We all must stop running from the “elephant in the room” by implementing a real, effective tailgating prevention strategy. Combined with other analytical methods available today, this will allow security professionals to more effectively meet the challenges of our increasingly insecure world.
How can you measure your risk of unauthorized entry? Until now, it’s been virtually impossible. When it comes to security entrances, new analytics technologies (e.g. PSIM, IoT, etc.) are emerging, and it’s becoming possible to use technology, combined with people, to tap into security entrance metrics as part of an overall physical security strategy.
It’s essential that boards understand the organization’s cyber risks in order to successfully oversee overall company performance. CISOs and CSOs who can clearly convey cybersecurity to the board promotes better navigation of the organization in today’s uncertain cybersecurity world.
When discussing cybersecurity, a color can make all the difference. I recently spoke with Christopher Camejo, Director of Threat and Vulnerability Analysis, for NTT Com Security, about the differences between a white hacker, blue hacker and black hacker, and a red penetration test.
Where within the enterprise the corporate security department reports is often more form over function. It may be personality driven, power driven or simply a corporate culture thing. Many companies have a hard time deciding where corporate security should report.
Millennials like smartphones, online banking, selfies and… security? The security industry is in need of millennials’ talent and innovation, but it’s necessary to adjust expectations and support to get the most out of this new workforce. The Leadership Issue of Security includes insight into millennials’ career strategies, data breach response planning, hospital security & more.