- Arenas/Stadiums/Leagues /Entertainment
- Construction, Real Estate, Property Management
- Critical Infrastructure: Electric, Gas, Water
- Education: K-12
- Education: University
- Government: Federal, State and Local
- Hospitality & Casinos
- Hospitals & Medical Centers
- Ports: Sea, Land & Air
- Retail/Restaurants/Convenience Stores
- Transportation/Supply Chain/Warehousing
There will be more than 1,000 exhibits at ISC West plus another 100 or so new technologies and solutions presented in hotel suites and meeting rooms off the show floor. Robust discussion about the movement toward IP, mobility and the cloud will buzz across the show floor, as it should.
Well, if Google has a similar impact on guard services as it has had on business publications, like mine, look out Securitas, G4S, AlliedBarton, et al… or get on board with robots functioning as security officers.
At the core of risk and resilience planning is the ability to gather intelligence and create situational awareness.
Leveraging metrics and statistics can lead to a stronger security program, just as they led to a better baseball team for the Oakland Athletics in “Moneyball.” So how can these metrics protect your enterprise from a Risk-Nado?
More and more, security is focusing its value proposition on a service culture. While this topic has been raised by many CSOs in recent years, the volume and frequency of the subject reached a peak recently and deserves some attention.
Black Hat, by its name, seems ominous. What was once a conclave of hackers in 1997 has become a fast-growing global conference series focused on the business of cyber security and includes technical presentations on vulnerabilities and solutions.
To get a 20,000-foot CEO view of global risk, the Lloyd’s Risk Index provides a good lens. This year’s global survey polled 588 C-Suite and board level executives from both larger and smaller businesses (mostly smaller) and included a broad, global participation base.
During the past decade, enterprise resilience has become a hot topic. Its meaning has grown from the original “business continuity and disaster recovery” moniker associated with IT data crashes.
Physical and logical identity and access control is the most frequent convergence point in enterprises.
The Global Security Operations Center is not new, but its value is becoming widely recognized as a necessity to support business goals and operations.