Leadership & Management Column

Understanding People, Your Enterprise’s Top Asset and Risk

Singing Kumbayah won’t keep insider threats away.
No Comments

People are always viewed as the most important asset in your enterprise. There has been a significant amount of press about the increasing levels of external risk an enterprise must face on a day-to-day basis.


Read More

Why Risk Intelligence is the Key to Successful Security

Risk intelligence is one of the most important of the core elements which must be established when building a successful and effective enterprise risk management program.
By Jerry Brennan and Lynn Mattice
No Comments

Risk intelligence is the final and probably one of the most important of the core elements which must be established when building a successful and effective enterprise risk management program. 


Read More

Keep Security Current with Audits, Analysis and Updates

Previously in this series we have addressed leading by understanding and embracing ERM.
No Comments

 Previously in this series we have addressed leading by understanding and embracing ERM.  We also covered establishing polices, procedures and processes as the foundation of implementing the core values, operating philosophy and compliance requirements necessary to survive as a viable entity.  


Read More

Communicate, Communicate, Communicate

Nothing is more basic than effectively communicating.
No Comments

Nothing is more basic than effectively communicating.


Read More

Founding Security on Enterprise Risk Management

By Jerry J Brennan and Lynn Mattice
No Comments
Utilizing the principles, standards and methodologies of ERM and/or ISO 31000 as the foundation of security programs is vital in order to transform your security program to holistically address the full scope of the risk, threat and hazard landscape that your organization faces today and into the future. Going forward, we will provide some insight into the concepts of ERM and why it is so important to utilize ERM as the foundation of your security program.
Read More

Security’s 2012 Accomplishments and 2013 To-Do List

By Bob Hayes and Kathleen Kotwica Ph.D.
No Comments

At the New Year we find ourselves reflecting on who we are as an industry, what we’re doing and where we hope to be. Our ongoing research of security-related issues has shed light on some remarkable changes in the security industry in the last ten years, many of which are driven by technology advances and shifts in the business environment.


Read More

Determining Operations Excellence in Security

By George Campbell
No Comments
Since the 1980s, businesses have developed formal ways of gauging, monitoring and pursuing excellence in manufacturing and operations, including the disciplines of Six Sigma, Kaizen, Operations Excellence and Total Quality Management. Delivering excellence in products and services is a common-sense, accepted business objective. But what is “excellence” in security?
Read More

Preparing Proactive Sports Security

By Mark McCourt
No Comments

“Sport reflects both good and bad aspects of our broader society, whether economic or political issues are in play. The fan that buys a ticket may feel with or against the team, entitled or angry; often as a result of the broader societal environment,” explains Dr. Lou Marciani, Director of the National Center for Spectator Sports Safety and Security. The work at NCS4 primarily benefits its members, professional leagues and division one universities, individual teams and venues. Ultimately, NCS4 serves the fans by providing safety for the enjoyment of spectator events.


Read More

Do You Understand Risk Appetite?

By Marleah Blades
No Comments
Risk appetite isn’t a term that comes up a lot in the security trade media. This is interesting, because understanding risk appetite is a crucial factor in developing acceptable security programs, communicating value, and aligning the function with the goals of the business — all of which are talked about in security circles all the time. So what is risk appetite?
Read More

The Titanic: Risk Management vs. Compliance

By Marleah Blades
No Comments
Next month will mark the 100th anniversary of the sinking of the Titanic, and plans abound to memorialize or capitalize on the tragedy, including the re-release of the 1997 movie Titanic in 3D, the production of a commemorative coin, and – believe it or not – a series of Titanic memorial cruises. Some members of the security community recently chose to remember the event in a more constructive way.
Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+