All too easily, there can be a vast disconnect between security and finance. Chief financial officers are looking out for every penny, and security departments can be frequently written off as cost centers. However, there has been growing involvement and partnerships in both directions, with CSOs now successfully proving security’s value to the enterprise and CFOs championing security and cybersecurity initiatives to better mitigate enterprise risks.
Spring is here. And it could not have come soon enough, after a particularly difficult winter for most of the U.S. Record-setting snow falls, flooding, and extreme cold temperatures plagued businesses, homeowners and travelers from November through March. Businesses shut down, flights were grounded, and many people were forced to hunker down and stay home.
The 2015 RSA Conference provides security professionals access to myriad keynotes, educational sessions and solutions for today’s cybersecurity risks. Whether you’re headed to San Francisco for the conference April 20-24 or you’re observing cybersecurity trends from your office, here is a sampling of some of the trends, products and services showcased at this year’s event.
Speaking of a supply chain security challenge, one of United Iron and Metal’s warehouses is outdoors in a hard-scrabble urban neighborhood of Baltimore, and it sprawls over more than 20 acres with one boundary chockablock against railroad tracks. Unwanted visitors were a relentless headache... until John Creighton, the director of security at United Iron and Metal, did something about it.
Helping your enterprise to stand out in today’s marketplace means providing services above and beyond your competition, and that involves making your stakeholders, customers and employees feel safe while surrounding them with top-notch amenities, from the building to the perimeter to the parking lot.
Walk through the show floor at ISC West in Las Vegas next month and you’ll see hundreds of security products peddled by vendors wanting to sell you the “latest and greatest” in security technology. But sometimes, you don’t need technology as much as you need someone to sit down with you and have a frank and honest conversation about what you should or should not install in your enterprise. Then you can talk technology, right? Of course, it all depends upon your situation, your environment and the risks that you are trying to mitigate, but who wants to be sold something that they don’t need or can’t use?
Though biometric analytics have been around for a few years now, Apple and Samsung’s recent introduction of fingerprint readers to their newest mobile devices prove that biometric security systems are going to be more and more commonplace in the public sector. The research organization Goode Intelligence estimates that biometric authentication will be on most mobile devices by the end of 2015 and that by 2019, it will be used by 5.5 billion people worldwide. Familiarity with biometric analytics means ease of use for employees and consumers alike.
In fact, the scope of this attack differs from any we have responded to in the past, as its purpose was to both destroy property and release confidential information to the public. The bottom line is that this was an unparalleled and well planned crime, carried out by an organized group, for which neither SPE nor other companies could have been fully prepared.”
In the midst of mergers and acquisitions, there is still plenty of innovation and energy within the security industry, and enterprise security executives are in a position to benefit. As more and more end users attend the annual ISC West conference April 15-17 in Las Vegas, more focused solutions find their way to the forefront of booths, as manufacturers outline not only the technical aspects but the integration possibilities, risk mitigation benefits and problem-solving features of their new solutions for active end users.
Not all employees are saboteurs or malicious actors, but without education, unwitting employees could cause just as much damage as a targeted data theft in the long run. Read how to prevent this in the August 2015 issue of Security. Also read how building stronger relationships with local and national law enforcement can aid in school security awareness and response, learn about the dangers of continuing to use old credit card terminals, and see the ASIS International 2015 product review.