As the Overseas Security Advisory Council (OSAC) continues to travel around the world, this report from Boeing VP and CSO Dave Komendat details how he and a group of delegates arrived in Kabul, Afghanistan.
Leaving Moscow behind we shifted our focus to a venue of more imminent concern: London…the site of the 2012 Summer Olympic Games, officially the Games of the XXX Olympiad, which will take place here in just over two months on 27th of July to the 12th of August 2012. The OSAC London County Council is well-established and is prepped and already very much engaged in the Pre-Olympic planning.
In February of 2002, I made my way to Salt Lake City, the site of the XIX Winter Olympic Games, where as the Head of Security of one of the Corporate sponsors I had been invited by Mitt Romney to “lock shields” with him and Federal assets in protecting the Olympic games, the first since the terrorist attacks of September 11, 2001. The lingering threat posture meant a higher level of security than ever before provided for the Games.
I can think of no more an appropriate way to cap our three-country survey of Asia than with the Pan-Asia Regional Council (PARC) meeting, graciously hosted by the Bill and Melinda Gates Foundation--nor any more appealing venue than their beautiful new, (extremely "green") offices located in the shadow of the "Space Needle" here in Seattle.
Korea is said by some to be more than 5,000 years old. It's in the heart of that antiquity that our delegation convened in Seoul where we continued a cyber-focused theme in our discussions of the particular security challenges faced here in Korea. While not my first time in this ancient country—the only nation in the world that yet remains divided—it is my first visit since having joined the ranks of the private sector.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!