While casting blame for your local team’s loss on Sunday may make for great sports talk, asserting blame for your company’s data breach is an uncomfortable exercise of self-effacement. It is a matter that many company leaders are struggling with. According to a recent survey conducted by the Ponemon Institute, 67% of CISOs expect a data breach or cyberattack in 2018.
"Acts of violence such as active shooters aren’t random,” says A. Benjamin Mannes. “From events such as Adam Lanza and Newtown, Nikolas Cruz and Marjory Stoneman Douglas High School, Jin Yu Park at Virginia Tech, and even Jared Loughner, who shot Congresswoman Gabby Giffords, all were planned.”
In July’s column, I provided an overview of the concept of personal branding and why it is relevant to security professionals looking to further both their reputation and marketability. This month I want to expand on the topic by addressing specific steps you can take to better identify your individual brand.
Up to 85 percent of attacks on principals happen in or around a vehicle, says Greg Threatt of Threatt Protection Services in a recent Security article, What to Look for in Travel Security and Executive Protection Services. Threatt concludes that having a security-trained driver is paramount to a successful executive protection program.
Hundreds of sports security professionals met last week in Louisville, Kentucky, for the 9th Annual NCS4 Conference, where they tested new technology, networked, discussed situational awareness techniques and honored industry professionals who go above and beyond to ensure their venues and events stay safe.
Is your program facing a shrinking security force or a downturn in the market? In our next Solutions by Sector webinar on July 26, Andrew Baer, head of global security for Weatherford International, will outline how to cope.
From September 23-27, ASIS International is bringing its world-class networking events to Las Vegas for Global Security Exchange (GSX), formerly the Annual Seminar and Exhibits. ASIS is pulling out all the stops, offering invaluable opportunities to forge new connections and build existing relationships at the industry’s premier networking events.
Go to any security conference and you’ll be quick to discover that getting “buy-in” and maintaining a “seat at the table” are still the predominant concerns among security leaders. After all, unlike other business units that bring in revenue directly, corporate security must show that it is not merely a cost center but a cost- (and sometimes a life-) saver.
I love technology. My college degree is in math. I enjoy solving problems using technology. I love its disruptive nature. It can force us to rethink the way we do things. It changes us; how we think of ourselves, our families, our work and our society. It provides hope to the crippled, opportunities for the poor and disenfranchised, and healing for our environment. Its potential is a two-sided blade. It can harm us or help us. It can be used for good or evil.