It may happen when you are least able to prevent it – when your executive or his family are alone and most vulnerable. Learning what to expect in the hours and days after an abduction will help you avoid becoming a bystander at a time when your leadership is most needed.
In the last few years, executives overseeing energy, utility and other industrial organizations have begun to worry about the threat of cyberattacks on our nation’s most critical infrastructures. Ten years ago, their main concerns were focused on safety or environmental risks. Back then, operators believed the virtual barricades, or air gaps, between networks and technologies were sufficient enough to defend against malware and cyberattacks.
Advocating for the return on investment (ROI) in IT security has traditionally been a challenge for IT professionals to communicate to management. IT teams are responsible for the complicated task of balancing budget limitations with strong protection that will reduce the risk of a cyberattack in today’s dynamic threat landscape. However, according to a recent Kaspersky Lab report, businesses are starting to invest more in IT security rather than treat it as a cost center.
Dedicating some portion of communications personnel time to the security team can drive global awareness of programs and initiatives critical to the safety of the organization, thereby increasing programmatic success.
Up to 85 percent of attacks on principals happen in or around a vehicle, says Greg Threatt of Threatt Protection Services in a recent Security article, What to Look for in Travel Security and Executive Protection Services. Threatt concludes that having a security-trained driver is paramount to a successful executive protection program.
As globalization and connectivity impacts businesses worldwide, international business travelers face a wide range of risks, many of which they can bring home with them. However, these threats aren’t always understood by the average traveler. So what threats are facing international business travelers this year, and how can enterprises communicate those risks and policies effectively? We asked Chris Duvall, Senior Director at The Chertoff Group, to share some of his insights and best practices.
While the specific day-to-day tasks for a Global Security Operations Center (GSOC) may vary from organization to organization, there are typical, core functions that are universally familiar, be it crisis management, travel security or executive protection. Responsibility for the safety, security and well-being of an organization, its assets, people and reputation has widespread institutional impact.
When traveling for business or pleasure, it’s important to always be conscious of the fact that hotels are a target for criminals, terrorists, and the mentally unstable. Here is a personal safety checklist to share with your C-Suite, frequent business travelers and your security team from an expert who has spent more than 30 years in intelligence and international security.
Our special feature this month highlights the Department of Homeland Security's newest agency: the Cybersecurity and Infrastructure Security Agency. Also, this month we highlight the Leander Independent School District's data practices that protect student privacy. Security experts discuss video monitoring, cybersecurity for public-private partnerships, privacy and more.