“Given today’s climate regarding security, we have to be able to optimize our security presence on campus as much as possible,” says Frank Solano, Security Systems Manager for McCormick Place. “That means using technology and other tools to keep our visitors safe."
As globalization and connectivity impacts businesses worldwide, international business travelers face a wide range of risks, many of which they can bring home with them. However, these threats aren’t always understood by the average traveler. So what threats are facing international business travelers this year, and how can enterprises communicate those risks and policies effectively? We asked Chris Duvall, Senior Director at The Chertoff Group, to share some of his insights and best practices.
A company is never able to predict when or by what means it may be targeted in a cyberattack, but it can prepare a robust response plan in the event of a breach. That response – contingent on the team, corporate processes and the technology that supports them – will ultimately determine whether a company ends up on the front page of The New York Times next to Equifax with its clients’ information on the Dark Web.
More and more, the news is filled with stories about how personal information is being used to benefit others. From revelations after Mark Zuckerberg’s pseudo mea culpa in front of Congress last month, to stories about fake news, identity theft, and how data mining is being used by political campaigns to understand the demographics and psychographics of potential voters, these Little Brothers are collecting massive amounts of personal data – all with our tacit consent.
With the growing visibility around cyber breaches, there is now a heightened sensitivity among corporate boards and executive teams as they become more engaged in the management of cyber risk, and its ability to impact their business and personal indemnity.
A key factor in establishing trust is the presence of a Security Operations Center (SOC). The SOC is charged with monitoring and protecting many assets, such as intellectual property, personnel data, business systems and brand integrity.
After the 2017 Brazilian Grand Prix, a Mercedes F1 Grand Prix team minibus full of team members leaving the F1 Circuit in Sao Paulo was robbed at gunpoint. Valuables were stolen from the minibus during the attack. What could security personnel have done differently to mitigate the risk of such an attack?
Since its establishment in 2001, video surveillance manufacturer Hikvision has grown rapidly to have the largest global market share for its segment. However, the company’s space in the industry spotlight has not come without challenges, including being vulnerable to the Mirai malware attack in March 2017 and skepticism from end users and other vendors about the Chinese video surveillance company.
Security magazine recently set some of these questions to Hikvision USA’s President, Jeffrey He, who responded to some recent allegations and end users’ concerns.
Over a four-day period in June 20 years ago, hackers simulated an attack on the power grids and 911 emergency systems in eight U.S. cities and then infiltrated and took control of U.S. Pacific Command computers.