Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.
Despite robust planning, a security director’s worst nightmare is a serious injury or death occurring on company property due to a violent criminal act.
Law enforcement agencies are tasked with the difficult job of keeping communities safe, a responsibility that never goes away.
March 1, 2014
Advancements in security technology, however, are giving law enforcement agencies an advantage in the fight against crime. Video surveillance has long been used as a deterrent and tool for capturing incidents as they occur, but recent innovations in IP-based cameras and wireless networks have made it even more practical for law enforcement applications.
The lessons learned following the Boston Marathon bombings were many, but one lesson that was learned rather quickly was that Twitter was going to become the go-to platform for gathering timely and accurate information from city, state and federal officials regarding the rapidly unfolding events of that week.
Recently, there was a mall shooting in which three people died about five miles from my home in Columbia, MD. My wife and I were to have been there getting her phone fixed in the exact part of the mall where the killings took place.
For Johns Hopkins in Baltimore, it’s a neighborhood initiative program that looks beyond traditional campus security and that integrates university special police officers with AlliedBarton security officers. The result: recognition in the Higher Education sector in the 2013 Security 500 report.
At Columbia College, a 16-building private liberal arts college in Chicago’s South Loop neighborhood, Bob Koverman, the associate vice president of campus safety and security, says there is no silo or separation between the 70-75 contracted security officers and supervisors and the in-house security staff on campus.
Governments and corporations are facing considerable risk to their data, their underlying networks and the reliability of their products because of a confluence of three factors.
From Facebook to The Washington Post to Target – 2013 showed us that no matter what, personal data is at risk, more so than ever before.
February 1, 2014
As the number of cyber attacks increase, the cost, frequency and time to resolve them increases as well. Conducted by the Ponemon Institute and sponsored by HP Enterprise Security Products, the 2013 Cost of Cyber Crime Study found that the average annualized cost of cybercrime incurred by a benchmark sample of U.S. organizations was $11.56 million, representing a 78-percent increase since the initial study was conducted four years ago.
The Chief Information Security Officer (CISO) not only protects IT systems with special hardware, software and secure business processes, but he or she also creates, implements and communicates the organization’s digital information security policies and procedures.