In the March issue of Security Magazine, read how to leverage a GSOC for Unified International Security, sneak a peek at the ISC West 2014 technology and see how you can get realistic results from security technology. If you're traveling abroad, there are 24 easy steps to follow for data security, and traveling or not, this month we're giving you the top steps in handling an executive kidnapping.
Operators in the room are on their phones, either receiving or relaying information about security – physical and cyber-related events. Welcome to Exelon’s Security Operations Center (ESOC), with three entities: the ESOC, the Incident Command Center (ICC) and the Cyber Security Operations Center (CSOC).
The lessons learned following the Boston Marathon bombings were many, but one lesson that was learned rather quickly was that Twitter was going to become the go-to platform for gathering timely and accurate information from city, state and federal officials regarding the rapidly unfolding events of that week.
ISC West is fast approaching – April 2-4 – so while you’re booking your travel to the show, take a few moments to scope out what innovations you want to see for yourself.
March 1, 2014
Even if you can’t make it to Las Vegas for this year's show, there’s no reason you have to miss out on this year’s technology. Get a sneak peek of what will be shown and debuted at ISC West 2014.
Despite robust planning, a security director’s worst nightmare is a serious injury or death occurring on company property due to a violent criminal act.
Hospital Incident Command Systems (HICS) are a component of security and emergency management that is often overlooked in many of the disaster plans in the United States.
Counterterrorist operatives perform drills on securing and neutralizing threats at major target areas. Although this is an extremely important concept to master, often ignored is one of the most important components in community disaster preparedness: the local area hospital.
Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.
But while the smartphone case, debuted at the 2014 Consumer Electronics Show, is marketed primarily for personal use, including identifying wildlife, detecting home energy loss or a variety of other practical and creative uses, thermal cameras remain a valuable investment for enterprise security leaders, even though you can’t fit them in your pocket.
Law enforcement agencies are tasked with the difficult job of keeping communities safe, a responsibility that never goes away.
March 1, 2014
Advancements in security technology, however, are giving law enforcement agencies an advantage in the fight against crime. Video surveillance has long been used as a deterrent and tool for capturing incidents as they occur, but recent innovations in IP-based cameras and wireless networks have made it even more practical for law enforcement applications.
Recently, there was a mall shooting in which three people died about five miles from my home in Columbia, MD. My wife and I were to have been there getting her phone fixed in the exact part of the mall where the killings took place.
Monitoring emerging trends, customer likes and dislikes, and understanding unmet customer needs can determine how rapid a rate of incline or decline your business experiences. Companies spend millions of dollars conducting surveys of customers, potential customers, industry experts and key opinion leaders to determine if their products or services effectively meet, exceed or miss market expectations.
Most security executives clearly understand cyber security is in a class by itself, and the risks associated with ignoring it are immeasurable. They are surrounding themselves with IT and technical security professionals instead of traditional security staffing and former law enforcement personnel.
The role of the CSO has significantly changed in the past 10 years and will change even more drastically over the next 10. For example, mention “convergence” and lines begin to blur – lines demarcating previously clear-cut, albeit traditional areas of management responsibility, budgets, reporting hierarchies, resourcing needs and geography.
The most important step is to understand the level and type of kidnap risk in countries or regions where your organization operates or where employees are expected to travel for business reasons.
If your organization is operating in an area where the risk of kidnap is deemed high, you should consider the Special Risk options available through the insurance market. Carried by many leading underwriters, Kidnap/Ransom and Extortion (KRE) coverage reimburses the losses associated with a kidnap.
For well over a decade, CEOs have been relegating the operational, legal, reputational and competitive risks associated with cybersecurity to those responsible for Information Technology.
Cybersecurity is the unsung linchpin of every company that has grown increasingly dependent upon vulnerable technologies, whether to communicate, to store sensitive data, or to manufacture and deliver its products and services.
As the security industry heads to the largest technology trade show in the world, ISC West in Las Vegas, it is a great time to do an inventory and reflect on your security technology investments and systems
There will be more than 1,000 exhibits at ISC West plus another 100 or so new technologies and solutions presented in hotel suites and meeting rooms off the show floor. Robust discussion about the movement toward IP, mobility and the cloud will buzz across the show floor, as it should.
Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.