Napco Security Technologies’ School Security/S.A.V.I. White Paper brings together findings from a variety of general and school security experts from across the U.S. in an objective way, devoid of brands and sales pitches.
From 1971-2012, there have been more than 120 school shootings, and 279 people have lost their lives in those shootings, including students, administrators, teachers and staff. K-12 schools accounted for 82 of those school shootings.
The International Association for Continuing Education and Training (IACET) has awarded BNP Media the prestigious Authorized Provider accreditation. IACET Authorized Providers are the only organizations approved to offer IACET Continuing Education Units (CEUs). The accreditation period extends for five years, and includes all programs offered or created during that time.
The next national security crisis may be a lack of ability to mitigate or respond to such an attack because frankly, there’s no one available to mitigate the attack or respond to it.
The battle means that companies might be in danger of losing simply because they lack the manpower to deal with it. The battle means that companies looking for more security staff aren’t going to find them – they’re going to have to create them.
The latest buzzword these days is “Resiliency,” which for all intents and purposes is really nothing more than a new term for business continuity planning (BCP) in the private sector and continuity of operations planning (COP) in the public sector.
Probably the most important first step an organization should take in developing their BCP/COP program is to conduct an inventory of all of the enterprise’s processes, assets and resources (PAR). No one has the time or resources to boil the ocean, so once the inventory has been completed, the next step involves prioritizing the PAR list from the most critical to the least important.
There are a wide range of available metrics, meaningful standards, licenses and certifications, rigor, ongoing debates and controversies, critical thinking and creativity. Snake oil, product hype, misleading claims and charlatanism, while unavoidably present, tend to get weeded out fairly reliably. Committees, groupthink and linear/concrete thinkers don’t dominate the field.
You’ve spent hours and dollars on employee education for phishing and other email-related threats, but how can you be sure that the teaching has taken root?
How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.
A strong security infrastructure doesn’t always start with the technology, it starts with the blueprints – by working with architects and designers, security teams can build the best security plans before the bricks are even laid.
CEOs are focused on growth and performance, and successful security leaders need to focus on supporting and enabling organizational goals.
March 1, 2014
CEOs are focused on growth and performance, and successful security leaders need to focus on supporting and enabling organizational goals. Security needs to be involved in overall organizational performance and avoid being viewed as a narrow, technical function.