Whether you’re establishing your firm’s first Global Security Operations Center (GSOC), including a co-located Network Security Operations Center (NSOC) or refreshing your current GSOC’s and/or NSOC’s capabilities, here are my recommendations for success.
While risk management is a "significant" commitment for organizations, 76 percent of enterprises lack a holistic strategy, and more than 70 percent are in the dark about critical assets and vulnerabilities, according to a new survey.
Security executives in property management secure commercial buildings in a variety of ways, depending on location, risk, whether the building is public, private or semi-public, what sort of asset is being protected, hours of operation, and the like. Protecting buildings from risks such as theft, loitering, vandalism, rioting and workplace violence comes with a variety of unique challenges and can take a lot of forethought, planning and creativity.
In his opening keynote at RSA Conference 2013, Art Coviello,Executive Vice President of EMC Corporationand Executive Chairman of RSA, The Security Division of EMC® addressed a crowd about the ways that Big Data is transforming the security industry, information technology, business and society.
Let’s start with the basics: the reason we take off our shoes at the airport is because the shoe bomber tried to get a bomb on a plane. The reason we can only carry on 3-ounce bottles? Someone tried to get a liquid bomb on a plane. Body scanners? Underwear bomber. But what if we took a look at suspicious behavior of the people attempting these acts of terrorism instead of relying primarily on machines to do our dirty work?
You have to create a strategic plan knowing that there’s a high likelihood it will change. Does that mean you shouldn’t plan? Absolutely not,” says Mark Lex, Security Executive Council faculty member and former director of security for Abbott Labs. Over his career, Lex learned through hard-won experience that security strategic planning, done well, incorporates a balance of anticipation and response, detail and flexibility.
Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!