While Artificial Intelligence (AI) has already been introduced into medical facilities – revolutionizing the research and development methods of critical disease treatments, it’s also bringing about a transformation in healthcare security operations. With technologies such as smart cameras and IoT platforms to better manage field level operations, healthcare organizations are seeing the possibility of a more streamlined, efficient and cost-effective way to manage their facilities.
David Pekoske, Senior Official Performing the Duties of the Deputy Secretary of Homeland Security, met with local law enforcement officials and the National Football League (NFL) to review Department of Homeland Security (DHS) operations to help ensure the safety and security of employees, players, and fans during Super Bowl LV. Dozens of federal agencies and components, including DHS, contributed to security measures seen and unseen in connection with the Super Bowl.
A new study by (ISC)², conducted in 2020, revealed that the cybersecurity profession experienced substantial growth in its global ranks, increasing to 3.5 million individuals currently working in the field, an addition of 700,000 professionals or 25% more than last year’s workforce estimate. The research also indicates a corresponding decrease in the global workforce shortage, now down to 3.12 million from the 4.07 million shortage reported last year. Data suggests that employment in the field now needs to grow by approximately 41% in the U.S. and 89% worldwide in order to fill the talent gap, which remains a top concern of professionals. Security experts, like Sarah Tatsis, VP of Advanced Technology Development Labs at BlackBerry, believe women can help solve the cybersecurity workforce shortage. Here, we speak to Tatsis about why women are needed and valued in the ongoing fight against cybercriminals.
Emergency communications are changing. At the City of Stamford, Conn., Joe Gaudett, Director of Emergency Communications says that his biggest focuses right now are keeping his staff safe and secure; having enough resources; and using technology to continue to function and respond safely and efficiently to serve its citizens. Learn how Gaudett and the city of Stamford have responded to COVID-19 and implemented new technologies to help ensure operational efficiency and increase safety and security.
Biometric security solutions and AI-powered fraud prevention technologies have, for several years now, been transforming the ways in which organizations protect their business, their customers, and their employees. In fact, some industry estimates reveal that AI and biometrics have combined to prevent billions of dollars in losses from fraud—already.
Neal Semikin, who previously held the roles of Chief Information Security Officer (CISO) and Head of IT Security at the Bank of England, has joined cybersecurity firm, The 324 Consultancy.
While COVID-19 has slowed the hospitality industry, security plays a more pivotal role than ever and the ongoing pandemic is challenging security professionals to adjust and adapt to new rules and procedures.
While COVID-19 has slowed the hospitality industry, security plays a more pivotal role than ever and the ongoing pandemic is challenging security professionals to adjust and adapt to new rules and procedures. And yet, as the pandemic and challenging economy continues, security departments within the hospitality industry are increasingly tasked to do more with less.
While many organizations understand the need for a security executive, organizations that have taken a holistic approach, have added the chief risk officer (CRO) position to evaluate all organizational risk. So, what is a chief risk officer, who makes a good candidate, where does the CRO stand organizationally within an enterprise, and what value does one add? Here are all your CRO questions answered.
McKinsey & Company reports that most risk managers at large organizations are flying blind when it comes to evaluating their cyber resilience due to bloated reporting processes and overly complicated reporting tools. Here's how organizations can implement a risk-based approach to their cybersecurity controls.