Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementSecurity Talk ColumnSecurity Leadership and ManagementSecurity & Business Resilience

Security Talk

A year of Security

From security leaders to strategic insights: a look back through a year of Security magazine.

By Rachelle Blair-Frasier, Editor in Chief
Digital fingerprint

Iaremenko / iStock / Getty Images Plus via Getty Images

December 13, 2024

As another year comes to a close, we’re taking a look back at the last 12 months of Security magazine. Looking back over the past year it is clear that the security landscape is one that is ever-evolving marked by emerging threats, technological advancements, and shifts in regulations and standards.

Throughout the pages of Security magazine this year, security leaders have shared their valuable insights, best practices, and lessons learned. Here we revisit the Special Report feature from each issue:

The Salary of a Chief Security Officer – January

As security hiring trends evolve, it can be difficult to ascertain the average salary of a chief security officer, even when these metrics are helpful tools for increasing employee retention and job satisfaction.

The Foushée Group, a leading compensation research company has produced the Security & Compliance Compensation Survey annually for the last 22 years. The survey is designed to provide accurate and timely compensation information on 78 security and compliance positions to companies whom seek to market price their positions to the national market. The 22nd annual Security and Compliance Compensation report gave industry professionals insight into what their peers are earning.

Be sure to check out the 23rd annual report in the January issue of Security magazine.


The Value-Add of Security Metrics – February

Enterprise security functions that collect and analyze data can identify trends to improve their teams and prove the value of security within the organization. From tracking workplace violence incidents to facility access patterns, enterprise security teams use data to forge relationships across the business and evaluate their own successes and improvements.

In this article, we explore how four enterprise security functions have embraced data to improve operational efficiency, enterprise-wide communication and security buy-in from organizational leadership.


Top Cybersecurity Leaders 2024 – March

The fourth annual Top Cybersecurity Leaders program, which recognizes enterprise information security executives and professionals and their industry accomplishments highlights the wide range of cybersecurity professionals making a difference across the field and in their organizations. Our 2024 awardees lead by example and improve security through innovative approaches to risk and technology.

The goal of the Top Cybersecurity Leaders program is to spotlight cybersecurity professionals who are making a difference in their organization and/or in the industry as a whole, and this year’s nominees didn’t disappoint. Our editorial staff was blown away by the caliber of this year’s nominations. We received an overwhelming number of nominees with years of experience, industry impact and cybersecurity leadership.

Be on the lookout for the 2025 Top Cybersecurity Leaders in March.


Ensuring Safety and Success: The Critical Role of Event Security – April

Guests attending a sporting event or concert are there to enjoy themselves and get lost in the rhythm of the music or rooting for their favorite team. For them, security often doesn’t even cross their mind. However, for security professionals at the thousands of venues across the country, maintaining a comprehensive and effective security strategy is always top of mind.

Big or small, the same principals apply. Ensuring the operation and security of an event center requires teamwork among all stakeholders, including the leadership team, operations, guest services and others.

In this article, Vice President of Security at AMB Sports and Entertainment Joe Coomer shares an inside look at building an effective security strategy.


The Power of Partnerships – May

In this article, security leaders discuss how collaborative partnerships enhance security and business operations. Throughout the day to day operations of a business or organization, it can be easy for different departments to work independently; however, when it comes to developing an effective security strategy, working cooperatively is indispensable. Whether it is collaborating with other departments or with outside organizations, building and maintaining partnerships is mission critical.


Safeguarding Healthcare Facilities – June

In the world of healthcare security, the threats are ever-evolving with hospitals and healthcare facilities facing a unique set of challenges that demand innovative solutions and dedicated leadership. From safeguarding patient privacy to defending against physical threats, the importance of a robust security strategy in a healthcare environment is paramount.

In this article, security leaders discuss navigating security challenges at hospitals and healthcare facilities.


2024 Women in Security – July

This year, we celebrated nine extraordinary Women in Security who have shaped their organizations, the security field and the lives of their communities in numerous ways for the 2024 Women in Security program. Each year we are honored and humbled by the number of security leaders who are accomplishing great things within their organizations and the greater security industry as a whole.

Here, we attempt to give our readers a peek into the professional journeys, challenges, perspectives and accomplishments of a few of the women who continue to impact their organizations, their specialties, the security industry and the future generation of security leaders in a positive way.

Nominations for the 2025 Women in Security program opens in December.


Mentorship Advances Security Careers – August

What are the most important qualities, skills or experiences to seek when looking to advance a career in security? When asking security leaders this question, the responses are endless.

Curiosity is a common answer. “Stay thirsty,” says Jordan Avnaim, Chief Information Security Officer at Entrust. “Ask questions, listen, and learn from others’ experiences. Be daring. Safely experiment and be comfortable making mistakes.”

The ability to constantly learn and ask questions is another. In a world of frequently emerging threats, knowing when to ask questions is a valuable skill to acquire.


2024 Most Influential People in Security – September

For over a decade, Security magazine has been recognizing the Most Influential People in Security with an aim to recognize some of the security executives, industry experts and professionals effecting change, influencing their organizations, and making a difference each and every day in the complex, ever-changing world of security and risk management.

These professionals, executives and leaders have been nominated by their colleagues or peers and were chosen based upon the distinctive stamp that each individual has had within the security landscape.

In September, we offered a glimpse into nine of those influencers’ backgrounds, careers and accomplishments with this year’s 2024 Most Influential People in Security. Read on to learn more about each of these impactful security leaders.

If there is someone you know who has had an impact on the industry and should be recognized, be sure to fill out a nomination form. Most Influential People in Security nominations will open in March 2025.


How to Build an Effective Security Team – October

Acquiring the right assets is essential to developing a proper security posture. There are many assets that could benefit an organization, but there is one asset in particular that is of great priority and value across the board: the security team.

An efficient security team is a key pillar to any organization’s security posture. As exciting as the newest security technology may be, it is only as effective as the team that deploys it. By constructing an organized, cooperative team, security leaders can lay the foundation their organization’s defense is built upon.


2024 Security Benchmark Report – November

Each November, we release the Security Benchmark Report an editorial initiative that collects self-reported data from enterprise security programs across the globe and a wide range of market sectors to determine trends in security roles, responsibilities, technology, training and budget.

Each year we release the report, we aim to build a wider picture of how enterprise security programs change, grow and mature year-over-year. If you haven’t already, but sure to check out this year’s report and see how things have evolved over 2023.

KEYWORDS: organizational resilience security leadership Security magazine

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Mental Health Awareness

    Guarding the guardians: Importance of mental health for security personnel

    See More
  • Digital dollar concepts

    Emerging Cyber Threats in a Rapidly Evolving Landscape

    See More
  • Event Security

    Ensuring safety and success: The critical role of event security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!