Security Leadership and Management

Solutions for security executives to lead and manage their security staff, mitigate risk for their enterprise and show security's value in the C-suite.

ARTICLES

The Future of DHS Partnerships with Frank Taylor

In its recent Quadrennial Homeland Security Review, the Department of Homeland Security outlined its strategies for becoming a more integrated and agile agency
August 1, 2014

Ultimately, with a public-private partnership, what you put in is what you get out, says Wesley Bull, Senior Director/Head of Global Protective Services at NVIDIA, a company that invented the GPU – the engine of modern visual computing.


Read More

Extending Dignity and Respect to Security Officer Contracts

Virtually every company will have a statement of some kind extolling the senior leadership’s commitment to treating people with dignity and respect.
August 1, 2014

Another thing to consider is that cleaning crews and security officers generally have unfettered after-hours access in most companies and are doing their work when virtually no one from the company is around to oversee them.


Read More

Why America Needs a CSO

The loss of intellectual property due to theft by China costs the U.S. more than $300 billion annually and translated into 2.1 million fewer jobs in this country.
August 1, 2014

The office of U.S. Senator Tom Coburn of Oklahoma found that 25 percent of approved disability claims should have never been approved and another 20 percent are highly questionable.


Read More

WMATA Sued Over Criminal Background Check Policy

July 31, 2014

Nine plaintiffs filed a class-action lawsuit against the Washington Metropolitan Area Transit Authority aleging that WMATA's "comprehensive" criminal background check policy.


Read More

Gartner: 2015 Will See Development of Digital Risk Officer Role

July 15, 2014

More than half of Chief Executive Officers will have a senior digital leader role in their staff by the end of 2015. However, the duties of a Digital Risk Officer would be very different than a chief information security officer (CISO). 


Read More

ASIS Foundation Releases Security Performance Metrics Research Report

July 2, 2014

The ASIS Foundation has released a major metrics research report and security metrics tool.


Read More

Managing Risk Across the Enterprise

The key to the risk-based security program is that no matter what issue you examine, every one of them affects the reputation of the enterprise in one manner or another.
July 1, 2014

Once the risk matrix has been populated, management must then prioritize the risks and determine which are the most critical to the viability, survivability and resilience of the enterprise. When that prioritization has been completed, various functions within the organization can be tasked to design the appropriate solution for the risk involved.


Read More

Enterprise Benefits from the Security 500

The Security 500 Benchmark Program is your tool to enter your security-related data and receive a confidential and free benchmarking report.
July 1, 2014

New this year is that all participating enterprises have the option to be included in the Security 500 rankings numerically or to be listed alphabetically. We have made this change to allow those concerned with numerical rankings to be included and recognized among the best security leaders in the world.


Read More

Building Security's Brand for Better Buy-in

In a wired world that is also full of risk, an enterprise’s reputation can be destroyed in hours.
June 1, 2014

We share threat information throughout all areas of the organization, we coordinate response events, mitigating controls and we also report to our executive staff and regulatory group on incidents and events. My organization was formed to reduce reputational, financial, operational, and compliance related risks.”


Read More

Lessons Learned from Security 500 Palo Alto

How little opex can you spend and still get the job done
June 1, 2014

Perhaps the most valuable learning from this panel was that there is not and may never be a “one size fits all” solution for our industry. While there are many economic and operational advantages to a single provider, there are also some risks associated with this model.


Read More

IMAGE GALLERIES

Stanley Customer Appreciation Event at ASIS 2011

Customers enjoyed the annual Stanley customer appreciation event during ASIS 2011 in Orlando.

PRODUCTS

Security Convergence

Security Convergence

No Comments
$59.95
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. View
Effective Security Management

Effective Security Management

No Comments
$85.95
This latest edition of Effective Security Management retains the qualities that made the previous editions a standard of the profession: a readable, comprehensive guide to the planning, staffing, and operation of the security function within an organization. View
Risk Analysis and the Security Survey

Risk Analysis and the Security Survey

No Comments
$79.95
Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. View
book.jpg

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

No Comments
$60.00
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. View

EVENTS

Public-Private Partnerships: Creating a Resilient Community

9/12/13

AVAILABLE ON DEMAND Our presenter will talk about hazard and threat analysis, integrated planning, the importance of your business’ continuity to the community and how your organization can help with restoration and recovery.

Read More

Combatting Security Challenges of an Urban University

1/30/14
Online
Contact: Adam Thomas

Available On Demand Attendees of this webinar will learn about the framework for building Penn’s neighborhood initiative program, how to build and gain support from the community “beyond university walls” and unique ways to partner with local law enforcement.

Read More

How To Make Nothing Happen: Performing Self Assessments and Adjusting Security Strategies

6/17/14
Online!
Contact: Adam Thomas

On Demand With our panel of experts, this webinar will outline best practices for continuous improvement using self-assessment procedures that are a cost effective means to establish the status of your current program, identify weaknesses and set goals for improvement.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

August 2014

2014 August

In the August issue of Security Magazine, read about the public-private partnerships and the future of DHS with Frank Taylor, sneak a peek at the ASIS 2014 security products, and read a special report on cyber risk and security. Also in this issue find out why America is in desperate need of a CSO and the most common mistakes in Cyber incident response. The security game has dramatically changed since September 11th, read about what enterprises are doing to keep Americans safe and sound.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+