An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?
The video analytics drums are beating louder these days. But now may finally be the time when technology advances, security-and-beyond enterprise-centric applications, IT’s big data notion and smarter systems integration are trending to real, cost-effective benefits.
When’s the last time you reviewed the services that your security integrator is offering? If it’s been more than a year, or perhaps even a few months, I’m certain that you’ll find that there are more choices and greater flexibility in the deployment of those choices.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!