There was a time when the corporate security team was responsible for setting the policies for overall security within an organization including digital. Today, those responsibilities are likely to be separated between a Chief Security Officer (CSO) and a Chief Information Security Officer (CISO). This brings into play the views, opinions, needs and requirements of both the CSO and the CISO and the potential conflict that may ensue.
The threats that face the United States today are the same threats that we faced on 9/11,” says Michael McGarrity, Assistant Director for the Counterterrorism Division of the FBI.
Successful strategists in the security arena face the same kind of tactical issues as football coaches. Attackers are skillful, resourceful and motivated success. Football coaches can’t deploy a “one-size-fits-all” strategy, and neither can security leaders. On a macro level, this is called “Risk-Based Security.”
In July’s column, I provided an overview of the concept of personal branding and why it is relevant to security professionals looking to further both their reputation and marketability. This month I want to expand on the topic by addressing specific steps you can take to better identify your individual brand.
Hundreds of sports security professionals met last week in Louisville, Kentucky, for the 9th Annual NCS4 Conference, where they tested new technology, networked, discussed situational awareness techniques and honored industry professionals who go above and beyond to ensure their venues and events stay safe.
As business leaders become increasingly conscious of the impact cybersecurity can have on business outcomes, they should harness increased support and take advantage of six emerging trends to improve their enterprise’s resilience and elevate their own standing.