It’s exceedingly difficult to predict workplace violence, and there is no easy solution to stop it altogether, however, reference checking is a preventative step that employers can take to reduce the risk.
Technology moves quickly, as military and commercial tools and toys merge with security applications to create both new solutions and risks for the enterprise. What should you be on the lookout for this year?
The previous three columns have laid the groundwork for establishing yourself as an effective influencer. In this month’s column, we will explore gaining the unique insights necessary to establish a program that will truly provide value to the enterprise.
Starting last August, we began the current series of articles to provide our readers with a deep dive into the NIST Framework and its approach to Identify, Protect, Detect, Respond to and Recover from cybersecurity incidents.
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.