Security Expert Roundtable - Join the Conversation

Stay ahead in the security industry, gain valuable insights, and take informed actions. Don't miss out on this opportunity to shape the future of security.

Watch the Roundtable

This webinar is best suited for…

  • Security Employers
  • Security Leaders
  • Decision Makers

It's tailor-made for security leaders & professionals who want to stay at the forefront of industry developments.

Web Search

Key discussion points

  • Women in Security: Empowering diversity for a safer security industry.
  • Mental Health: Prioritising mental health for a stronger security workforce.
  • Q&A Spotlight: Our questions, direct answers from the experts.
  • Recruitment Challenges: Expert perspectives on overcoming security hiring challenges.
  • Martyn's Law: Navigating Martyn's Law & its implications
  • Webinar Bonus: Attend and uncover your surprise gift

Hosts

Meet our hosts who will guide you through this webinar!

speaker
speaker

Carl Randle

Content & Community
Manager

speaker

Rollo Davies

Security Industry Improvement Campaigner & Co-Founder TPSO Magazine

speaker

Hamna Ismail

Marketing Expert

CASE STUDY

See how we helped Mitie meet its hiring requirements.

See what our customers say

Providing security in a hotel is of paramount importance to ensure the safety and well-being of guests, staff, and property. A comprehensive approach to hotel security involves a combination of physical, technological, and procedural measures. From preventing unauthorized access to responding

Providing security in a hotel is of paramount importance to ensure the safety and well-being of guests, staff, and property. A comprehensive approach to hotel security involves a combination of physical, technological, and procedural measures. From preventing unauthorized access to responding

Providing security in a hotel is of paramount importance to ensure the safety and well-being of guests, staff, and property. A comprehensive approach to hotel security involves a combination of physical, technological, and procedural measures. From preventing unauthorized access to responding