Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalThe Security Benchmark ReportSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical SecurityTop Cybersecurity Leaders

The top stories of 2021

Security magazine Top Stories of 2021
December 28, 2021

The Security editorial team highlights their favorite articles released in 2021. An ever-shifting industry, this year's top articles covered themes from finding and retaining security talent and mitigating mis- and disinformation to fostering meaningful, long-term community values of diversity and inclusion in security.

As we enter 2022, review the lessons security professionals learned in the past year and incorporate them into today's security strategies.

  1. Security Leadership: 2021 Women in Security: The women that make up the security industry are an exceptional group. This year, Security magazine chose 13 enterprise security leaders to give you a glimpse into the backgrounds, challenges, perspectives and accomplishments of a few of the women that continue to change the security industry.
  2. The 2021 Security Benchmark Report: Budgets, Roles, Trends and Leadership Among All Sectors: The 2021 Security Benchmark Report aims to allow security programs to measure security teams and organizations versus their peers, both among the industry as a whole, as well as among individual sectors. The report tracks security budgets, roles, responsibilities, security titles, training, technology spends and much more.
  3. Finding, Retaining and Developing Top-Quality Security Talent: Hear Jeff Hauk, Director of Public Safety at Memorial Healthcare talk about challenges with staffing, retaining and training top-quality security talent in this on-demand webinar. A timely topic affecting all security professionals in all sectors, Hauk discusses the importance of hiring for attitude over skills, as well as inspiring rather than motivating security staff in this valuable presentation.
  4. Countering Disinformation: An Essential New Role for CSOs: Adversarial social media activity ranked as the fifth most significant threat to organizations in Kroll’s Global Fraud and Risk Report 2019-2020, tied with internal fraud and coming in above IP theft, counterfeiting and corruption. As disinformation persists, security leaders, risk management professionals and corporations must address these deceptions in more informed and systematic way. But first they need to recognize, acknowledge and heed the once benign marketplace ‘chatter.’
  5. Creating a Diverse and Inclusive Workplace Within Security: Many successful companies regard diversity and inclusion as a competitive advantage and an enabler of growth with research backing this up — the Delivering through Diversity study, for example, found that gender diverse organizations are 24% more likely to financially outperform less diverse companies, while 33% of ethnically diverse companies are likely to do so. Here’s how to begin implementing strategies for a more diverse workforce.
  6. Enterprise Security: Positioning Your Team as a Value Add, Not a Cost Center: Follow these four direct strategies to help you and your security team transition from being seen as a “cost center” to becoming a value-add to the organization’s bottom line.
  7. Cyber-Physical Security in an Interconnected World: Recognizing 2021’s National Critical Infrastructure Security and Resilience Month, Security partnered with stakeholders from the public and private sectors to share best practices to prevent and mitigate the consequences of a major security attack on the nation’s critical infrastructure. Here, David Mussington, Executive Assistant Director for ISD at CISA, explores how to strengthen the security of our global digital infrastructure and how CISA is committed to collaborating with partners in the private sector to unify our collective defense. View the special report here.
  8. The First 90 Days of a Chief Security Officer: New Chief Security Officers who approach the role with a strong focus on understanding organizational culture for the first 90 days are likely to enjoy success. Here, CSOs provide advice on how to start off on the right foot.
  9. The 2021 Top Cybersecurity Leaders: This year, Security was honored to partner with (ISC)², the world’s leading cybersecurity professional organization, to find enterprise information security executives who are changing the cybersecurity landscape for the better. We selected 12 cybersecurity leaders and highlighted their backgrounds, accomplishments, how they have built up security programs and more.
  10. Recognize. Respond. Survive. A New Approach to Workplace Violence Prevention: With all the stress and division in our country currently, there has never been a better time to evaluate your organization’s readiness. Does your current training prepare every employee to recognize early warning signs so you can prevent future attacks; are the response options proven; and have you taken reasonable steps to increase the survival odds for each employee?
  11. Operational Resilience in a Hyperconnected World: Operational resilience is the new imperative for sustaining business operations. Listen to Microsoft’s Edna Conway, Chief Security and Risk Officer of Azure, provide a real-world, tangible approach to address security and resilience to support you in your journey to operational resilience.
  12. Centralized Supply Chain Security Programs Yield Efficiency: Finding efficiencies in supply chain security is as simple as enveloping more of your supply chain. Kirsten Provence has led Boeing’s supply chain security program for nearly a decade; here, she explains what has propelled efficiency gains by scaling the program using subsidiaries.
  13. Top De-escalation Strategies and Training for Security Leaders: De-escalation is a key frontline security in a range of situations, from hospitals to retail settings to office environments. Many sectors, such as travel and airlines, healthcare facilities, retail and more, have seen an increase in agitated behavior in recent years, some spawned from tensions rising regarding mask mandates and COVID-19 protocols. Here, we take a look at de-escalation strategies and training that security leaders can implement within their organizations to keep security, staff and visitors safe.
  14. Hiring for Personality: When it comes to completing your security team, hiring the right employees will lead you, your team and your organization to greater success, but finding, recruiting and retaining top security talent may be easier said than done.
Not already receiving the Security eMagazine each month? Click here to have it delivered directly to your inbox.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.
KEYWORDS: Chief Information Security Officer (CISO) Chief Security Officer (CSO) cyber and physical convergence de-escalation training diversity in security operational resilience supply chain management top stories Women in Security workplace violence prevention

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Top stories of 2020

    The top stories of 2020

    See More
  • security-cyber-leadership.jpg

    Top 12 physical security, cybersecurity & risk management stories of 2022

    See More
  • SEC_Web_Top10_databreaches-1170x658.jpg

    The top data breaches of 2021

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing