As enterprises expand across the globe, so do the responsibilities of a security executive. Industry experts weigh in on wide-ranging issues from international investigations to supply chain resilience and more.
Security Integrators are a necessary link between security product manufacturers and enterprise security leaders. In this regular column, we ask leading security integrators what trends they’re seeing on the horizon, and how security enterprise leaders can be prepared.
Focusing on critical issues facing security leaders, security industry stalwart Lynn Mattice shares solutions to the quandaries today’s CSOs must address, such as gaining buy-in, budgetary challenges, talent acquisition and security risk management.
There have been volumes written about the role of the CSO and how to gain a seat at the table in the C-suite. A relatively small number of CSOs have been able to convince their management that the CISO should be under their purview, citing the inherent mission conflicts that exist when the CISO reports to the CIO.
Analyzing the background of security leaders across the corporate security and risk management landscape, it is not surprising to see that a significant percentage of them have come from the public sector.
Mike Tyson notably said, “Everyone has a plan ‘till they get punched in the mouth.” So, how do you ensure the same doesn’t hold true for your company’s incident response plan when a real breach occurs? Enter the NIST Framework category titled Mitigation.
After receiving the funding to develop several security projects to update or replace systems and components, including upgrading more than 3,000 cameras to IP, across more than 100 facilities that Security Director Kirk Simmons is responsible for securing in Hennepin County, MN, Simmons and his team found themselves in a predicament: navigating the county’s IT department processes for project development, as most systems depend on the IT network and servers for which the Hennepin County IT team has responsibility.
Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!