Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

Measuring the Role of Risk Transfer in Cybersecurity Management

Recent events have catapulted cyber threats from a compartmentalized CISO responsibility to a boardroom discussion about director liability.
Bob Liscouski David W. White
April 1, 2014

An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?


Read More

How to Keep Up with Emerging Technologies and Risks

consumers hundreds of billions of dollars annually. In the United States, credit card fraud resulting from cyber intrusions has skyrocketed.
Mattice-2016-200px.jpg
Lynn Mattice
April 1, 2014

Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.


Read More

How Incident Reporting Can Mitigate Threats

What reporting strategies should your enterprise adopt?
J. Kelly Stewart
April 1, 2014

How enterprises manage incidents outlines the strength and longevity of the business, and how they report vulnerabilities and adapt after a breach helps to stop incidents from reoccurring.


Read More

How to Leverage a GSOC for Unified International Security

Across one entire wall of the room are dozens of camera feeds.
diane-2016-200.jpg
Diane Ritchey
March 1, 2014

Operators in the room are on their phones, either receiving or relaying information about security – physical and cyber-related events. Welcome to Exelon’s Security Operations Center (ESOC), with three entities: the ESOC, the Incident Command Center (ICC) and the Cyber Security Operations Center (CSOC).


Read More

Getting Realistic Results from Security Technology

As the security industry heads to the largest technology trade show in the world, ISC West in Las Vegas, it is a great time to do an inventory and reflect on your security technology investments and systems
Mark McCourt
March 1, 2014

There will be more than 1,000 exhibits at ISC West plus another 100 or so new technologies and solutions presented in hotel suites and meeting rooms off the show floor. Robust discussion about the movement toward IP, mobility and the cloud will buzz across the show floor, as it should.


Read More

Addressing Cyber and Physical Risks in Modern Utility Security

In early January, residents of Charleston, W. Va., found that their tap water had a licorice smell and a strong aftertaste, and it resulted in a number of people reporting a variety of ailments.
Claire Meyer
March 1, 2014

In early January, residents of Charleston, W. Va., found that their tap water had a licorice smell and a strong aftertaste, and it resulted in a number of people reporting a variety of ailments.


Read More

Preparing for Litigation with Good Documentation

Security planning, regardless of business sector, is a company’s best effort to provide a proactive system to protect property and lives.
Patrick Murphy
March 1, 2014

Despite robust planning, a security director’s worst nightmare is a serious injury or death occurring on company property due to a violent criminal act.


Read More

Earning Security Success by Monitoring the Marketplace

Knowing what is happening in the marketplace is vital to the success of your enterprise
Mattice-2016-200px.jpg
Lynn Mattice
March 1, 2014

Monitoring emerging trends, customer likes and dislikes, and understanding unmet customer needs can determine how rapid a rate of incline or decline your business experiences. Companies spend millions of dollars conducting surveys of customers, potential customers, industry experts and key opinion leaders to determine if their products or services effectively meet, exceed or miss market expectations.


Read More

SMR Group Names James Butler Managing Director

February 2, 2014

Security Management Resources Limited announced the appointment of James A. Butler as Managing Director.


Read More

Security’s Top Guarding Companies List 2014

11th Annual Report
February 1, 2014

The 11th Annual Top Guarding Firm Report for firms in the United States and Canada.


Read More
Previous 1 2 … 612 613 614 615 616 617 618 619 620 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing