Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

SEC0520-talk-Feat-slide1_900px
Security Talk

Goodbye and Good Luck, Laura

diane-2016-200.jpg
Diane Ritchey
May 4, 2020

Laura Stepanek, Editor-in-Chief of SDM Magazine has retired. For 36 years, she was the face of SDM, and she has witnessed how new technology has changed the security industry. We wish the best for Laura in her well-deserved retirement.


Read More
On-the-Move_INTRO-slide-900x550px

May 2020: Security Executives on the Move

Security executives on the move! Which industry leaders have recently begun new roles?
May 4, 2020

Which security executives have recently changed positions? Have you begun a new role? Email us at ritcheyd@bnpmedia.com.


Read More
coronavirus

Senators to Introduce COVID-19 Consumer Data Protection Act

Although it is unclear whether the forthcoming bill has any chance of becoming law, it is further evidence that companies need to consider the significant privacy issues and risks associated with implementing COVID-19-related technology.
david stauss
David M. Stauss
May 1, 2020

On April 30, 2020, a group of four Republican Senators announced their plan to introduce federal privacy legislation that would regulate the collection and use of personal information relating to the fight against the Coronavirus pandemic. How would the proposed bill, COVID-19 Consumer Data Protection Act, attempt to solve privacy concerns? 


Read More
Marc Gruzenski

Marc Gruzenski Joins The McLean Group to Lead its Security Practice

May 1, 2020
The McLean Group announced that Marc Gruzenski has joined the firm as Senior Managing Director. Gruzenski will lead the firm’s Security Practice focused on the cybersecurity, physical security and security risk management sectors.
Read More
Gaps in Cybersecurity Programs

War at Home: How U.S. Corporations are on the Front Lines of the Silent War on Privacy

Jarrett Kolthoff
May 1, 2020
The four individuals who were identified and indicted by the Trump Administration in relation to the Equifax breach from 2017 is yet another example of the overt collection efforts by the Chinese government to steal Americans’ sensitive personal information. The openness of the U.S. government to share these examples should help bring the reality of cyber threats to the forefront in corporate board rooms and research universities. I would like to highlight that these particular attacks were conducted for a different goal – espionage.
Read More
SEC0520-cover-Feat-slide1_900px

COVID-19 and Enterprise Security's Response

What challenges has COVID-19 presented to enterprise security?
diane-2016-200.jpg
Diane Ritchey
May 1, 2020

What challenges has COVID-19 presented to enterprise security, how did business continuity plans evolve and what lessons have enterprise security learned?


Read More
SEC0520-cyber-Feat-slide1_900px
Cyber Tactics

DECADE OF THE RATs: Novel Cross-Platform APT Attacks Targeting Linux Windows and Android

John McClurg
John McClurg
May 1, 2020

As China forges its role as one of the great world powers, it relies upon a blast furnace of espionage operations to acquire foreign technologies and intellectual property, better position itself against competing international powers and control its own image both at home and abroad.


Read More
SEC0520-career-Feat-slide1_900px
Career Intelligence

Intelligent Succession Planning for Security Careers

Brennan-2016-200px.jpg
Jerry J. Brennan
May 1, 2020
What are some key areas to consider when you are constructing a strategy to address your successor and the replacement of other positions within your direct and functional organization?
Read More
SEC0520-leadership-Feat-slide1_900px
Leadership & Management

Servant Leader? Now's the Time to Prove It

Michael Gips
Michael Gips
May 1, 2020

"No one knows." We keep hearing that phrase. But, it's up to security professionals, healthcare workers and public safety officers to truly inhabit many leadership titles during COVID-19.


Read More
cloud-cyber

Disruptively Affordable Cloud Storage Saves Lives and Enhances Video Surveillance Security

David Friend
April 30, 2020
In the video surveillance world, data is growing rapidly due to the proliferation of surveillance cameras in both public and private spaces, the increased use of police body cameras and dash cams, and ever higher-resolution on all of these. In the U.S. alone, the surveillance marketplace is expected to grow to $68 billion by 2023.
Read More
Previous 1 2 … 462 463 464 465 466 467 468 469 470 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing