Jeff Karpovich, CPP, CHPA, security chief and transportation director at High Point University, has received the Medal of Excellence, awarded by the National Association of Campus Safety Administrators.
As you read through this year’s Security 500 Report and the advertisements surrounding it, you may not realize how much marketing’s mission is intertwined with security’s. Perhaps a digital marketing conference would be as valuable to you as attending a security industry event because the era of collecting, analyzing and interpreting information to identify risks and predict threats has arrived. Scorned for its use by three-letter government agencies, the results are clear. It works. The Predictive Revolution is the culmination of a three-stage evolution in risk and security practices.
The Security 500Benchmarking Survey is based on information from several sources:
Data supplied directly by participating enterprises
Data obtained through public resources/records
The Security 500 tracks 18 vertical markets and collects unique data where appropriate (such as the number of unique facilities in healthcare) and applies this data to key metrics. The key metrics collected this year include but is not limited to:
What are the Top 10 Trends enterprise security executives concerned with now, and what should you plan for in 2014?
November 5, 2013
Security 500 members are enabling enterprise missions through proactive risk and resilience programs built on strong customer service cultures. Transforming security into a service organization requires flexible strategy and brilliant execution in an ever turbulent and global Risk-Nado.
Use Sector-Specific Benchmarking to Compare Your Enterprise’s Focuses to Those of Your Peers
November 5, 2013
What are security’s top critical issues? What department does security report to? How are budgets changing? What responsibilities do security leaders shoulder within their organization? Compare your enterprise’s focuses to those of your peers in the Security 500’s sector-specific analysis.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!