Risk managers might be overlooking a critical threat: the impact of technology failures on supply chain general operations, according to a new report from Marsh risk Management Research, Cyber Risks Extend Beyond Data and Privacy Exposures.
Elsevier's Security Executive Council Risk Management Portfolio was released at ISC West, and it provides how-to guidelines for security executives, educators and practitioners for both physical and digital risk management strategies.
Get caught up on the latest stories from Security Magazine this weekend, such as why your healthcare records are the holy grail to hackers; why a flight attendant tried to bring a gun to an airport; and who causes the most data breaches in an organization.
Problem identified and communicated, plan created, funds provided, problem resolved. This is the lifecycle senior business leaders often expect – and prefer – organizational challenges to have. It’s the way decisions are made and issues addressed for many functions of the business.
Security is no longer just a hot topic among security professionals. It’s crossed the boundaries into mainstream media and political debates. You can’t watch the news or read a newspaper or magazine without hearing about cyber threats, personal information breaches or risk management. But that doesn’t mean that company executives have opened their wallets to each and every security project their security staff submits – if only it were that easy.
What does Dr. Park Dietz, one of the world’s foremost forensic psychiatrists, want you to know about mitigating workplace violence? Read his guide on warning signs and prevention, along with features and columns on RFID technology, mobile credential standards, security convergence, CSO interview questions and more in our February 2017 edition of Security magazine.