In every element of our daily lives there are rules that guide our behavior. These rules come to us in many forms. From the time we are infants, our parents teach us what types of behaviors are acceptable and those that are not. We all remember the dreaded “No” from our mothers or fathers which was usually coupled with a stern look on their face.
Over the last few years, I’ve written several articles and blogs about how critical collaboration is to the success of a security organization. I’ve also worked very hard in my job to practice what I preach. Security will not work in a silo and unless we, as security practitioners, understand our business and its core assets, it will be pretty difficult for us to successfully ensure their security.
In 2004, the United State’s Department of Energy’s National Nuclear Security Administration established the Global Threat Reduction Initiative (GTRI) to, as quickly as possible, identify, secure, remove and/or facilitate the disposition of high-risk vulnerable nuclear and radiological materials around the world that pose a threat to the United States and the international community.
When the LA Kings won the Stanley Cup last year in their hometown of Los Angeles and home ice rink, STAPLES Center, Lee Zeidman and David Born celebrated with them. Both men were not only proud that the LA Kings brought home a championship, but they celebrated the fact that during the series, the team, their families, fans and employees were safe and the facility was secure.
From the highest technology solutions against cyber crime, to the low-technology sandbags that saved $4 billion of Goldman Sachs’ New York City and Jersey City buildings against Superstorm Sandy, to the far-reaching and thought-provoking keynote presentation by Roland Cloutier, Vice President & Chief Security Officer of ADP, the Security 500 Conference gathered security’s thought leaders for a day of provoking and valuable networking.
Phil Hopkins, Vice President Global Security for Western Union, has a successful background in the public and private sectors. To what does he attribute his success, and what are the qualities that make him successful, including his relationship with his CEO?
Utilizing the principles, standards and methodologies of ERM and/or ISO 31000 as the foundation of security programs is vital in order to transform your security program to holistically address the full scope of the risk, threat and hazard landscape that your organization faces today and into the future. Going forward, we will provide some insight into the concepts of ERM and why it is so important to utilize ERM as the foundation of your security program.
When Security magazine approached us to write a monthly column, we took some time to ponder how to best serve the current and emerging security leaders which are this column’s target audience. We are delighted to have this opportunity to explore a broad range of topics in today’s complex environment of risk, threats and hazards.
From point A to point B and in between: securing the supply chain is becoming an increasingly high-profile issue among enterprises, and it is growing in complexity. How do we protect our nation’s borders against terrorism and drug threats while still facilitating trade and the free flow of goods?