Security Leadership and Management

Solutions for security executives to lead and manage their security staff, mitigate risk for their enterprise and show security's value in the C-suite.

ARTICLES

Security 500 Survey Now Open!

THE 10TH ANNUAL SECURITY 500 Survey is now available online at SecurityMagazine.com/Security500Survey. This annual benchmarking report is designed to give security executives a view of where they stand within their sectors as well as in the industry as a whole.


Read More

Does Pre-Employment Vetting Bring an Enterprise More Value or Liability?

Does your organization have an active program that conducts reference checking on employees before they are hired? Ownership of the pre-employment vetting process does not often reside with the security function within the organization. Some companies outsource background checks to third party organizations to share the task. Many of these policies are impacted by legislation, and limitations can be imposed on the use of various vetting methods.


Read More

Profile in Excellence: Mentorships to Move You Forward

To transition from one career or one field to another, you have to learn how to turn your hat, how to redirect your previous experiences and lessons-learned to new goals,” says David LaRose, the Director of Safety, Security and Emergency Management for Lakeland Regional Health in Lakeland, Florida. LaRose is also the 2015 President of the International Association for Healthcare Security & Safety (IAHSS) Board of Directors.


Read More

The Security Enterprise and Integrator Game Plan

Walk through the show floor at ISC West in Las Vegas next month and you’ll see hundreds of security products peddled by vendors wanting to sell you the “latest and greatest” in security technology. But sometimes, you don’t need technology as much as you need someone to sit down with you and have a frank and honest conversation about what you should or should not install in your enterprise. Then you can talk technology, right? Of course, it all depends upon your situation, your environment and the risks that you are trying to mitigate, but who wants to be sold something that they don’t need or can’t use?


Read More

IMAGE GALLERIES

Stanley Customer Appreciation Event at ASIS 2011

Customers enjoyed the annual Stanley customer appreciation event during ASIS 2011 in Orlando.

PRODUCTS

Effective Security Management, 5th Edition.jpg

Effective Security Management, 5th Edition

No Comments
$73.95

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

View
Risk Analysis.jpg

Risk Analysis and the Security Survey, 4th Edition

No Comments
$69.95

 As there is a need for careful analysis in a world where threats are growing more complex and serious, you need the tools to ensure that sensible methods are employed and correlated directly to risk. Counter threats such as terrorism, fraud, natural disasters, and information theft with the Fourth Edition of Risk Analysis and the Security Survey.  

View
book.jpg

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

No Comments
$60.00
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. View

EVENTS

Webinar

How To Make Nothing Happen: Performing Self Assessments and Adjusting Security Strategies

6/17/14
Online!
Contact: Adam Thomas

On Demand With our panel of experts, this webinar will outline best practices for continuous improvement using self-assessment procedures that are a cost effective means to establish the status of your current program, identify weaknesses and set goals for improvement.

Read More

Webinar

A Major Intelligence Failure by the U.S. Government: How It Impacts Enterprise Security

9/16/14
Online
Contact: Adam Thomas

On Demand The Intelligence Community (IC) has ignored blatant attacks on American business for at least the past 30 years. In 1995 the Intelligence Policy Board included "Industry" as a ?legitimate consumer of intelligence. The? IC's response was to state that Industry is not their "Customer". What is behind the IC's refusal to support the very economic base that they depend on for funding?

Read More

Sponsored Webinar

Zero incidents vs. Zero tolerance: Achieving a violence free environment through verbal de-escalation, optimum customer service and intuition

11/13/14
Online!
Contact: Adam Thomas
ON-DEMAND: The premise of workplace violence is that almost all incidents are preventable. The “Zero incidents” theory prioritizes the art and science of prevention. “Zero tolerance” is reactionary and after the fact. With “zero incidents” we mitigate and hopefully eliminate the need to respond. A safe, therapeutic “zero incidents” environment is achieved by developing the verbal de-escalation customer service and intuitional skills of staff.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

April 2015 security magazine cover

2015 April

In this April 2015 issue of Security, find out how to keep your enterprise resilient after a disaster in 2015. Also discover how to strike a balance between design basis threats and active shooter threats and see what's in store for the 2015 RSA Conference.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.