Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Security Magazine

2014 November cover of Security Magazine

View Archived Issues

2014 November

Don't miss our 2014 Security 500 issue, with rankings, data on sectors, and other security benchmarkings, all contained within this November 2014 edition of Security magazine. Also, (re)learn the basics of lobby security and how to make the highest impact retrofit for your budget.

Security 500: The Predictive Revolution

 As you read through this year’s Security 500 Report and the advertisements surrounding it, you may not realize how much marketing’s mission is intertwined with security’s. Perhaps a digital marketing conference would be as valuable to you as attending a security industry event because the era of collecting, analyzing and interpreting information to identify risks and predict threats has arrived. Scorned for its use by three-letter government agencies, the results are clear. It works. The Predictive Revolution is the culmination of a three-stage evolution in risk and security practices.  


Read More

2014 Security 500 Sector Reports

What are the major critical issues in your sector? How does your enterprise compare to your peers?
Read More

2014 Security 500 Rankings

What are the major critical issues in your sector? How does your enterprise compare to your peers?


Read More

2014 Security 500 Report Methodology

The Security 500Benchmarking Survey is based on information from several sources:

  • Data supplied directly by participating enterprises
  • Data obtained through public resources/records

The Security 500 tracks 18 vertical markets and collects unique data where appropriate (such as the number of unique facilities in healthcare) and applies this data to key metrics. The key metrics collected this year include but is not limited to:

  • Security Spending/Person
  • Security Spending/Revenue
  • Security Employees/Officer

           


Read More

Making the Highest Impact Retrofit for the Budget

 Whether you were hired to breathe new life into a stagnant security program or if your security system is just in desperate need of an overhaul, a retrofit is likely in your future. However, a high-impact retrofit doesn’t necessarily mean a high-cost system. Sometimes, the return on your investment can come from one lost key.  


Read More

Back to Basics for Lobby Security

After yet more school shootings began making the news, the Diocese of Springfield in Illinois decided to completely overhaul its virtually nonexistent lobby security a year and a half ago. “(The shootings) made us realize we needed to put something in place to secure us a little bit more. We may be looked at as a target because we are in an old high school building, and our property is combined with the (new) high school next door to us,” says Patrick Ketchum, Director of the Office for Insurance and Benefits at the Diocese of Springfield in Illinois.


Read More

Keys to Employee Cybersecurity

 Cyber breaches knows no boundaries and doesn’t discriminate based on business size. For example, a study by the National Cyber Security Alliance shows that even though 66 percent of the small businesses surveyed relied on the Internet on a daily basis and 69 percent handled sensitive data, only 23 percent had a written policy and procedure Internet security guide for their employees. Only 37 percent provided Internet safety training to their employees, and only 50 percent had a cybersecurity plan to keep their business secure. 


Read More

Stephen Baker: Securing Other People's Money

 All $27,430,000,000,000 of it. That is $27 “Trillion” with a capital “T” of other people’s money under custody at State Street Corporation. Most of their customers, actually, are other financial institutions as well as institutional investors, and their brand and business relies on the continuous vigilance of their executive leaders including Steve Baker, Vice President and Deputy CSO.  


Read More

Jerry Blum: Going the Extra Mile

 In more than 5,300 AutoZone stores in the U.S., Puerto Rico, Mexico and Brazil, the number one job for AutoZoners is to provide “Wow! Customer Service.” And AutoZone’s security focus is no different, says Jerry Blum, Director of Security Services for AutoZone. The security team’s focus is on more than just customers. There are vendors, employees and other business partners, too.  


Read More

John Dailey: Life Happens Here

 And Duke’s security team assures it. “Thinking about the higher education and healthcare facilities at Duke, it is amazing what occurs on a given day. Students learn something that will change their life. Another person’s life will be saved at the hospital. A researcher will make a discovery that changes quality of life for others. There may be a wedding in the chapel. There is a high likelihood Duke will compete for or win a national sports championship. And we have celebrity speakers and lecturers visiting frequently. This is a very rewarding, exciting and dynamic environment,” Chief Dailey explains.  


Read More

Gary Gagnon: Unique-ness

 Many organizations protect their cyber infrastructure by looking inward, focusing on their own networks and systems. They dedicate themselves to reducing the attack surface, assessing their vulnerabilities, and conducting system patching – all to continuously monitor their own networks.  


