This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
The security industry’s calendar seems to revolve around a few key events: ISC West, ASIS International’s Global Security Exchange (GSX), ISC East… But have you ever considered how much effort goes into securing tradeshows and other large-scale events?
Go to any security conference and you’ll be quick to discover that getting “buy-in” and maintaining a “seat at the table” are still the predominant concerns among security leaders. After all, unlike other business units that bring in revenue directly, corporate security must show that it is not merely a cost center but a cost- (and sometimes a life-) saver.
Never before has cybersecurity presented such a complex challenge. IT infrastructures now consist of employee desktop PCs and Macs, servers and storage platforms, multiple private and public clouds, on-premises data centers, and hundreds to thousands of mobile devices and apps.
If an organization knows software patches have not been applied and takes no action to remedy the situation, they could be considered negligent and held liable, and suffer significant financial and public relations consequences.
A new survey found that 45 percent of cyber security professionals believe their board of directors have a major gap in their understanding of cyber risk, or simply don't understand the risk at all.
Supreme Court justices debated Monday how much leeway to grant airlines in reporting security threats that are eventually proven false, USA Today reports. The case involves Air Wisconsin Airlines, which argued that it deserves the same immunity from lawsuits as it granted the Transportation Security Administration, the article says. The airline had lost a $1.4 million defamation case after reporting that a pilot, William Hoeper, was “mentally unstable” and could be armed as a passenger on a flight after he failed a simulator test.
Businesses today face an ever growing array of threats to the security of their critical data and IT assets. From sophisticated cyber attacks to unintentional data exposure to environmental threats, the list of potential causes of harm is endless.
Workplace violence has grown into perhaps the most significant risk issue facing corporate security departments today. Security professionals have a unique contribution to make in helping the organization to meet its duty of care to anticipate, prevent, respond to and recover from workplace violence incidents. At the outset, corporate security needs to have a place at the strategic planning table.