Security Education & Training

How to Implement Security Officer Physical Fitness Standards

Managing the perception of security officers plays a major role in personnel and corporate safety – how can a physical fitness build more confidence in the enterprise security department?

The vast majority of security industry leaders agree that the key to professionalizing our industry is establishing and maintaining high standards.


Read More

How to Train Your Security Training Program

The foundation for creating a security department is risk evaluation and training, and taking training out of the binder and using it in the field could be the key to a thriving program.

 No matter if you have a proprietary or contracted security force, these officers must be properly trained.  


Read More

Pursuing Higher Education to Compete in the Security Industry

The challenges facing security professionals have evolved exponentially over the last few years

The challenges facing security professionals have evolved exponentially over the last few years


Read More

4 Ways to Improve IT Collaboration

For a long time, security was its own entity in the IT infrastructure. Security and IT didn’t always see eye to eye, and there were often points of contention. Nowadays, as collaboration between the two has become more common, both IT and security are combining forces to better understand the risks and threats to the enterprise.
Read More

Next-Generation Security Training Planned for ISC West 2013

Next Generation Security is not just the focus of the Security Industry Association’s (SIA) ISC West 2013 educational program; it’s the means by which leading security professionals create enterprise-wide value through security.
Read More

Educating Employees to Build Better Cyber Security

To err is human, to prevent err is IT info-security’s job. Dealing with the weakest link in the IT security chain – people – has its challenges.
Read More

Managing Compliance and Due Diligence in International Hiring

Employers have long recognized that conducting due diligence on new hires is a mission critical task. When it comes to any position dealing with Information Technology (IT), the stakes go up exponentially due to the sensitive nature of access to data and systems that operate the company.


Read More

U.S. Security Shifting to Preventative Methods

Let’s start with the basics: the reason we take off our shoes at the airport is because the shoe bomber tried to get a bomb on a plane. The reason we can only carry on 3-ounce bottles? Someone tried to get a liquid bomb on a plane. Body scanners? Underwear bomber. But what if we took a look at suspicious behavior of the people attempting these acts of terrorism instead of relying primarily on machines to do our dirty work?


Read More

Educating Security Officers with Sector-Specific Training

Security officers are our first line of defense and work tirelessly for our protection. Behind the public face of the security officer lives an expertly prepared and ever vigilant professional who is well-trained and highly knowledgeable about their location and market.
Read More

Creating an Effective Whistleblower Program

Whistleblower tips are the most common method of detecting occupational fraud. Research by the Association of Certified Fraud Examiners shows that more than 60 percent of frauds are uncovered by tips; in organizations with a hotline in place, tips expose more than half of all frauds. Further, nearly 40 percent of tips are received from internal employees.
Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security December 2014 issue cover

2014 December

This issue of Security Magazine covers our 12th annual Top Guarding Firms list. Check out the best of the best as of December 2014. The 21st century has brought with it new types of security threats. Read how to combat and protect against these threats.

Table Of Contents Subscribe

Security Emergency Preparedness Training

Which security personnel emergency preparedness training is the top priority to you and your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.