After receiving the funding to develop several security projects to update or replace systems and components, including upgrading more than 3,000 cameras to IP, across more than 100 facilities that Security Director Kirk Simmons is responsible for securing in Hennepin County, MN, Simmons and his team found themselves in a predicament: navigating the county’s IT department processes for project development, as most systems depend on the IT network and servers for which the Hennepin County IT team has responsibility.
It’s the time of year, after all, when extended families gather to celebrate the season with warm embraces and holiday cheer – up until the moment when we realize that, while we love each other, we don’t really enjoy being in the same room together for very long.
The concept of remote decision making, while necessary in 2000, is not necessary today. Let’s use the significant security and power of existing IT networks, let it all be managed by IT and let security get back to their primary job, deciding who should get in and responding to those who should not.
In every element of our daily lives there are rules that guide our behavior. These rules come to us in many forms. From the time we are infants, our parents teach us what types of behaviors are acceptable and those that are not. We all remember the dreaded “No” from our mothers or fathers which was usually coupled with a stern look on their face.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!