Although not all events can be stopped, there are strategies to mitigate occurrences by identifying threats at organizations. Threat assessment should be used at the organizational level to identity behavior that could lead to violence.
The security industry’s calendar seems to revolve around a few key events: ISC West, ASIS International’s Global Security Exchange (GSX), ISC East… But have you ever considered how much effort goes into securing tradeshows and other large-scale events?
Go to any security conference and you’ll be quick to discover that getting “buy-in” and maintaining a “seat at the table” are still the predominant concerns among security leaders. After all, unlike other business units that bring in revenue directly, corporate security must show that it is not merely a cost center but a cost- (and sometimes a life-) saver.
Never before has cybersecurity presented such a complex challenge. IT infrastructures now consist of employee desktop PCs and Macs, servers and storage platforms, multiple private and public clouds, on-premises data centers, and hundreds to thousands of mobile devices and apps.
If an organization knows software patches have not been applied and takes no action to remedy the situation, they could be considered negligent and held liable, and suffer significant financial and public relations consequences.
A new survey found that 45 percent of cyber security professionals believe their board of directors have a major gap in their understanding of cyber risk, or simply don't understand the risk at all.
Supreme Court justices debated Monday how much leeway to grant airlines in reporting security threats that are eventually proven false, USA Today reports. The case involves Air Wisconsin Airlines, which argued that it deserves the same immunity from lawsuits as it granted the Transportation Security Administration, the article says. The airline had lost a $1.4 million defamation case after reporting that a pilot, William Hoeper, was “mentally unstable” and could be armed as a passenger on a flight after he failed a simulator test.
Businesses today face an ever growing array of threats to the security of their critical data and IT assets. From sophisticated cyber attacks to unintentional data exposure to environmental threats, the list of potential causes of harm is endless.