Security Leadership and Management

Solutions for security executives to lead and manage their security staff, mitigate risk for their enterprise and show security's value in the C-suite.

ARTICLES

Securing the Future of Cannabis

In June 2014, Sy Alli made a career move that was controversial, daring and, in his opinion, potentially ruining to his future prospects: He became the first director of corporate security for a marijuana-based enterprise: Dixie Brands, Inc. 


Read More

2013: Highest Rate of Employee Theft in 6 Years

 "2013 was a gangbuster year for embezzlement in the United States, exceeding even 2012’s previous record pace,” says Christopher T. Marquet, author of The 2013 Marquet Report on Embezzlement, released in December 2014. “What is remarkable is depth, magnitude and frequency of employee theft in the U.S. economy. Vermont topped the list of highest embezzlement risk states in the nation for the third time in six years.”  


Read More

Security Succession Planning for CSOs

You have been with your current organization for more than 10 years leading the corporate security function, having conceived and built the program, hired staff around the world and integrated the department to being a trusted advisor to senior management. Since this is your second career, you are now reaching a point that you would like to retire and pursue other passions and personal interests. After sitting down and discussing this with your boss, you realize that he or she and the management team are concerned about the lack of a succession plan for your replacement. Their position is: While your second level staff is very good operationally, they are not under serious consideration for your role, and HR will be looking outside the company for your replacement.


Read More

Woman Files Suit Against FSU After Sexual Harassment Claims

The woman who accused Florida State quarterback Jameis Winston of sexual assault has filed a civil suit against the university’s board of trustees.The suit claims FSU had knowledge of her alleged sexual harassment and discrimination by Winston, and that it created a hostile educational environment for her.


Read More

IMAGE GALLERIES

Stanley Customer Appreciation Event at ASIS 2011

Customers enjoyed the annual Stanley customer appreciation event during ASIS 2011 in Orlando.

PRODUCTS

Effective Security Management, 5th Edition.jpg

Effective Security Management, 5th Edition

No Comments
$73.95

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

View
Risk Analysis.jpg

Risk Analysis and the Security Survey, 4th Edition

No Comments
$69.95

 As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey.  

View
book.jpg

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

No Comments
$60.00
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. View

EVENTS

Webinar

How To Make Nothing Happen: Performing Self Assessments and Adjusting Security Strategies

6/17/14
Online!
Contact: Adam Thomas

On Demand With our panel of experts, this webinar will outline best practices for continuous improvement using self-assessment procedures that are a cost effective means to establish the status of your current program, identify weaknesses and set goals for improvement.

Read More

Webinar

A Major Intelligence Failure by the U.S. Government: How It Impacts Enterprise Security

9/16/14
Online
Contact: Adam Thomas

On Demand The Intelligence Community (IC) has ignored blatant attacks on American business for at least the past 30 years. In 1995 the Intelligence Policy Board included "Industry" as a ?legitimate consumer of intelligence. The? IC's response was to state that Industry is not their "Customer". What is behind the IC's refusal to support the very economic base that they depend on for funding?

Read More

Sponsored Webinar

Zero incidents vs. Zero tolerance: Achieving a violence free environment through verbal de-escalation, optimum customer service and intuition

11/13/14
Online!
Contact: Adam Thomas
ON-DEMAND: The premise of workplace violence is that almost all incidents are preventable. The “Zero incidents” theory prioritizes the art and science of prevention. “Zero tolerance” is reactionary and after the fact. With “zero incidents” we mitigate and hopefully eliminate the need to respond. A safe, therapeutic “zero incidents” environment is achieved by developing the verbal de-escalation customer service and intuitional skills of staff.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine February 2015 issue cover

2015 February

In the February 2015 issue of Security Magazine, see what other companies have learned from the massive data breach and what they are doing in the now and in the future. Also, what could adding thermal cameras to your operation do for you? and Mohegan Sun at Pocono Downs prepares for the future with security decisions.
Table Of Contents Subscribe

Tougher Cybersecurity Legislation

On January 20, President Barack Obama called for tougher cybersecurity legislation in his 2015 State of the Union address. Which of the following points do you feel is most needed today?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.