In early April, Wall Street’s oversight committee announced that bank’s oversight of cybersecurity measures at outside firms it does business with remains a work in progress, at best. It cited a survey of 40 banks that found that only about a third require their outside vendors to notify them of any breach to their own networks, which could in turn compromise confidential information of the bank and its customers.
Walk through the show floor at ISC West in Las Vegas next month and you’ll see hundreds of security products peddled by vendors wanting to sell you the “latest and greatest” in security technology. But sometimes, you don’t need technology as much as you need someone to sit down with you and have a frank and honest conversation about what you should or should not install in your enterprise. Then you can talk technology, right? Of course, it all depends upon your situation, your environment and the risks that you are trying to mitigate, but who wants to be sold something that they don’t need or can’t use?
The Security 500 Benchmark Program is your tool to enter your security-related data and receive a confidential and free benchmarking report.
July 1, 2014
New this year is that all participating enterprises have the option to be included in the Security 500 rankings numerically or to be listed alphabetically. We have made this change to allow those concerned with numerical rankings to be included and recognized among the best security leaders in the world.
Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.
As enterprises are forced to cut budgets and adapt to leaner times, proprietary security forces are often one of the first things to shrink.
February 1, 2014
At Columbia College, a 16-building private liberal arts college in Chicago’s South Loop neighborhood, Bob Koverman, the associate vice president of campus safety and security, says there is no silo or separation between the 70-75 contracted security officers and supervisors and the in-house security staff on campus.
RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.
January 6, 2014
In the consumerization of IT, such as the Bring Your Own Device movement, employees and stakeholders want their services delivered according to their preferences, and more and more are demanding digital, high-tech solutions.
“I believe our greatest contribution to every student, staff member, parent and community member is the availability of services from our security department.”
November 5, 2013
“We treat everyone, from kindergarten on up, with respect,” says Joseph Perchetti, Supervisor of Security for the Radnor, Penn., Public School District. “They are our customers, and their taxes pay our salaries. We go the extra mile to make sure they are secure and to ensure that they can focus on education.”
For enterprises considering higher level and more integrated physical and logical security, identity and access management solutions through smart cards or more sophisticated credentialing, keep your head out of the technology razzle-dazzle.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!