Read More

Gregory Halvacs: Protecting the Last Mile

The nature of providing health care services is changing, particularly as the focus shifts from hospital-based care to providing care in more cost-effective settings. The introduction of the Affordable Care Act and other key drivers are making it increasing important for health care providers, and their supply companies, to reduce costs for customers and patients, says Greg Halvacs, the Chief Security Officer and Senior Vice President for Global Security, Flight Operations and Global Real Estate at Cardinal Health, a health care services company based in Dublin, Ohio.


Read More

Rich Mason: Changing the Weather

 Honeywell is a Fortune 100 diversified technology and manufacturing leader, serving customers worldwide with aerospace products and services; control technologies for buildings, homes and industry; turbochargers; and performance materials.  With such diversity of opportunity at Honeywell, having the right controls and security in place is critical to long-term success.  


Read More

Dennis Quiles: From Farm to Fork

 Since 1955 McDonald’s has been proud to serve the world some of its favorite food. Along the way, McDonald’s not only lived through history, but created it: from drive-thru restaurants, to Chicken McNuggets, to college credits from Hamburger University and much more.   


Read More

Hector Rodriguez: "Hope" Is Not a Plan

 Chief Hector Rodriguez believes so much in the Santa Ana Unified School District (SAUSD) and the safety of the children who attend SAUSD schools that he sends his own children to school there. 


Read More

Jim Sawyer: Embracinc Authentic Customer Service for the Ultimate Security Strategy

 Jim Sawyer has a lot of “friends for life” at work.  Some of the “friends” Sawyer has made were at one time hostile, angry and frustrated clients, people tested by enormous stress levels.  


Read More

Kirk Simmons: Ambassador for the County

 Being a government organization that services every facet of the public, there is a whole host of different scenarios that take place on a daily basis,” says Kirk Simmons, Security Manager for Hennepin County in Minnesota. “There are occasions where people are getting their kids taken away from them or they’re being told they need to pay a lot of money in taxes. So, for them, it’s not a really pleasant experience all the time. So, as the security department, we want to ensure that employees and the people utilizing our services can do so in a safe manner. We’re there to protect them and make sure they do what they need to do and get home safely.” 


Read More

Vance Toler: Finding Common Ground in Different Perceptions of Security

At the heart of our mission at Southwest Airlines is an unrelenting dedication to deliver the highest quality of customer service in the industry. After all, we’re in the service and hospitality industry. Our purpose is to connect people to what’s important to them in their daily lives. In order for the security team to make a meaningful contribution to the success of the company, we can’t deviate from those core beliefs.” This is the mission statement of Vance Toler, the Director of Corporate Security for Southwest Airlines.


Read More

Alexander Ubiadas: Learning Self-Reliance from Isolation

 As Hurricane Iselle barreled down on the island of Oahu in early August, Alexander Ubiadas was prepared. He had already invested in ruggedized security equipment at isolated facilities, built long-term recovery plans and worked with his staff to get facilities as ready as possible for the storm. Because while people might survive for a while without electricity, they truly need safe, clean water, no matter the weather.  


Read More

Closing Cybersecurity Gaps

 There is a common plot line that underlies most of the breach stories in the news. Software written by bad guys gets into places on the corporate network where it shouldn’t be. It looks around, finds vulnerable systems, grabs valuable data and transmits it off the network. The term most commonly used to describe this behavior is Advanced Persistent Threat (APT).   


Read More

How PSIM and Unified Platforms Drive Risk Management

 Risk management too often is perilously fragmented and insufficiently funded. Managing the overall risk equation is assuredly a CEO-level and management team obligation. But the design and execution of effective strategies to identify and moderate risk is, of necessity, complex and typically spread among numerous organizational silos.  


Read More

Improving Network Security and Efficiency with the Cloud

 Cloud computing technology providers are rapidly improving the effectiveness and efficiency of network security, and what we are seeing is just the beginning. If your business is not already taking advantage of cloud-based security solutions, chances are high you will benefit from this emerging market soon.  


