Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!
GSOC, SOC, VSOC, JSOC, NOC, INSOC... The possibilities are endless when it comes to a center, building, or facility that mitigates and responds to enterprise security issues, either within the U.S. or on a global level.
Whether you’re establishing your firm’s first Global Security Operations Center (GSOC), including a co-located Network Security Operations Center (NSOC) or refreshing your current GSOC’s and/or NSOC’s capabilities, here are my recommendations for success.
Whether you’re attending ISC West on your own or with your integrator, or just watching the new security technology arrive from afar, there are many new solutions on the horizon for video surveillance, access management, mobile credentials and much more.
An inexplicable rise in organized retail crime during the past couple of years, perhaps due to police passivity, has major retailers looking to upgrade their equipment, technology, policies and procedures, and training for employees to combat loss prevention.
There’s a C- on your report card, but you’re not alone: The 2017 Global Cybersecurity Assurance Report Card found that the world’s information security practitioners gave global cybersecurity readiness an overall score of 70 percent – a six-point drop over 2016.
Today’s center of gravity in cybersecurity is shifting, pulling the skills and experience of cyber defenders in new directions. In most companies, this situation has led to a convergence of responsibilities between physical security, information security and cybersecurity teams, and an increased commitment to “staffing-up” of dedicated “cyber defenders.”
More than 5,000 vascular or thoracic patients seen between 2012 and 2015 at Sentara hospitals in Virginia. That’s what Norfolk, Virginia-based Sentara Healthcare discovered in November of 2016 within one of its third-party vendors.
Hotels are notoriously difficult properties to secure. Not only are most of them open to the public 24/7, but property managers must maintain the tenuous balance between hospitality and security, while facing a wide variety of threats that can cross sectors and borders.
Mike Tyson notably said, “Everyone has a plan ‘till they get punched in the mouth.” So, how do you ensure the same doesn’t hold true for your company’s incident response plan when a real breach occurs? Enter the NIST Framework category titled Mitigation.
Analyzing the background of security leaders across the corporate security and risk management landscape, it is not surprising to see that a significant percentage of them have come from the public sector.
There have been volumes written about the role of the CSO and how to gain a seat at the table in the C-suite. A relatively small number of CSOs have been able to convince their management that the CISO should be under their purview, citing the inherent mission conflicts that exist when the CISO reports to the CIO.
Catastrophic fires that result in property damage costing at the least $10 million, otherwise known as large-loss fires, are a growing concern due to inefficient fire protection systems and climate change.
Combatting drug trafficking at ports, screening passengers at airports, determining the age of immigrants who have lost their passports: these are among the areas where radiation is used for human imaging for non-medical purposes.
Highlighting the challenges brought on by and the need to address violent extremism and radicalization in prisons, the United Nations has unveiled a new manual that offers practical advice on managing violent extremist prisoners, disengaging them from violence and facilitating their social reintegration upon release.
Employee stress rates are reportedly high in companies within the United States and Canada, thus raising concerns regarding mental health, substance abuse and how a high stress environment impacts the workplace.
Ransomware is one of the most threatening malwares in the cyber industry, according to Carbonite’s Rise of Ransomware report, where 66 percent of IT professionals emphasize the seriousness of the issue, yet only 13 percent believe that they are prepared enough to prevent a ransomware attack.
Who are the Most Influential People in Security? Find out which security leaders are making a difference in the September issue of Security magazine! Also, read about how New York is shaking up cybersecurity, changes in drone legislation, three steps to prepare for the GDPR, school surveillance savings and more.