Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Security Leadership and Management

John Bertsch: World Championship Security

“Without a doubt, leadership is about getting everyone to play nice.”

“When did Iget programmed? I’d have to say my mom was a huge contributor to molding my altruistic mindset growing up. My Mom never drove by someone or something in need. We’d always say, ‘Oh mom, don’t stop. Not again!’ But she always did.” And with that Bertsch has been an enthusiastic volunteer and then ‘CSO’ to make communities and events better through solid risk management and resilience.


Read More

Kroll Global Fraud Report Reveals Significant Surge In Corporate Fraud

The number of companies falling victim to fraud has increased in the past year, according to the 2013 Kroll Global Fraud Report.


Read More

When Is Your Enterprise Liable for Outsider Violence on Campus?

While the terminology varies somewhat, businesses may anticipate three categories of individuals entering their premises: guests, invitees, and trespassers.
Read More

Debating the NSA, Espionage and Hackers with Congressman Mike Rogers

A Frank Look at the World Today with Congressman Mike Rogers

U.S. Representative Mike Rogers (R-MI) is hard at work in Washington D.C., despite Congressional recess, when other lawmakers have returned to their respective districts and even the President and his family escape the heat to a vacation destination. 


Read More

The Security Service Economy

More and more, security is focusing its value proposition on a service culture.

More and more, security is focusing its value proposition on a service culture. While this topic has been raised by many CSOs in recent years, the volume and frequency of the subject reached a peak recently and deserves some attention. 


Read More

How to Manage Physical Asset Risk

Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.

Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.


Read More

Social Media Forces Risk Management Changes in At-Risk Countries

The speed at which political instability spreads is now inextricably linked to social media, as disaffected populations around the globe turn to this powerful outlet to drive demonstrations, according to a new Marsh Risk Management Research briefing, Social Media Heightens Political Risks in Emerging Markets.


Read More

Prosecutors Call for Updated White Collar Crime Laws

New York's antiquated laws against public corruption, computer crimes and fraud -- including swindles targeting the elderly -- would be beefed up under a series of wide-ranging proposals.


Read More

The Most Influential People in Security 2013

Nominated by their colleagues and associates, these top enterprise security executives are changing the security landscape for the better.

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.


Read More

Is Your Program Security Theater?

Is your department making the enterprise safer, or is it a false sense of security? Take our quiz to find out!

 Security guru Bruce Schneier coined the term “Security Theater” to describe phony security measures, procedures, or technologies that give the superficial appearance of providing security without actually countering malicious adversaries to any significant degree.  


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security Magazine 2014 September cover

2014 October

Security takes a look at safety and preparedness for the harshest of weather phenomena in this October 2014 edition of the magazine. Also, we investigate supply chain security and the many benefits of PSIM. 

Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.