Articles Tagged with ''Security 500''

How the Security Evolution Turns to Prediction

Last year the Security 500 Report research identified the Risk-Nado facing security organizations. It pointed out how global risk matrix, the role of security and the expected results were all expanding quickly. As a solution, we identified with the theme of the book (and movie) “Money Ball” and the application of quantifiable mathematics to predict how a player will do in a specific situation.


Read More

Register Now for the Security 500 Conference at OSAC

The 2014 Security 500 Conference has an unprecedented “don’t miss” program planned for attendees.

The Security 500 has also partnered with ASIS by inviting their CSO Roundtable members.


Read More

Enterprise Benefits from the Security 500

The Security 500 Benchmark Program is your tool to enter your security-related data and receive a confidential and free benchmarking report.

New this year is that all participating enterprises have the option to be included in the Security 500 rankings numerically or to be listed alphabetically. We have made this change to allow those concerned with numerical rankings to be included and recognized among the best security leaders in the world.


Read More

The 2014 Security 500 Survey is Open

The Security 500 Survey is available now through July 18th for you to complete and submit. 


Read More

Michael Mason of Verizon to Keynote Security 500 Conference

Michael Mason, Chief Security Officer of Verizon Communications will keynote the 2014 Security 500 conference. 


Read More

Special Notice to Our Security 500 Members

Plaques with the Security 500 logo are being produced and sold by a third-party company, and they are not endorsed or affiliated with Security magazine and BNP Media in any manner. Please contact Security Editor Diane Ritchey at ritcheyd@bnpmedia.com if you have any questions. 


Read More

Look Who’s Coming to Security 500

“It's always a pleasure to convene with my colleagues at the Security 500 conference. No matter whether I'm there as presenter or attendee, the get is as good as the give, manifested in shared professional experiences, network building and warm collegiality,” says John Imhoff, CSO of Ernst & Young.
Read More

The Week in Review: November 10-16

Hiring hackers and tough questions about smart camera purchases top this week's top articles in the Week in Review.


Read More
Week in Review -- Hurricane Sandy Aftermath

The Week in Review: October 26-November 2

In the aftermath of Hurricane Sandy, top stories include the duty of care airlines have to stranded passengers, how to manage stress in disaster recovery, and the Security 500 Report.


Read More

2012 Security 500 Report: Earning Your Stripes

While many enterprises still have the risk tiger by the tail, Security 500 leaders are earning their stripes by taking risk head on and proactively taming it. In short, they are moving risk to their organization’s top line.
The business-minded leaders in this year’s Security 500 survey have spoken: they are going beyond their enterprises’ boundaries and redefining security’s traditional role to assess and manage risk, contribute to organizational goals and to ensure resilience. But with the events of 9/11 far in the rear view mirror, many security leaders also work to battle complacency across their organizations and engage stakeholders to participate in their own security, as well as protect the physical and logical assets of their organizations.
Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

2014 November cover of Security Magazine

2014 November

Don't miss our 2014 Security 500 issue, with rankings, data on sectors, and other security benchmarkings, all contained within this November 2014 edition of Security magazine. Also, (re)learn the basics of lobby security and how to make the highest impact retrofit for your budget.
Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.