As enterprise security leaders gain access to more advanced and complicated security solutions, they’re also confronted with advanced and complicated risks. For as many security and surveillance applications that unmanned aerial vehicles have, for example, there are twice as many risks that unknown drones could pose to the enterprise. For every new IP camera added to the network, there is one new endpoint that could be vulnerable to a cyber attack.
The development of technology has always been a two-edged sword for security, but this report aims to keep you ahead of the game with advanced looks at forthcoming solutions, innovative case studies and recommendations from R&D experts, industry leaders and enterprise security executives.
Technology moves quickly, as military and commercial tools and toys merge with security applications to create both new solutions and risks for the enterprise. What should you be on the lookout for this year?
Starting last August, we began the current series of articles to provide our readers with a deep dive into the NIST Framework and its approach to Identify, Protect, Detect, Respond to and Recover from cybersecurity incidents.
The previous three columns have laid the groundwork for establishing yourself as an effective influencer. In this month’s column, we will explore gaining the unique insights necessary to establish a program that will truly provide value to the enterprise.
While utility enterprises are taking steps to detect and deter physical security threats, preventing damage and enabling recovery remain significant challenges, according to The State of Physical Grid Security 2015.
Eighty-six percent of respondents in the Margolis Healy Campus Safety Survey 2015indicated that their university has developed an emergency operations plan that addresses threats specific to their institution.