Read More

How the Security Evolution Turns to Prediction

Last year the Security 500 Report research identified the Risk-Nado facing security organizations. It pointed out how global risk matrix, the role of security and the expected results were all expanding quickly. As a solution, we identified with the theme of the book (and movie) “Money Ball” and the application of quantifiable mathematics to predict how a player will do in a specific situation.


Read More

How Unified Device Management Is Critical to BYOD Enterprises

 Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.  


Read More

Millennials Looking to Cybersecurity Careers, Security

Those of the Millennial Generation (born between 1980 and early 2000s) have upped their game to keep private information safe, but while they show a keen interest in cybersecurity careers, they don’t know exactly what that entails.


Read More

Ex-Employees Leaving with the Keys to Company Data

In July 2014 alone, 940,000 people in the Professional and Business Services industry left their jobs, according to the Bureau of Labor Statistics. The question is: How much power and access do those people still have over company data? 


Read More

Health Care Data Security Plans on the Rise

 In August, Community Health Systems announced that an external group of hackers attacked its computer network that an external group of hackers attacked its computer network and stole non-medical data of 4.5 million patients – the second-largest HIPAA breach ever reported.  


Read More

Consumers Hold Companies and CSOs Liable for Data Loss

If you’re not convinced of the impact data breaches have on business success yet, be aware that 51 percent of consumers will take their business elsewhere after their retailer, bank or service provider suffers a breach that compromises personal information, including addresses, Social Security numbers and credit card details, according to a HyTrust Inc. poll. For retailers focusing on the powerful 35-44 age range demographic, that number jumps to 60.2 percent. 


Read More

Underwater Robots Could Increase Port Security

 Late September, MIT researchers unveiled an oval-shaped submersible robot at the International Conference on Intelligent Robots and Systems. The football-sized machine can perform ultrasound scans underwater, looking for cracks in nuclear reactors’ water tanks. The robot could also inspect ships for false hulls and propeller shafts that smugglers use to hide contraband.  


Read More

Designed for Harsh Mobile and Permanent Installations

This line of outdoor recording devices features up to 4TB of video storage, and the devices are powered by an Intel Core processor.


Read More

Unifies Access Control and Video Network in One Appliance

 This appliance holistically manages and monitors access control, video and intrusion from a single database, providing the increased functionality of combined client features.  


Read More

Provides High-Quality Images from a Distance

 This water- and dust-resistant camera features a built-in long-focus variable-focal lens providing advanced functionality, including producing exceptional image quality even if the camera is located some distance from the subject, such as on a high ceiling in a large lobby.  


Read More

Uses Audio Enhancement Algorithm for Sound Clarity

 These voice-over-IP call stations combine high-quality speaker and microphone components along with a proprietary audio enhancement algorithm for sound clarity.  


Read More

Automatically Discovers Cameras without Additional Programming

 With a set-up time of less than three minutes, this NVR is designed for easy ownership, including no complex router configuration and cloud-based mobile apps for iPhone, iPad and Android.  


Read More

Scans Facilities with Radar for Intrusion Detection

 For remote or unmanned facilities, getting early warning of possible intruders could make the difference in stopping a theft or other malicious security breach.  


Read More

Features Authenticated Signature for Shellshock Vulnerabilties

 This cloud-based vulnerability scanner has been enhanced with a Bash Shellshock Authenticated Signature. 


Read More

Enhances Security for Cloud Data Storage and Data Centers

 Building off of technology from Intel Corporation, this system lets organizations proactively control where virtual workloads can run, further mitigating the risks of data mobility that virtualization and cloud computing create.  


Read More

Provides Real-Time Insights to Better Detect Cyberattacks

 Attackers used authorized credentials in more than 76 percent of network intrusions in 2013, allowing them to impersonate legitimate network traffic while conducting suspicious activities.  


Read More

Provides Mobile Access to Emergency Response Procedures

 In the event of an emergency, employees will likely grab smartphones and personal items before evacuating. They are unlikely to rush to find the binder of emergency procedures.  


Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

2014 November cover of Security Magazine

2014 November

Don't miss our 2014 Security 500 issue, with rankings, data on sectors, and other security benchmarkings, all contained within this November 2014 edition of Security magazine. Also, (re)learn the basics of lobby security and how to make the highest impact retrofit for your budget.
Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.