More and more, security is focusing its value proposition on a service culture.
October 1, 2013
More and more, security is focusing its value proposition on a service culture. While this topic has been raised by many CSOs in recent years, the volume and frequency of the subject reached a peak recently and deserves some attention.
Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.
Our journey on the road to transforming to an Enterprise Risk Management based program, one of the more traditional security sweet spots, is our next area of focus.
The speed at which political instability spreads is now inextricably linked to social media, as disaffected populations around the globe turn to this powerful outlet to drive demonstrations, according to a new Marsh Risk Management Research briefing, Social Media Heightens Political Risks in Emerging Markets.
New York's antiquated laws against public corruption, computer crimes and fraud -- including swindles targeting the elderly -- would be beefed up under a series of wide-ranging proposals.
Nominated by their colleagues and associates, these top enterprise security executives are changing the security landscape for the better.
September 1, 2013
Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.
Security guru Bruce Schneier coined the term “Security Theater” to describe phony security measures, procedures, or technologies that give the superficial appearance of providing security without actually countering malicious adversaries to any significant degree.
Male terrorists tend to get most of the press, but terrorist cells are recruiting more women, often due to security forces considering them less suspicious.
The May 2013 edition of the FBI’s Most Wanted Terrorist Listincluded its first woman – Joanne Chesimard, wanted for the 1973 killing of a New Jersey State Trooper.
The foundation for creating a security department is risk evaluation and training, and taking training out of the binder and using it in the field could be the key to a thriving program.
When seeking effective security in the face of fast-evolving threats, large enterprises need assistance and a robust plan to address the challenges inherent to securing a global business. It is especially important to consider the following