Risks to energy sector enterprises continue to grow, with drones, terrorism and budgetary challenges looming. Compliance requirements are tightening as well, but as Everardo Trujillo, Manager of Information Security Engineering and Operations at Sempra Energy Utilities, says: “A lot of people say ‘compliance makes you secure,’ and it’s the other way around, really.”
While utility enterprises are taking steps to detect and deter physical security threats, preventing damage and enabling recovery remain significant challenges, according to The State of Physical Grid Security 2015.
IT security is complicated enough. The widespread adoption of BYOD mobile devices and the overall consumerization of IT promise to complicate security efforts exponentially. Are companies up to the challenge?
At the heart of our mission at Southwest Airlines is an unrelenting dedication to deliver the highest quality of customer service in the industry. After all, we’re in the service and hospitality industry. Our purpose is to connect people to what’s important to them in their daily lives. In order for the security team to make a meaningful contribution to the success of the company, we can’t deviate from those core beliefs.” This is the mission statement of Vance Toler, the Director of Corporate Security for Southwest Airlines.
Establishing and maintaining a culture across the enterprise that is based on unwavering ethical practices from the boardroom to the lowest level employee is also a key element of effective governance programs.
One of the most important topics currently on boardroom agendas focuses on governance. Ensuring that the enterprise understands and complies with laws, regulations, policies and procedures is no longer simply enough.
Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.