Security reached out to Dean Alexander, Director of the Homeland Security Research Program and Associate Professor of Homeland Security at Western Illinois University, for suggestions on how business owners and security leaders can cooperate with law enforcement and gain additional insight before, during and after a potential terrorist incident like the one in Chelsea.
Risks to energy sector enterprises continue to grow, with drones, terrorism and budgetary challenges looming. Compliance requirements are tightening as well, but as Everardo Trujillo, Manager of Information Security Engineering and Operations at Sempra Energy Utilities, says: “A lot of people say ‘compliance makes you secure,’ and it’s the other way around, really.”
The U.S. has issued a warning to American citizens visiting Europe this summer to be on the alert for terrorism risks. Targets could include major sporting events and tourist sites, restaurants, commercial centers and transportation, says the State Department.
The March multiple terror attacks in Brussels that resulted in more than 30 people killed and more than 250 injured raises again the specter of terrorism globally. While since 9/11 fewer than 50 people have been in killed in the United States due to jihadist-inspired terrorism, that paltry number fails to illustrate that the jihadi threat here is significant as hundreds – if not thousands – of persons would have succumbed to otherwise stymied plots.
The so-called “Islamic State” (IS) that has swept into power in parts of Syria and Iraq presents an imminent danger to the global community, with its capacity as an effective, ideologically motivated and bloodthirsty fighting force, coupled with its expanding territorial reach, on the ground and online.
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.