Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

How Americans View Female Leadership

September 22, 2018

A majority of Americans say they would like to see more women in top leadership positions – not only in politics, but also in the corporate world – according to a new Pew Research Center survey.


Read More
Cybersecurity Leadership Images

Legislation Introduced to Solve Cyber Work Shortage

September 18, 2018

US lawmakers have introduced a bipartisan bill in the House of Representatives to address the cybersecurity workforce shortage.


Read More

Vanguard Names Global Chief Risk Officer

September 14, 2018

Joseph P. Brennan has been appointed to a newly created position of Vanguard’s Global Chief Risk Officer, reporting to Vanguard CEO Tim Buckley.


Read More

Majority of U.S. Homeowners Are Unprepared For Disasters

September 13, 2018

Despite the U.S. experiencing its highest number of billion-dollar disasters in 2017, a new survey found two-thirds of American homeowners are still unprepared in the event of a disaster.


Read More
SEC0918-silos-feature-slide1_900px

Why Security Silos are the New Unifier

How is a Security Systems Management Platform the next frontier in enterprise security risk management?
Douglas Button
September 10, 2018

When was the last time something you liked was identified as being bad for you? Probably, more often that you would like to admit.


Read More
c-suite

Three Best Practices to Secure Critical Infrastructure

Edgard Capdevielle
September 6, 2018
In the last few years, executives overseeing energy, utility and other industrial organizations have begun to worry about the threat of cyberattacks on our nation’s most critical infrastructures. Ten years ago, their main concerns were focused on safety or environmental risks. Back then, operators believed the virtual barricades, or air gaps, between networks and technologies were sufficient enough to defend against malware and cyberattacks.
Read More
budget

Three Ways to Justify the IT Security Budget You Need

Maxim Frolov
September 6, 2018
Advocating for the return on investment (ROI) in IT security has traditionally been a challenge for IT professionals to communicate to management. IT teams are responsible for the complicated task of balancing budget limitations with strong protection that will reduce the risk of a cyberattack in today’s dynamic threat landscape. However, according to a recent Kaspersky Lab report, businesses are starting to invest more in IT security rather than treat it as a cost center.
Read More
self driving car

Hazards Ahead: The Dangers of Runaway Technology

September 6, 2018
Technology has advanced at an astonishing rate in the last decade, and the pace is only set to accelerate. Capabilities that seemed impossible only a short time ago will develop extremely quickly, aiding those who see them coming and hindering those who don’t. Developments in smart technology will create new possibilities for organizations of all kinds – but they will also create opportunities for attackers and adversaries by reducing the effectiveness of existing controls. Previously well-protected information will become vulnerable.
Read More
0918-cover-feature-900x550

The Most Influential People in Security 2018

Who’s leading the way for security professionals? These 17 thought-leaders are making a difference.
Claire Meyer
September 1, 2018

Security magazine is pleased to announce our 2018 Most Influential People in Security – 17 top security executives and industry leaders who are positively impacting the security field, their organization, their colleagues and peers, and the national and global security landscape.


Read More
SEC0918-career-feature-slide1_900px

Personal Branding and Your Career, Part 3

Brennan-2016-200px.jpg
Jerry J. Brennan
September 1, 2018

While nothing can completely supplant face-to-face meetings, it's imperative to cultivate a strong online brand when advancing your security career. 


Read More
Previous 1 2 … 533 534 535 536 537 538 539 540 541 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing