Service Edge (SSE) and Secure Access Service Edge (SASE) that provide greater visibility of network activity. While this report does not cover the planning, architecture, or adaption needs for shifting to these solutions, it does call for organizations to shift away from traditional broad remote access deployments and provides best practices to help transition to modern solutions, such as SSE and SASE. Organizations are encouraged to carefully assess their security posture and perform a risk analysis before implementing any/all solutions to determine if these approaches fit their organization. Both information technology (IT) and operational technology (OT) network protections are provided in this report that covers a spectrum of network sensitivities and worst-case consequences of compromise. This report will help organizations better understand the vulnerabilities, threats, and practices associated with traditional remote access and VPN deployment, along with the inherent business risk posed to an organization’s network by remote access misconfiguration. Aligned with CISA’s cross-sector cybersecurity performance goals (CPGs), the best practices in this report will also help guide leaders with prioritizing the protection of their remote computing environment security while operating under the fundamental principles of least privilege.
QUICK LINKS
ConferenceMembershipTraining & CertificationDonate to IFCPP
TRAINING & EVENTS
1305 Krameria, Unit H-129, Denver, CO 80220 Local: 303.322.9667 Copyright © 1999 International Foundation for Cultural Property Protection. All Rights Reserved
Contact Us