Articles Tagged with ''security leadership''

How Much Do Certifications Help Your Career?

 Afew years ago we published an article on security related certifications that were being marketed as a means to advance your career. At that time there were a relatively small number of certifications that we were seeing listed on resumes. Today, we are still routinely asked which certifications are needed for career advancement or which ones are being requested by hiring managers. Frankly, unless the role has a specific requirement that connects to one of the more technical certifications, for the most part, the hiring authorities are not demanding them.  


Read More

As Risks Expand, So Does Security's Responsibility

Somewhere in the planning of the Security 500 Conference, I realized it would not be possible to turn the long list of security’s responsibilities from this year’s benchmark study into a readable slide. Nor was it prudent to punish our attendees with multiple lists of unmemorable threats and vulnerabilities. With more than 50 unique items in play; from managing investigations (97 percent) to overseeing insurance (15 percent); the business executives that manage risk and security for their enterprises all expressed this common theme:

         


Read More

Making Metrics Stick for Threat Management

Over the past year, the Infosec Team in Cisco’s Threat Response, Intelligence and Development group launched a Unified Security Metrics (USM) program as a way to make sense of volumes of network data and reduce security risk.
Read More

Investigating Your Search Firm and Consultants

At some point during your career you will find yourself interacting with a search firm and/or a recruiter who has been assigned a project to fill a professional level security risk related role. This firm may or may not have a specialty security risk related practice and may or may not be a firm that you have ever heard of.  


Read More

Senior Security Leaders Discuss Top Threats at ASIS 2014

Meeting Between U.S. Chamber of Commerce, National Security Task Force Held at ASIS International

Governor Tom Ridge, Chairman of the U.S. Chamber of Commerce National Security Task Force, led a dynamic and interactive discussion with a panel of senior security executives from some of the world’s largest organizations at the ASIS International 60th Annual Seminar and Exhibits (ASIS 2014). The discussion looked at the threats facing multinational organizations, from cyber attacks to supply chain risks. This session, was held at the Georgia World Congress Center in Atlanta, Ga. on Monday, Sept. 29.


Read More

The Most Influential People in Security 2014

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.

This year’s Most Influential is organized by five categories: Corporate Security Practitioners, Public Sector Security, University/Think Tanks, Cybersecurity and State/Local Government Security.


Read More

Despite Global Upset, CSOs Secure Business, As Usual

Protecting and supporting stakeholders on a global scale through investments in security operations centers (SOCs), intelligence services and travel support companies has become a best practice for leading security programs.

Some businesses, such as airlines, have either suspended service or increased passenger screening in the area. British Airways suspended service to both Liberia and Sierra Leone. Air France and Brussels Airlines increased screening procedures and warned that service could be cut at any time.


Read More

Managing Risk Across the Enterprise

The key to the risk-based security program is that no matter what issue you examine, every one of them affects the reputation of the enterprise in one manner or another.

Once the risk matrix has been populated, management must then prioritize the risks and determine which are the most critical to the viability, survivability and resilience of the enterprise. When that prioritization has been completed, various functions within the organization can be tasked to design the appropriate solution for the risk involved.


Read More

Enterprise Benefits from the Security 500

The Security 500 Benchmark Program is your tool to enter your security-related data and receive a confidential and free benchmarking report.

New this year is that all participating enterprises have the option to be included in the Security 500 rankings numerically or to be listed alphabetically. We have made this change to allow those concerned with numerical rankings to be included and recognized among the best security leaders in the world.


Read More

Why the Security Talent Gap Is the Next Big Crisis

The next national security crisis may be a lack of ability to mitigate or respond to such an attack because frankly, there’s no one available to mitigate the attack or respond to it.

The battle means that companies might be in danger of losing simply because they lack the manpower to deal with it. The battle means that companies looking for more security staff aren’t going to find them – they’re going to have to create them.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security December 2014 issue cover

2014 December

This issue of Security Magazine covers our 12th annual Top Guarding Firms list. Check out the best of the best as of December 2014. The 21st century has brought with it new types of security threats. Read how to combat and protect against these threats.

Table Of Contents Subscribe

Security Emergency Preparedness Training

Which security personnel emergency preparedness training is the top priority to you and your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.