Will the next budget go around cloud your executive career aspirations? Think ahead to this fall, when you are at the round table patiently waiting your turn to present your strategy, plan and budget, including your CapEx request. Surely, you have worked hard on the budget this year. Zero-based it? Completed risk assessments? Tied the security processes to measurable business benefits?
For those of you who do not know the name, Bryan Stow, I encourage you to learn about him and how disrespect for all things related to risk management and resultant poor security programs should be a lesson to those that approve your budget. Stow is one of the reasons Frank McCourt lost control of the Los Angeles Dodgers (no relation by the way...the Dodgers are not my fault).
During the past few years, my Security 500 research has identified the move of business resilience under the security umbrella in many organizations. Business resilience is defined as business continuity, emergency management and disaster recovery.
IP video surveillance systems are now in 50 percent of large enterprises in the US as defined by systems with more than 32 cameras. And analog is far and away the king with more than 80 percent of the less than 16 camera installations.
While the Security 500 report identifies the best programs, biggest investors and brightest leaders in 16 sectors, the fact remains that all of these organizations are inextricably entwined with smaller organizations across multiple supply chains.
Forget Ipads, Facebook and even the latest video game, Call of Duty-Black Ops, which sold $300 million plus in its first day, as hot companies and can’t lose businesses. They have nothing on cyber crime. At the recent Security 500 Conference, Tom Mahlik, former Section Chief for the FBI’s Domain Section Counter Intelligence Division, pointed out that not only are U.S. businesses and government agencies losing north of one trillion dollars from cyber crime globally (yes, about 8 percent of the U.S. economy); but that most victims are not aware of it and do little to defend against it.
Welcome to the fifth annual Security 500 Survey, Benchmark and Trends report, recognizing both our profession’s best security leaders and their outstanding organizations as well as identifying the biggest challenges
It is rare and wonderful when a new infrastructure platform unites with applications to create a truly dynamic technology solution that provides significant leverage to both the cost/benefit equation of
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!