As you read through this year’s Security 500 Report and the advertisements surrounding it, you may not realize how much marketing’s mission is intertwined with security’s. Perhaps a digital marketing conference would be as valuable to you as attending a security industry event because the era of collecting, analyzing and interpreting information to identify risks and predict threats has arrived. Scorned for its use by three-letter government agencies, the results are clear. It works. The Predictive Revolution is the culmination of a three-stage evolution in risk and security practices.
Last year the Security 500 Report research identified the Risk-Nado facing security organizations. It pointed out how global risk matrix, the role of security and the expected results were all expanding quickly. As a solution, we identified with the theme of the book (and movie) “Money Ball” and the application of quantifiable mathematics to predict how a player will do in a specific situation.
What are the Top 10 Trends enterprise security executives concerned with now, and what should you plan for in 2014?
November 5, 2013
Security 500 members are enabling enterprise missions through proactive risk and resilience programs built on strong customer service cultures. Transforming security into a service organization requires flexible strategy and brilliant execution in an ever turbulent and global Risk-Nado.
Learn how to change the game of security with better statistics
November 5, 2013
Leveraging metrics and statistics can lead to a stronger security program, just as they led to a better baseball team for the Oakland Athletics in “Moneyball.” So how can these metrics protect your enterprise from a Risk-Nado?
Two weeks ago, ASIS International Seminar and Exhibits arrived in Chicago, bringing plenty of flash in its opening ceremonies, as well as plenty of possible security solutions on the show floor, as manufacturers seek to help enterprise security leaders get more from their existing investments in analog systems.
Got a question for a leading integrator? Submit it in the comments!
August 1, 2013
Integrators are a key partner in many enterprises’ security programs, but they also have the unique viewpoint across the industry, foreseeing the next trends from manufacturers while understanding the demands and needs of integrators.
When I was growing up in New Jersey, if someone hit you in the nose and took your lunch money, well, you didn’t eat lunch that day. In the cyber world the punches are bigger, the dollars are tremendous and you don’t eat lunch because once your intellectual and physical property is gone, so are the jobs and paychecks that IP created.
Over the coming years the surveillance industry will follow a similar path that the IT industry has tread increasingly more service offerings. These offerings will range from live remote monitoring to managed surveillance systems, with both private and public cloud deployments.
Not all employees are saboteurs or malicious actors, but without education, unwitting employees could cause just as much damage as a targeted data theft in the long run. Read how to prevent this in the August 2015 issue of Security. Also read how building stronger relationships with local and national law enforcement can aid in school security awareness and response, learn about the dangers of continuing to use old credit card terminals, and see the ASIS International 2015 product review.