Security Education & Training

What pitfalls can complicate background checks? How can you build a better whistleblower program? Learn a different skill monthly with Education & Training.

ARTICLES

ASIS 2015 -- It's a Game-Changer

The ASIS International 61st Annual Seminar and Exhibits (ASIS 2015) is westward bound this year. Set for September 28 – October 1 at the Anaheim Convention Center, this year’s event is shaping up to be one no security management practitioner will want to miss. The event is anticipated to welcome more than 19,000 global security professionals from both the operational and cybersecurity disciplines for three days of education, technology and service exhibits, and networking.


Read More

Your Cyber Insurance Questions Answered

Although cyber insurance has been around for a few years now, since it is still a fairly new concept and the industry is expected to grow exponentially in the near future, companies may have questions. Lynda A. Bennett, Chair of Insurance Coverage Practice at the law firm of Lowenstein Sandler, LLP, in Roseland, New Jersey, spoke with Security about the ins and outs of cyber insurance. As an attorney specializing in these types of claims, Bennett represents enterprises, not insurers.


Read More

How Bullying Impacts the Risk of Violence in Your Enterprise

Bullying has become a hot topic in the last couple of years. Whether it’s because society has changed what qualifies as acceptable behavior in the workplace, on campus, and in schools or whether it’s because we are more aware of the negative psychological effects that bullying can have during all phases of life has not been determined. But the fact remains that we are becoming more cognizant of bullying and its effects on not only the target of the bullying, but also the bystanders who witness such behavior.


Read More

Saving Time and Lives with Direct-to-Responders Alarms

As school shootings continue to plague American communities, both large and small, school administrators and security experts need to look at the issue of minimizing risk from multiple angles. One of the most important issues is how to help or enable local law enforcement to respond as quickly as possible. This is the purpose of duress alarm systems, more commonly known as panic alarms.


Read More

International Fighters Flock to High-Risk Battlegrounds

The Syrian civil war has resulted in the deaths of 150,000 people, more than 500,000 injured and millions displaced internally and outside Syria.

Three U.S. naturalized citizens of Somali descent undertook suicide bombings in Somali on behalf of the Somali terror group al Shabaab. The concern is that U.S.-based individuals would fight in Syria, return to the United States, and participate in a terror attack on U.S. soil.


Read More

EVENTS

Sponsored Webinar

Transitioning from Public to Private Sector Retail Security

5/12/15
Online!
Contact: Adam Thomas
Transitioning from public to private sector retail security is often a concern of many military, federal agents, police officers as well as security or Criminal-Justice recent College graduates. Providing guidance, sharing ideas and discussing alternatives can help many public professionals to and ease and stress-free transition to private sector security related jobs. Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security May 2015 Issue cover

2015 May

In the May 2015 issue of Security, learn how to be the bridge between busieness and security with "customer facing," how to effectively work with your CFO, and covert security.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.