Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

global-enews

Why Your Next Intelligence Analyst Should Be a Workplace Violence Analyst

Daniil Davydoff
Daniil Davydoff
February 4, 2019

Security leaders should consider investing in analysts dedicated to workplace violence prevention and threat assessment for three major reasons: the issue is becoming a greater concern, the subject matter is becoming more complicated, and small programs are becoming bigger.


Read More

(ISC)² Partners with CyberUSA to Advance Cyber Education and Certification

February 4, 2019

(ISC)² announced a partnership with CyberUSA, a nonprofit collaborative community of states focused on a common mission of enabling innovation, education, workforce development, enhanced cyber readiness and resilience, and connecting the cyber ecosystem of the U.S. and its allies.


Read More

IAHSS Announces New Guideline - Firearms in the Healthcare Security Program

February 4, 2019

The International Association for Healthcare Security & Safety (IAHSS) has released a new industry guideline: “Firearms in the Healthcare Security Program” under the category of “Security Department Operations”.  


Read More
SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

How did Brian Tuskan use technology, his reputation, networking and a desire to help people to become Microsoft's new CSO?
diane-2016-200.jpg
Diane Ritchey
February 1, 2019

Throughout his career, Brian Tuskan has been driven by a love of technology, a hardworking reputation and a desire to help others. However, his eye has always been on the Microsoft CSO role. Now, he’s taking his place at the head of the pioneering global security organization.


Read More
edu4-900px.jpg

NYU School of Professional Studies Center for Global Affairs Launches MS in Global Security, Conflict, and Cybercrime

February 1, 2019

The NYU School of Professional Studies Center for Global Affairs recently launched a 36-credit MS in Global Security, Conflict, and Cybercrime, which is currently taking applications for Fall 2019.


Read More
SEC0219-career-Feat-slide1_900px

Networking for a Successful Security Career

Brennan-2016-200px.jpg
Jerry J. Brennan
February 1, 2019

Read any book or article on the topic of career management strategy, and it is likely they will advocate for networking as a powerful tool.


Read More
SEC0219-leadership-Feat-slide1_900px

How to Evaluate Security's Role

Brian Allen
Brian Allen
February 1, 2019

Last month we asked the question, “What is security’s role in the enterprise?” It turns out the answer isn’t that simple. I’d like to follow that up with what seems to be an easy question.


Read More
SEC0219-talk-Feat-slide1_900px

The Next Generation of White Hat Hackers?

diane-2016-200.jpg
Diane Ritchey
February 1, 2019

It’s the time of the year when Girl Scouts knock on our doors and sell their infamous and delicious cookies: Samoas, Tagalongs, Do-si-dos, Thanks-A-Lot and Thin Mints (my family’s personal favorite).


Read More
security-center

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

Jason-David
Jason David
January 29, 2019
During the past decade, many corporate security divisions have made tremendous strides to evolve as a key component of their company's organizational strategy and growth. Whether a company's security program is in-house, outsourced or a hybrid of both, the leading global security executives and decision-makers are acutely aware of how to effectively leverage the resource capabilities of intelligence professionals within their organization.
Read More
meeting2-900px.jpg

Never Let the Protest Become the Event

Ten tips from event security experts
Mark Deane
Mark Deane
Frank Figliuzzi - Security Magazine
Frank Figliuzzi
January 28, 2019

Event security has evolved well beyond the standard uniformed officers, access control, and incident response. Today’s event security professionals are strategists who use intelligence driven risk-based models to mitigate threats by identifying and addressing gaps and vulnerabilities.


Read More
Previous 1 2 … 524 525 526 527 528 529 530 531 532 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing