Businesses are putting their corporate security at risk, with one in three organizations (33 percent) allowing their staff unrestricted access to corporate resources from their personal smartphones, according to a survey.
Jeff Berkin rarely makes a business and security decision these days that doesn’t somehow impact, either positively or negatively, the business.That business is CACI International, which provides enterprise IT and network services for the federal government employing 14,600 employees working in more than 120 offices in the U.S. and Europe. Berkin is Senior Vice President and Chief Security Officer, the first CSO in the company, and he also has an impressive career, first as a trial attorney and then senior executive roles within the FBI.
Performance metrics are “critically important” to business leaders, says Greg Niehaus, Professor of Finance and Insurance for the Moore School of Business, University of South Carolina. “In my view it’s very important for business functions to have metrics that tie back to the objectives of the organization – that measure the impact on value and value creation.” If a function fails to develop and effectively communicate performance metrics, says Niehaus, “their contributions to the organization will likely be not appreciated, which, in down times, could lead to cutting of responsibilities or jobs and hurting the value of the organization.”
Workplace violence has grown into perhaps the most significant risk issue facing corporate security departments today. Security professionals have a unique contribution to make in helping the organization to meet its duty of care to anticipate, prevent, respond to and recover from workplace violence incidents. At the outset, corporate security needs to have a place at the strategic planning table.
Change-makers, thought leaders and industry pioneers, these 16 security executives, legislators and mavericks are making a difference in security, impacting enterprises, communities and nations. Can Hackers Really Control Airplanes? Discover 3 steps for timely cyber intrusion detection. Read all this and more in the September 2015 issue of Security.