Crowded show floor aisles and busy booths marked all three days of the ISC West 2016 tradeshow this year, and we’re here to compile some of the top news and trends of the week for you. Here’s what our editors saw:
As you read through this year’s Security 500 Report and the advertisements surrounding it, you may not realize how much marketing’s mission is intertwined with security’s. Perhaps a digital marketing conference would be as valuable to you as attending a security industry event because the era of collecting, analyzing and interpreting information to identify risks and predict threats has arrived. Scorned for its use by three-letter government agencies, the results are clear. It works. The Predictive Revolution is the culmination of a three-stage evolution in risk and security practices.
Last year the Security 500 Report research identified the Risk-Nado facing security organizations. It pointed out how global risk matrix, the role of security and the expected results were all expanding quickly. As a solution, we identified with the theme of the book (and movie) “Money Ball” and the application of quantifiable mathematics to predict how a player will do in a specific situation.
What are the Top 10 Trends enterprise security executives concerned with now, and what should you plan for in 2014?
November 5, 2013
Security 500 members are enabling enterprise missions through proactive risk and resilience programs built on strong customer service cultures. Transforming security into a service organization requires flexible strategy and brilliant execution in an ever turbulent and global Risk-Nado.
Learn how to change the game of security with better statistics
November 5, 2013
Leveraging metrics and statistics can lead to a stronger security program, just as they led to a better baseball team for the Oakland Athletics in “Moneyball.” So how can these metrics protect your enterprise from a Risk-Nado?
Two weeks ago, ASIS International Seminar and Exhibits arrived in Chicago, bringing plenty of flash in its opening ceremonies, as well as plenty of possible security solutions on the show floor, as manufacturers seek to help enterprise security leaders get more from their existing investments in analog systems.
Got a question for a leading integrator? Submit it in the comments!
August 1, 2013
Integrators are a key partner in many enterprises’ security programs, but they also have the unique viewpoint across the industry, foreseeing the next trends from manufacturers while understanding the demands and needs of integrators.
When I was growing up in New Jersey, if someone hit you in the nose and took your lunch money, well, you didn’t eat lunch that day. In the cyber world the punches are bigger, the dollars are tremendous and you don’t eat lunch because once your intellectual and physical property is gone, so are the jobs and paychecks that IP created.
Over the coming years the surveillance industry will follow a similar path that the IT industry has tread increasingly more service offerings. These offerings will range from live remote monitoring to managed surveillance systems, with both private and public cloud deployments.
Global Security Operations Centers (GSOCs) are a valued necessity to support an enterprise’s global business goals and operations today, but building one requires buy-in, organization and insight from the enterprise’s internal and external customers, including its GSOC operators.