Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » security risk management

Articles Tagged with ''security risk management''

SEC0818-talk-feat-slide1_900px

Active Shooter: What’s Your Plan of Action?

diane-2016-200.jpg
Diane Ritchey
August 1, 2018

On June 28, Wendi Winters lost her life when a man shot her and some of her colleagues in the Capital Gazette newspaper office.

Yet, Winters is being hailed as a hero, according to some who witnessed and survived the shooting, because Winters reportedly fought the gunman, and “charged forward holding a trash can and recycling bin,” reported the Capital Gazette.


Read More
leaders_enews

The Importance of Communication for Security

Edward Monan
July 31, 2018
Dedicating some portion of communications personnel time to the security team can drive global awareness of programs and initiatives critical to the safety of the organization, thereby increasing programmatic success.
Read More
evidence_enews

How to Get in the Digital Evidence Fast Lane

How new digital evidence management systems are helping organizations speed up investigations and cut costs
Erick Ceresato
July 31, 2018
Many incidents today are captured on video. That’s because there is an increasing number of surveillance devices, cellphones and body cameras collecting information. There’s no denying that this video technology is extremely beneficial to organizations that need to solve a crime, identify a suspect or disprove a liability claim. However, with so much evidence available, the process of collecting, managing and sharing video during an investigation has become very expensive and time-consuming.
Read More
school-enews

How Security Professionals Can Help Create Positive School Memories

How Safety Measures Can Define a Generation
James Marcella
July 17, 2018
If we want today’s children to look back on their school days as more than just a time of “Run, Hide, Fight” training, lockdowns and lectures on the potential dangers of online behavior, school systems need to institute security measure that will create safer learning environments without making schools feel like prisons.
Read More
entrance-enews

How to Formulate a Holistic Approach for Effective Entrance Planning

Tracie Thomas
July 17, 2018
Traditionally, security personnel begin with their building’s main entrances when planning to secure their facility. While that is an effective start, it is important to consider the entire facility or campus to ensure that all areas are protected.
Read More
Panda restaurant outside

Panda Restaurants Adds Business Intelligence Technology to 1,960 Stores

Panda Restaurant Group Improves Company-Wide Store Operations with 3xLOGIC VIGIL Trends Business Intelligence Software
July 12, 2018

3xLOGIC, Inc., a leading provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500™ winner, today announced that Panda Restaurant Group, Inc. (parent of Panda Express, Panda Inn and Hibachi-San) has completed deployment of 3xLOGIC’s VIGIL Trends Business Intelligence software to all of its North American locations.


Read More
leadership

Gartner: Top Six Security and Risk Management Trends

July 9, 2018

As business leaders become increasingly conscious of the impact cybersecurity can have on business outcomes, they should harness increased support and take advantage of six emerging trends to improve their enterprise’s resilience and elevate their own standing.


Read More
SEC0718-edu-feat-slide1_900px

How Intelligence Analysis Can Drive Corporate ROI

Daniil Davydoff
Daniil Davydoff
July 1, 2018

Go to any security conference and you’ll be quick to discover that getting “buy-in” and maintaining a “seat at the table” are still the predominant concerns among security leaders. After all, unlike other business units that bring in revenue directly, corporate security must show that it is not merely a cost center but a cost- (and sometimes a life-) saver.


Read More
Cyber Tactics - july 2018

Managing Supply Chain Risk

Chabinsky-2016-200px.jpg
Steven Chabinsky
July 1, 2018

When NIST recently updated its Cybersecurity Framework, it added only one new core category: Supply Chain Risk Management (SCRM). Placed within the Framework’s “Identify” function, SCRM encompasses, but typically extends beyond, traditional vendor management approaches. That’s because the supply chain typically extends beyond suppliers to include other external parties, such as integrators and even third-party communications providers.


Read More
control-enews

3 Steps for Managing Scope Creep in Security Operations

Dillon Twombly
Dillon Twombly
June 27, 2018
While the specific day-to-day tasks for a Global Security Operations Center (GSOC) may vary from organization to organization, there are typical, core functions that are universally familiar, be it crisis management, travel security or executive protection. Responsibility for the safety, security and well-being of an organization, its assets, people and reputation has widespread institutional impact.
Read More
Previous 1 2 … 6 7 8 9 10 11 12 13 14 … 45 46 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing