Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Talk Column

Security Talk

Cross-Sector Wisdom

In Security magazine’s monthly Solutions by Sector live webinar series, security leaders share leadership & strategic insights that hit across industries.

By Rachelle Blair-Frasier, Editor in Chief
Solutions by Sector live webinar series
Creative-Touch / DigitalVision Vectors via Getty Images
September 19, 2025

Today’s security leaders wear a lot of hats — from staying on top of emergency preparedness to tackling evolving cyber threats. Keeping up with best practices is no longer optional but essential for building strong, forward-thinking security programs. And while networking plays a big role, some of the best lessons come from hearing how others in the field are getting it done.

That’s where Security magazine’s Solutions by Sector webinar series comes in. Each month, top security executives from industries such as healthcare, K-12 education, retail, IT, and more share the leadership strategies and real-world insights they’ve learned on the job. No matter what sector you operate in, there’s something valuable here for professionals looking to level up their security program.

Check out below for a sneak peek into some of the latest webinars.

AI-Powered Security: Empowering Teams and Protecting Your Future

In this webinar, Pam Nigro – Vice President of Security/Security Officer at Medecision and ISACA Board Director – provided an insightful discussion covering AI-driven security strategies, ethical considerations, real-world applications, leadership alignment, and a vision for the future of security. She also discussed ways to bridge the gap between security initiatives and business goals by effectively communicating AI’s value to leadership.

“A bridge with leadership is important. You need to learn effective communication strategies and really be clear and concise,” Nigro said. “If you're not comfortable talking to people on a regular basis and getting up in front of people, especially leadership, get comfortable. A big part of your career is how you effectively communicate your security in your organization and making sure that you can communicate how having this AI aligns with the organization's security objectives, priorities and goals.”

Iconic and Secure: Security Lessons Learned at Georgetown University

In this Solutions by Sector webinar, Associate Vice-President for Public Safety and Chief Public Safety Officer at Georgetown University Jay Gruber highlighted the unique challenges his team faces when designing and implementing a security strategy for a historic campus environment and urban campus. He also talked about taking a holistic approach to building a security strategy, leveraging economy of scale, ways security leaders can integrate themselves in the building and capital planning process, and more.

“The most important thing is continuing to work closely with your capital projects group,” Gruber says. “I've explained that in several different ways, and it has paid dividends for me and keeping the campus safe in maintaining my budget, where I don't have to pay for a lot of these things, and they keep me informed on what's going on around campus well before most other people do.”

Boost Emergency Preparedness: Mastering Mass Notification in Healthcare

In today’s fast-paced healthcare environment, clear and timely communication can mean the difference between chaos and control during a crisis. Whether facing a natural disaster, medical emergency, or security threat, having a reliable Mass Notification System (MNS) is essential.

In this on-demand webinar where Todd Milne, Director of Security Services and Emergency Disaster Management, and Andrew Moull, Emergency and Disaster Management Manager at Hamilton Health Sciences, shared their firsthand experiences in selecting, implementing, and optimizing an MNS which helped improve safety and streamlined communication across healthcare facilities.

“If you can have an effectively deployed Mass Notification System, that can significantly improve your outcomes and improve the coordination of those responses, especially those larger ones that can get quite complex,” Moll says. “Obviously, before rolling out any large project, you always want to assess what your needs are and what the current gaps are.”

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected and it is important for security leaders to ensure their team is prepared to communicate clearly and effectively when it matters most.

In this webinar, Jason Stoddard, Director of School Safety and Security at Charles County Public Schools, shared strategies for managing internal and external communication during a crisis. He also highlighted how to establish a strong battle rhythm, build a responsive organizational structure, and lead with clarity under pressure.

“Make sure that you are thinking about everything and utilizing all of your talents, that includes your people, to make sure that you are looking at all the different things that are going on. We want to operate two, three and four steps ahead, not two, three and four steps behind or not be thinking about what's over the horizon. Understand that leaders aren't born in a crisis, but they definitely can die in crisis. Leaders don't just happen, and leadership doesn't just happen on the day of the event. If you are not a leader that means you're not rising to meet the challenge, and you will fall to your level of training. Leadership takes practice. Leadership takes trust. It takes the ability to influence people, which means that you have to have relationships with people.”

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo. In her recent webinar, Vice President of Security & Safety Operations Regina Lester talked about how this dynamic public environment leverages cutting-edge security technologies to protect people, animals and assets.

“We try to find a range of approaches tailored for different environments. For example, depending on what the environment is, where it's the animal environment will tailor our security approach differently there than where it's the guest experience environment. We're very close with our emergency services partners. We have developed collaborative relationships, and we coordinate with them frequently.”

Check out the Solutions by Sector webinar series — it's a great way for security pros to pick up practical leadership tips and take their programs to the next level. You can catch up on past sessions anytime on demand, or sign up for upcoming events right here. Don't miss out!

KEYWORDS: artificial intelligence (AI) crisis communications Emergency Preparedness leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • American flag

    Shifts in cybersecurity

    See More
  • Solutions by Sector live webinar series

    Learning from leaders across sectors

    See More
  • Michael Lashlee-Chief Security Officer-Mastercard

    Michael Lashlee — Serving Something Greater Than Yourself

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products

Events

View AllSubmit An Event
  • May 7, 2012

    AXIS Cross Line Detection

    AXIS Cross Line Detection is a trip-wire application that will increase system efficiency by reducing bandwidth and storage needs and facilitate search of recorded events.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing