Security Leadership and Management

Profile in Excellence: Mentorships to Move You Forward

To transition from one career or one field to another, you have to learn how to turn your hat, how to redirect your previous experiences and lessons-learned to new goals,” says David LaRose, the Director of Safety, Security and Emergency Management for Lakeland Regional Health in Lakeland, Florida. LaRose is also the 2015 President of the International Association for Healthcare Security & Safety (IAHSS) Board of Directors.


Read More

The Security Enterprise and Integrator Game Plan

Walk through the show floor at ISC West in Las Vegas next month and you’ll see hundreds of security products peddled by vendors wanting to sell you the “latest and greatest” in security technology. But sometimes, you don’t need technology as much as you need someone to sit down with you and have a frank and honest conversation about what you should or should not install in your enterprise. Then you can talk technology, right? Of course, it all depends upon your situation, your environment and the risks that you are trying to mitigate, but who wants to be sold something that they don’t need or can’t use?


Read More

Using Insurance Credits to Justify Security Investments

Your insurer is your partner in the risk business. The more insurers understand how security products can impact risk mitigation, the more effectively they will be able to price premiums. Your company’s insurance rates are commensurate with your risk exposure,” says Neil Lakomiak, Business Development Director, Building and Life Safety Technologies for UL LLC.


Read More

Report Says Colleges Downplay Sexual Assault Numbers

New research shows a pattern of under-reporting of on-campus sexual assaults by universities and colleges across the nation, and some schools have continued to under-report even after being fined for violations of federal law, according to a study published by the American Psychological Association.


Read More

Report: Top 10 Risks for 2015

 While the global business environment in 2015 is perceived to be somewhat less risky for organizations than it was in the last two years, business leaders are still more likely to invest in additional risk management resources this year, according to Protiviti and North Carolina State University’s ERM Initiative’s report Executive Perspectives on Top Risks for 2015.  


Read More

Balancing the First Amendment with Brand Reputation after Breaches

Over the last several years, it has become commonplace for the media to publish information based on electronic materials that have been removed or copied either by organizational insiders and/or external people or groups. The publication of this type of material has impacted individuals, public and private organizations and various government agencies. While it is important for a free society to have the benefits of a free press serving as one of the checks and balances to protect citizens from abusive practices, we may have reached a point where we should re-examine how this is practiced. Are our criminal and civil statues effective on these issues?


Read More

Get Your Security Report Card with Penetration Testing

In fact, the scope of this attack differs from any we have responded to in the past, as its purpose was to both destroy property and release confidential information to the public. The bottom line is that this was an unparalleled and well planned crime, carried out by an organized group, for which neither SPE nor other companies could have been fully prepared.”


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.