Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » business continuity

Articles Tagged with ''business continuity''

network-data-cyber-security-freepik

Increased cybersecurity mandates coming for state and local governments

Matt Hodson
Matthew Hodson
June 11, 2021
The past year’s COVID-19 pandemic marked an unparalleled turning point that has completely changed the world as we know it. When businesses and organizations from many industries rushed to establish business continuity from home, hackers took full advantage of the remote work conditions that provided easy targets in unsecure environments. Although people are returning to the office and getting “back to normal,” the idea of evaluating the organization’s cybersecurity posture is becoming more prevalent.
Read More
COVID McCann Heroes
COVID-19 Heroes

Maximizing COVID-19 pandemic response at Armour College

Chief of Police and founder of Armour College, Richard McCann has been responsible for leading the college’s response to the widespread COVID-19 pandemic, immediately putting policies and medical screenings into place, acquiring personal protective equipment (PPE), and distributing medical information to staff and students on all campuses to ensure appropriate safety and health protocols at the college.
Maria Henriquez
June 7, 2021

Chief of Police and founder of Armour College, Richard McCann has been responsible for leading the college’s response to the widespread COVID-19 pandemic, immediately putting policies and medical screenings into place, acquiring personal protective equipment (PPE), and distributing Center of Disease (CDC), Occupational Safety and Health Administration (OSHA) and other relevant medical information to staff and students on all campuses to ensure appropriate safety and health protocols at the college.


Read More
COVID 19 Heroes State Street
COVID-19 Heroes

Maintaining critical functions and minimizing risk at State Street Corporation

The State Street Global Security Team quickly implemented protocols to ensure the security of all staff and maintain continuity of operations, including establishing travel protocols, exclusion protocols and visitor protocols, implementing temperature check stations, deploying credentials, and monitoring of government orders and restrictions.
Maria Henriquez
June 7, 2021

Since the onset of the COVID-19 pandemic, Managing Director and Chief Security Officer Stephen D. Baker, CPP, and his entire security function provided strategy and risk leadership with ongoing risk assessments and mitigation strategies at the State Street Corporation. This allowed the company to continue its global operations, placed workers at ease and supported State Street clients’ needs without disruption throughout the COVID-19 pandemic.


Read More
NFL GSOC COVID Heroes
COVID-19 Heroes

The NFL’s GSOC takes center stage in getting players back on the field

As the centralized place for intelligence and information, the NFL’s GSOC played a pivotal role in the League’s pandemic response, streamlining access and infection control, updating business continuity plans, and providing relevant data to enable all stakeholders to make informed decisions.
Maggie Shein
Maggie Shein
June 4, 2021

As a centralized place for intelligence and information, the NFL’s GSOC, led by Director of Intelligence Operations Robert Gummer, played a pivotal role in the League’s pandemic response, streamlining access and infection control, updating business continuity plans, and providing relevant data to enable all stakeholders to make informed decisions.


Read More
convergence freepik

When product security and cybersecurity converge: A CSO’s perspective on how security organizations can thrive

John Scimone
John Scimone
June 3, 2021
To more effectively reduce risk and capitalize on the capabilities, intelligence and experience of both the corporate application security team and the product security team, John Scimone, Dell Technologies Chief Security Officer, recommends converging these programs. Once converged, the security organization will see immediate benefits. Here, Scimone explores why organizations should converge these teams and the benefits.
Read More
5 mins with Natalie Kelly

5 minutes with Natalie Kelly, Visa's Senior Vice President and Global Head of Payment Ecosystem Risk

Maria Henriquez
June 3, 2021
Throughout the pandemic, the payments threat landscape was largely influenced by the ongoing COVID-19 pandemic. Cybercriminals continued to employ tried and true methods, such as phishing, payment account enumeration, eCommerce skimming, ransomware, among others to exploit many vulnerabilities during the pandemic, says Natalie Kelly, Visa’s SVP, Global Head of Payment Ecosystem Risk. Here, we talk to Kelly about the payments fraud ecosystem, her role at Visa, ensuring business continuity through the evolution of the payments threat landscape and more. 
Read More
hurricane season is here: be sure your enterprise is safe and secure

Prepare your organization for Atlantic hurricane season

June 2, 2021
Yesterday marked the first day of hurricane season for the Atlantic. Now's the time to reevaluate those business continuity plans.
Read More
cyber remote work

Majority of businesses still have remote working cybersecurity concerns one year into the pandemic

June 2, 2021

Despite being over a year into remote working and looking ahead to likely shifts to hybrid remote/in-office working models, four fifths (82%) of businesses still remain concerned about the security risks of employees working remotely. This is just one of the key insights from the 2021 Thales Global Data Threat Report which reveals that managing security risks is undoubtedly getting more challenging, with nearly half (47%) of businesses seeing an increase in the volume, severity, and/or scope of cyberattacks in the past 12 months.


Read More
SEC0621-Cover-FEAT-slide4_900px
Special Report

Walking the line: Navigating the insider threat

Determining the definition of insider risk to your organization is half the battle in mitigating the threat. The other half is more complicated, involving security culture, defined procedures and responses, and a little bit of technology.
Maggie Shein
Maggie Shein
June 1, 2021

Anyone with access to your organization — employee, contractor, former employee, etc. — poses a potential risk to the enterprise. So, what is insider threat; who should own an insider risk mitigation program within the enterprise; and most importantly, how can security leaders assess and mitigate the risk?


Read More
SEC0621-leadership-Feat-slide1_900px
Leadership & Management

Certifications and the security leader

Michael Gips
Michael Gips
June 1, 2021

Security professionals seeking to advance their careers often ask me whether certifications are worth it, and, if so, which ones they should pursue. The answer, of course, depends on the person and his or her goals. Plenty of people excel without a credential.


Read More
Previous 1 2 … 16 17 18 19 20 21 22 23 24 … 47 48 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing