Items Tagged with 'risk management'

ARTICLES

Securing the Future of Cannabis

In June 2014, Sy Alli made a career move that was controversial, daring and, in his opinion, potentially ruining to his future prospects: He became the first director of corporate security for a marijuana-based enterprise: Dixie Brands, Inc. 


Read More

Finding the Balance in Property Management Security

Security executives in property management secure commercial buildings in a variety of ways, depending on location, risk, whether the building is public, private or semi-public, what sort of asset is being protected, hours of operation, and the like. Protecting buildings from risks such as theft, loitering, vandalism, rioting and workplace violence comes with a variety of unique challenges and can take a lot of forethought, planning and creativity.


Read More

2013: Highest Rate of Employee Theft in 6 Years

 "2013 was a gangbuster year for embezzlement in the United States, exceeding even 2012’s previous record pace,” says Christopher T. Marquet, author of The 2013 Marquet Report on Embezzlement, released in December 2014. “What is remarkable is depth, magnitude and frequency of employee theft in the U.S. economy. Vermont topped the list of highest embezzlement risk states in the nation for the third time in six years.”  


Read More

Addressing Profiling Changes to the Department of Justice

 We’ve gotten pretty good at collecting all sorts of data from cameras and other sensors – but in the end, it is what we do with the information that counts. Surveillance technologies provide the capability to capture the minutest details, but the real value in collecting information is in its analysis. While technology allows us to observe behaviors that predict criminal intent and can interdict before events occur, often this data is subverted by security professionals and law enforcement misinterpretation based on spurious factors. 


Read More

Security Succession Planning for CSOs

You have been with your current organization for more than 10 years leading the corporate security function, having conceived and built the program, hired staff around the world and integrated the department to being a trusted advisor to senior management. Since this is your second career, you are now reaching a point that you would like to retire and pursue other passions and personal interests. After sitting down and discussing this with your boss, you realize that he or she and the management team are concerned about the lack of a succession plan for your replacement. Their position is: While your second level staff is very good operationally, they are not under serious consideration for your role, and HR will be looking outside the company for your replacement.


Read More

Managing Risk Across the Enterprise

The key to the risk-based security program is that no matter what issue you examine, every one of them affects the reputation of the enterprise in one manner or another.

Once the risk matrix has been populated, management must then prioritize the risks and determine which are the most critical to the viability, survivability and resilience of the enterprise. When that prioritization has been completed, various functions within the organization can be tasked to design the appropriate solution for the risk involved.


Read More

EVENTS

Industry

Effective Risk Communication: Theory, Tools, and Practical Skills for Communicating about Risk

5/14/12
Harvard School of Public Health FXB Building
677 Huntington Ave
Boston, MA
United States
Stay ahead of the curve by attending this in-depth program, featuring the latest scientific findings on risk perception, case studies from around the world, a suite of practical tools, and hands-on skill training. Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine February 2015 issue cover

2015 February

In the February 2015 issue of Security Magazine, see what other companies have learned from the massive data breach and what they are doing in the now and in the future. Also, what could adding thermal cameras to your operation do for you? and Mohegan Sun at Pocono Downs prepares for the future with security decisions.
Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.