Articles Tagged with ''security leadership''

7 Pitfalls in Career Transistioning

 At some point during your working life, you will find yourself looking for a new job. There are a wide range of circumstances that may bring you to that point, ranging from retiring from public or military service; corporate reorganizations and/or leadership changes; you’re terminated; you resign; the location at which you work is destroyed; your company collapses financially; or you just want to advance your career in a new environment. While each of these circumstances may influence how you will position yourself during the job search, there are a number of common factors that place immense stress on an already difficult process.  


Read More

How Much Do Certifications Help Your Career?

 Afew years ago we published an article on security related certifications that were being marketed as a means to advance your career. At that time there were a relatively small number of certifications that we were seeing listed on resumes. Today, we are still routinely asked which certifications are needed for career advancement or which ones are being requested by hiring managers. Frankly, unless the role has a specific requirement that connects to one of the more technical certifications, for the most part, the hiring authorities are not demanding them.  


Read More

As Risks Expand, So Does Security's Responsibility

Somewhere in the planning of the Security 500 Conference, I realized it would not be possible to turn the long list of security’s responsibilities from this year’s benchmark study into a readable slide. Nor was it prudent to punish our attendees with multiple lists of unmemorable threats and vulnerabilities. With more than 50 unique items in play; from managing investigations (97 percent) to overseeing insurance (15 percent); the business executives that manage risk and security for their enterprises all expressed this common theme:

         


Read More

Making Metrics Stick for Threat Management

Over the past year, the Infosec Team in Cisco’s Threat Response, Intelligence and Development group launched a Unified Security Metrics (USM) program as a way to make sense of volumes of network data and reduce security risk.
Read More

Investigating Your Search Firm and Consultants

At some point during your career you will find yourself interacting with a search firm and/or a recruiter who has been assigned a project to fill a professional level security risk related role. This firm may or may not have a specialty security risk related practice and may or may not be a firm that you have ever heard of.  


Read More

Senior Security Leaders Discuss Top Threats at ASIS 2014

Meeting Between U.S. Chamber of Commerce, National Security Task Force Held at ASIS International

Governor Tom Ridge, Chairman of the U.S. Chamber of Commerce National Security Task Force, led a dynamic and interactive discussion with a panel of senior security executives from some of the world’s largest organizations at the ASIS International 60th Annual Seminar and Exhibits (ASIS 2014). The discussion looked at the threats facing multinational organizations, from cyber attacks to supply chain risks. This session, was held at the Georgia World Congress Center in Atlanta, Ga. on Monday, Sept. 29.


Read More

The Most Influential People in Security 2014

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.

This year’s Most Influential is organized by five categories: Corporate Security Practitioners, Public Sector Security, University/Think Tanks, Cybersecurity and State/Local Government Security.


Read More

Despite Global Upset, CSOs Secure Business, As Usual

Protecting and supporting stakeholders on a global scale through investments in security operations centers (SOCs), intelligence services and travel support companies has become a best practice for leading security programs.

Some businesses, such as airlines, have either suspended service or increased passenger screening in the area. British Airways suspended service to both Liberia and Sierra Leone. Air France and Brussels Airlines increased screening procedures and warned that service could be cut at any time.


Read More

Managing Risk Across the Enterprise

The key to the risk-based security program is that no matter what issue you examine, every one of them affects the reputation of the enterprise in one manner or another.

Once the risk matrix has been populated, management must then prioritize the risks and determine which are the most critical to the viability, survivability and resilience of the enterprise. When that prioritization has been completed, various functions within the organization can be tasked to design the appropriate solution for the risk involved.


Read More

Enterprise Benefits from the Security 500

The Security 500 Benchmark Program is your tool to enter your security-related data and receive a confidential and free benchmarking report.

New this year is that all participating enterprises have the option to be included in the Security 500 rankings numerically or to be listed alphabetically. We have made this change to allow those concerned with numerical rankings to be included and recognized among the best security leaders in the world.


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

security 2015 january cover

2015 January

In the January 2015 issue of Security, learn how PTZ and fixed dome cameras do dual duty in video production and surveillance applications, improve security on college campuses, and how to better cope with harsh environments in surveillance. 

Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.