Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

security letter

The 2019 Security Letter: Key Insights and Takeaways

What this year’s letter tells us about the top firms and the security guard industry as a whole.
TimLozier
Tim Lozier
December 10, 2019
For the last two decades, the Security Letter has been a benchmark document that puts the security guard industry into perspective. Each year Robert McCrie compiles data from the top security guard firms and produces what is called “the list” detailing the top 20-25 firms in the country. This year, Robert McCrie, Keith Oringer of Security ProAdvisors and Jeff DiDomenico of Trackforce Valiant made the list come to life – a great way for all of us in the business to see what’s new and different from last year to this year.
Read More
video management

Never Underestimate the Value of Video

Alan Stoddard
Alan Stoddard
December 10, 2019
Physical security is continually evolving. New technologies emerge every year, and devices that have been around for decades — from smoke detectors to IP cameras — become more advanced in order to meet the demands of the new security landscape. But as we take part in this progression and strive to leverage the latest and greatest devices, it’s important to never forget one of the core technologies of the security industry: video.
Read More
Akron

International Society of Automation and University of Akron Team Up to Offer Cybersecurity Courses

December 10, 2019

The International Society of Automation (ISA), a globally recognized authority for industrial automation training since 1945, and the University of Akron, an influential public research university in the region, have entered into a workforce training agreement to offer the ISA IEC62443 Cybersecurity Training and Certificate program in Akron.


Read More
Spy

Why You Need TSCM Now More Than Ever

Daniil Davydoff
Daniil Davydoff
Ra Tiedemann-Nkabinde
Ra Tiedemann-Nkabinde
December 10, 2019

Our baseline level of suspicion about the security of data and communications is very high these days. Are smart devices recording conversations and conveying them to marketers?


Read More
SEC1219-Edu1-Feat-slide1_900px

CCPA Update: Analyzing the AG's Proposed Regulations

On October 10, 2019, the California Attorney General's office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. What are they, and what should enterprises do to achieve compliance and avoid costly fines?
david stauss
David M. Stauss
tobias moon
Tobias Moon
marci kawski
Marci Kawski
robert bowman
Robert J. Bowman
December 9, 2019

On October 10, 2019, the California Attorney General’s (AG) office published its long-awaited proposed California Consumer Privacy Act (CCPA) regulations. The AG’s office also announced that it will hold public hearings on the regulations on December 2-5.


Read More
jessica_tisch

Jessica Tisch Named CIO for New York City

December 9, 2019

NYC Mayor Bill de Blasio appointed Jessica Tisch as Commissioner of the Department of Information Technology and Telecommunications (DoITT).


Read More
SEC1219-cybergap-Feat-slide1_900px

How to Close Cybersecurity's Widening Workforce Gap

How are public-private partnerships helping solve the cybersecurity skills gap?
SM-SEC0519-Shortage-slide2_900px
Aidan McCauley
December 6, 2019

To remedy the cybersecurity skills gap and fight data breaches, enterprises across the world are looking overseas. How can public-private partnerships help resolve the industry-wide issue?


Read More
cybersecurity breach

The Top 12 Data Breaches of 2019

Maria Henriquez
December 5, 2019
Just in 2018, there were 500 million personal records stolen. How many records will be stolen by year’s end? According to the RiskBased Data Breach QuickView Report 2019 Q3, at the end of September, there were 5,183 breaches, exposing 7.9 billion records. Compared to the 2018 Q3 report, the total number of breaches was up 33.3 percent and the total number of records exposed more than doubled, up 112 percent.
Read More
cyber laptop2

5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

mark voses
Marc S. Voses
December 5, 2019
Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.
Read More
cybersecurity-laptop

A Resilient Answer to Disasters

Ray-Rothrock
Ray Rothrock
December 5, 2019
Both disaster recovery and business continuity are answers to what happens when entropy strikes, things fall apart, and business is interrupted. Resilience is strategy using a set of tools and approaches that make it harder for things to fall apart, and easier and faster to put them back together when they do.
Read More
Previous 1 2 … 486 487 488 489 490 491 492 493 494 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing