Companies remain on the hook for ensuring their vendors are up to task when it comes to cybersecurity, privacy compliance and continuity of operations. This checklist can help determine the maturity of your vendor risk management program.
With companies’ reputations and futures becoming more inherently tied to their cybersecurity efforts, Security magazine connected with Kevin Richards, managing director of North American Security and global lead for Security Strategy and Risk at Accenture, to discuss the outcomes of negligent cybersecurity oversight during mergers and acquisitions.
The critical nature of access control and other security products and systems makes it extremely important to select a vendor who delivers strong customer service and satisfaction, helping you create a secure enterprise and better mitigate security risks. Here are a few tips on how to best evaluate your future access control provider.
The NFL’s biggest game – and one of the largest sporting events on the planet – is just days away, offering millions the chance to be entertained for a few hours.
If the revelations by Edward Snowden proved anything, it is that the U.S., its allies and its enemies possess tremendous capabilities to know as much about individuals, groups, companies, and virtually any other entity, as they want. While Snowden’s revelations give specific insight to U.S. capabilities, many of the same technologies our intelligence apparatus use are either commercially available or within the ability of nations or non-state actors to acquire on their own.
At some point during your career you will find yourself interacting with a search firm and/or a recruiter who has been assigned a project to fill a professional level security risk related role. This firm may or may not have a specialty security risk related practice and may or may not be a firm that you have ever heard of.
The economic horizon was showing signs of new life and your business-improving Orders were up, but you have concerns that you have stretched the length of your supply chain
The economic horizon was showing signs of new life and your business-improving Orders were up, but you have concerns that you have stretched the length of your supply chain
From the highest technology solutions against cyber crime, to the low-technology sandbags that saved $4 billion of Goldman Sachs’ New York City and Jersey City buildings against Superstorm Sandy, to the far-reaching and thought-provoking keynote presentation by Roland Cloutier, Vice President & Chief Security Officer of ADP, the Security 500 Conference gathered security’s thought leaders for a day of provoking and valuable networking.
Nearly 75 percent of companies experienced at least one supply chain disruption in 2012, with an average of five, according to the 4th Annual Supply Chain Resilience 2012 Survey.
There are very few, if any, networking and educational events like the Security 500. Be sure to join more than 80 of your peers and Security magazine on February 12th in NYC and learn why security leaders, like Joe Goodale of Portland General Electric say, “Security 500 training is cutting edge, and their presenters are some of the best in the country.”