Security Leadership and Management

Solutions for security executives to lead and manage their security staff, mitigate risk for their enterprise and show security's value in the C-suite.

ARTICLES

How to Become a Customer-Facing Security Executive

In early April, Wall Street’s oversight committee announced that bank’s oversight of cybersecurity measures at outside firms it does business with remains a work in progress, at best. It cited a survey of 40 banks that found that only about a third require their outside vendors to notify them of any breach to their own networks, which could in turn compromise confidential information of the bank and its customers.


Read More

How to Work Effectively with Your CFO

All too easily, there can be a vast disconnect between security and finance. Chief financial officers are looking out for every penny, and security departments can be frequently written off as cost centers. However, there has been growing involvement and partnerships in both directions, with CSOs now successfully proving security’s value to the enterprise and CFOs championing security and cybersecurity initiatives to better mitigate enterprise risks.


Read More

What Makes a Great Security Leader?

What does leadership mean to you? We all have our own ideas about what it means to be a good leader. For example, some people think leadership means guiding others to complete a particular task, while others believe it means motivating the members of your team to be their best selves. But while the definitions may vary, the general sentiments remain the same: leaders are people who know how to achieve goals and inspire people along the way.


Read More

Security 500 Survey Now Open!

THE 10TH ANNUAL SECURITY 500 Survey is now available online at SecurityMagazine.com/Security500Survey. This annual benchmarking report is designed to give security executives a view of where they stand within their sectors as well as in the industry as a whole.


Read More

IMAGE GALLERIES

Stanley Customer Appreciation Event at ASIS 2011

Customers enjoyed the annual Stanley customer appreciation event during ASIS 2011 in Orlando.

PRODUCTS

Effective Security Management, 5th Edition.jpg

Effective Security Management, 5th Edition

No Comments
$73.95

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

View
Risk Analysis.jpg

Risk Analysis and the Security Survey, 4th Edition

No Comments
$69.95

 As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey.  

View
book.jpg

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

No Comments
$60.00
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. View

EVENTS

Webinar

How To Make Nothing Happen: Performing Self Assessments and Adjusting Security Strategies

6/17/14
Online!
Contact: Adam Thomas

On Demand With our panel of experts, this webinar will outline best practices for continuous improvement using self-assessment procedures that are a cost effective means to establish the status of your current program, identify weaknesses and set goals for improvement.

Read More

Webinar

A Major Intelligence Failure by the U.S. Government: How It Impacts Enterprise Security

9/16/14
Online
Contact: Adam Thomas

On Demand The Intelligence Community (IC) has ignored blatant attacks on American business for at least the past 30 years. In 1995 the Intelligence Policy Board included "Industry" as a ?legitimate consumer of intelligence. The? IC's response was to state that Industry is not their "Customer". What is behind the IC's refusal to support the very economic base that they depend on for funding?

Read More

Sponsored Webinar

Zero incidents vs. Zero tolerance: Achieving a violence free environment through verbal de-escalation, optimum customer service and intuition

11/13/14
Online!
Contact: Adam Thomas
ON-DEMAND: The premise of workplace violence is that almost all incidents are preventable. The “Zero incidents” theory prioritizes the art and science of prevention. “Zero tolerance” is reactionary and after the fact. With “zero incidents” we mitigate and hopefully eliminate the need to respond. A safe, therapeutic “zero incidents” environment is achieved by developing the verbal de-escalation customer service and intuitional skills of staff.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.