The Defense Department may now officials exclude contractors or subcontractors from receiving information technology contracts based on the risk their supply chain poses to national security systems, Fierce Government reports.
“Successful leaders are surrounded by highly motivated and capable people who build relationships based on respect with a focus on results.”
November 5, 2013
“Managers care for the body of the organization. But leaders care for the spirit. And great leaders care about both. That is not my saying, but it is how I view leadership in any successful business,” says Tim Caddigan, Director, Corporate Security & Facilities for Altria Client Services.
Risk managers might be overlooking a critical threat: the impact of technology failures on supply chain general operations, according to a new report from Marsh risk Management Research, Cyber Risks Extend Beyond Data and Privacy Exposures.
Workers at Louisville-area Zappos warehouses have filed suit in federal court seeking pay for time spent filing through anti-theft screenings - sometimes for a half hour or more - after their shifts end.
Enterprises can sometimes move faster than manufacturers when it comes to unique designs and security needs.
August 1, 2013
How do you protect assets using video surveillance in an environment that doesn’t have access to continuous power or network transmissions, and is managed by third parties offsite from your location, and is possibly governed by another countries’ laws?
Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.