Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime.
Airport security personnel spend most of their time preparing for active shooter incidents, insider threats and, in concert with the federal Transportation Security Administration (TSA), potential terrorist attacks. But on January 28, many of our nation’s largest airports had to handle an entirely different, unaccustomed scenario: mass protests over immigration policy.
Bullies poison their work environment with low morale, fear, anger, gossip and depression. The employer pays for this in lost efficiency, absenteeism, high staff turnover, severance packages and lawsuits.
Workplace bullying is not a topic often explored by enterprise security professionals. However, this will likely change in the coming years, given the scope and the immensity of the problem.
It’s difficult to pin down the number of organizations that utilize scenario-based training for security officers, but experts agree that this type of training appears to be increasing in use.
Between security systems manufacturers, integrators and end users, is anyone fully prepared to mitigate cybersecurity risk?
April 1, 2017
Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property.
It’s been nearly two years since we addressed cyber insurance in the Cyber Tactics column, so I decided to get an update from Bob Parisi, Managing Director at Marsh.
Within security leadership associations and meetings, key decisions are made about paths forward in the security industry, driving us to become trusted advisors, to learn about CSOs’ pain points and challenges, and to devise a more effective strategic direction for my company.
Since the onset of the 24-hour news cycle and the constant barrage of social media blogs, the way things are characterized seems to have evolved into creating the most sensationalized sound bite.
More than 1,000 pieces of terrorist and violent extremist online content in seven different languages have been assessed for the purpose of referral to online platforms during a two-day concerted action coordinated by Europol, in collaboration with representatives from Italy, Latvia, Spain, Switzerland and the UK.
The World Health Organization (WHO) has published its first-ever catalogue of antibiotic-resistant bacteria that pose the greatest threat to human health.
A survey of U.S. oil and gas cybersecurity risk managers indicates that the deployment of cybersecurity measures in the industry isn’t keeping pace with the growth of digitalization in oil and gas operations.
New EU-wide rules on illegal acts to counter the growing threats from foreign fighters and lone wolves were approved by the European Parliament on February 16.
Due to the natural aging process, automatic facial recognition systems are less likely to recognize your face after a period of six years, according to a study at Michigan State University.
According to a Gallup poll, Alabama takes the lead as the state with the highest percentage of employee engagement, with 37 percent of workers in the state as “decidedly engaged in the workplace,” followed by Delaware, Kentucky and Louisiana at 36 percent.
Travel risk is a top priority among European companies, yet travel security risk mitigation programs are seen as undermined due to communication inefficiencies.