Last month we asked the question, “What is security’s role in the enterprise?” It turns out the answer isn’t that simple. I’d like to follow that up with what seems to be an easy question.
How Hendricks Regional Health's Security Team Went from 99% Paper to 95% Paperless
January 25, 2019
When Steven Wagner joined Indiana-based Hendricks Regional Health, the department was run on 99-percent paper, with no electronic method of tracking security officers’ activity or sharing information across shifts except for a sporadically updated blog without a search function.
Measuring a return on investment (ROI) for security infrastructure is challenging. Most organizations primarily view security investments as a must-have capital expenditure. They know security systems are fundamentally necessary to protect people and assets and keep operations running smoothly. So while these technologies fulfill objectives and successfully help security teams prevent incidents, organizations oftentimes will ask: How can we truly quantify the value of a breach that never occurred?
Looking to implement the NIST Cybersecurity Framework in your organization this year? Take stock of your organization's current cyber maturity level and the path forward with these five steps.
At least 91 percent of U.S. government websites are failing to perform in at least one key security metric, according to a report from the Information Technology and Innovation Foundation.
Bringing hard science to an industry measured by soft skills and judgement leads to less subjectivity and more transparency in management, as well as overall improvement in your enterprise’s guard force.
More than half of respondents to a survey scored an “F” or “D” grade when evaluating their efforts to measure their cybersecurity investments and performance against best practices.
We all must stop running from the “elephant in the room” by implementing a real, effective tailgating prevention strategy. Combined with other analytical methods available today, this will allow security professionals to more effectively meet the challenges of our increasingly insecure world.
How can you measure your risk of unauthorized entry? Until now, it’s been virtually impossible. When it comes to security entrances, new analytics technologies (e.g. PSIM, IoT, etc.) are emerging, and it’s becoming possible to use technology, combined with people, to tap into security entrance metrics as part of an overall physical security strategy.