Security Leadership and Management

Solutions for security executives to lead and manage their security staff, mitigate risk for their enterprise and show security's value in the C-suite.

ARTICLES

NCS4 to Offer CSSP Review Course

April 16, 2014

Interested in the Certified Sport Security Professional (CSSP) certification program, but not sure where to start studying for the exam? NCS4’s intensive review course covers the knowledge domains relevant to the exam while providing invaluable networking with Subject Matter Experts and peers in the field.


Read More

Boosting Cybersecurity Agility with Startups’ Innovation

April 15, 2014
Enterprise security professionals and risk officers today are faced with many daunting challenges.
Read More

Adding Value with Long-Term Integrator Partnerships

How can CSOs get the most out of their security systems integrator partnerships?
April 1, 2014

Find out how six enterprise security leaders are working with their long-term integrators to save money, reduce downtime and mitigate risk.


Read More

Measuring the Role of Risk Transfer in Cybersecurity Management

Recent events have catapulted cyber threats from a compartmentalized CISO responsibility to a boardroom discussion about director liability.
April 1, 2014

An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?


Read More

How to Keep Up with Emerging Technologies and Risks

consumers hundreds of billions of dollars annually. In the United States, credit card fraud resulting from cyber intrusions has skyrocketed.
April 1, 2014

Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.


Read More

How Incident Reporting Can Mitigate Threats

What reporting strategies should your enterprise adopt?
April 1, 2014

How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.


Read More

How to Leverage a GSOC for Unified International Security

Across one entire wall of the room are dozens of camera feeds.
March 1, 2014

Operators in the room are on their phones, either receiving or relaying information about security – physical and cyber-related events. Welcome to Exelon’s Security Operations Center (ESOC), with three entities: the ESOC, the Incident Command Center (ICC) and the Cyber Security Operations Center (CSOC).


Read More

Getting Realistic Results from Security Technology

As the security industry heads to the largest technology trade show in the world, ISC West in Las Vegas, it is a great time to do an inventory and reflect on your security technology investments and systems
March 1, 2014

There will be more than 1,000 exhibits at ISC West plus another 100 or so new technologies and solutions presented in hotel suites and meeting rooms off the show floor. Robust discussion about the movement toward IP, mobility and the cloud will buzz across the show floor, as it should.


Read More

Addressing Cyber and Physical Risks in Modern Utility Security

In early January, residents of Charleston, W. Va., found that their tap water had a licorice smell and a strong aftertaste, and it resulted in a number of people reporting a variety of ailments.
March 1, 2014

In early January, residents of Charleston, W. Va., found that their tap water had a licorice smell and a strong aftertaste, and it resulted in a number of people reporting a variety of ailments.


Read More

Preparing for Litigation with Good Documentation

Security planning, regardless of business sector, is a company’s best effort to provide a proactive system to protect property and lives.
March 1, 2014

Despite robust planning, a security director’s worst nightmare is a serious injury or death occurring on company property due to a violent criminal act.


Read More

IMAGE GALLERIES

Stanley Customer Appreciation Event at ASIS 2011

Customers enjoyed the annual Stanley customer appreciation event during ASIS 2011 in Orlando.

PRODUCTS

Security Convergence

Security Convergence

No Comments
$59.95
Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. View
Effective Security Management

Effective Security Management

No Comments
$85.95
This latest edition of Effective Security Management retains the qualities that made the previous editions a standard of the profession: a readable, comprehensive guide to the planning, staffing, and operation of the security function within an organization. View
Risk Analysis and the Security Survey

Risk Analysis and the Security Survey

No Comments
$79.95
Security and risk management are principally concerned with the protection and conservation of corporate assets and resources. View
book.jpg

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

No Comments
$60.00
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. View

EVENTS

Public-Private Partnerships: Creating a Resilient Community

9/12/13

AVAILABLE ON DEMAND Our presenter will talk about hazard and threat analysis, integrated planning, the importance of your business’ continuity to the community and how your organization can help with restoration and recovery.

Read More

Combatting Security Challenges of an Urban University

1/30/14
Online
Contact: Adam Thomas

Available On Demand Attendees of this webinar will learn about the framework for building Penn’s neighborhood initiative program, how to build and gain support from the community “beyond university walls” and unique ways to partner with local law enforcement.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

THE MAGAZINE

Security Magazine

April 2014

2014 April

In the April issue of Security magazine, read about integration partnerships and their growing success. The Boston Marathon bombing has changed the way integrators look at security for sporting events, see where they are one year after the tragic incident. Read about the 2014 RSA conference and this year's theme of "Threat Intelligence. Also, read about the latest products and news in the security industry.

Table Of Contents Subscribe

Background Checks

Who conducts background checks on new employees and contractors in your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13