Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

Cybersecurity compliance
Integrated Solutions

AI, Compliance, and a New Era of Cybersecurity

Cybersecurity compliance has been forever changed by artificial intelligence.
Wayne Dorris
Wayne Dorris
October 3, 2025

Artificial intelligence has greatly transformed how organizations ensure cybersecurity compliance.


Read More
Overcoming Silos
Special Report

Building Bridges: Overcoming Silos to Bring Organizations to the Next Level

Silos limit not just the security team, but the entire organization.
Jordyn Alger, Managing Editor, Security
Jordyn Alger
October 2, 2025

Poor visibility can leave organizations vulnerable, which is why it is time for companies to bridge internal silos.


Read More
5 Minutes with Kelley
5 Minutes With

Agentic AI: Benefits, Risks and Best Practices for Implementation

Jordyn Alger, Managing Editor, Security
Jordyn Alger
September 29, 2025

Security magazine talks with Diana Kelley, Chief Information Security Officer (CISO) at Noma Security, about the benefits, risks, and best practices of agentic AI.


Read More
Two security cameras attached to gray wall

First Line of Defense: The Role of Modern VMS in Supercharging Investigations

Charles Nguyen
September 24, 2025

Whether it’s a security breach, theft, or an unauthorized access attempt, physical security teams must act quickly to determine what happened, who was involved, and what actions to take next. 


Read More
Simon Morgan Podcast header

How AI and Virtual Operators Are Transforming Security Operations

Listen to Chief Product Officer at SureView Systems Simon Morgan in this podcast episode.
Security Staff
September 17, 2025

In this episode of Lock It Down with Security Magazine, Simon Morgan, Chief Product Officer at SureView Systems, discusses the evolution of security operations and the rise of artificial intelligence in modern SOCs.


Read More
Open book
Leadership & Management

Reading, Heeding, and Leading

A practical book list for those who practice security, risk management and leadership.
Michael Gips
Michael Gips
September 17, 2025

A practical book list for those who practice security, risk management and leadership.


Read More
Question mark thought bubbles
Career Intelligence

Unlocking Security Talent: Questions HR Should Ask and What Their Answers Reveal

Properly screening candidates is key to the successful hire of your next security leader.
Brennan-2016-200px.jpg
Jerry J. Brennan
Pollock-2016-200px.jpg
Joanne R. Pollock
September 15, 2025

Properly screening candidates is key to the successful hire of your next security leader.


Read More
NASA satellite moving through space

Critical Steps to Strengthening Satellite Network Security

Asit Tandon
September 11, 2025

Satellite networks are integral to myriad aspects of modern society, providing essential services that support both civilian and military operations.


Read More
Julia Vincke, Vice President of Security (CSO) at BASF
Special Report: Most Influential People in Security 2025

Julia Vincke — Leveraging Career Success to Lift Others Up

Vice President of Security (CSO), BASF
Jordyn Alger, Managing Editor, Security
Jordyn Alger
September 2, 2025

Julia Vincke, Vice President of Security (CSO) at BASF, leverages her own career success to lift others up.


Read More
Jennifer Swann-Chief Information Security Officer (CISO)-Bloomberg Industry Group
Special Report: Most Influential People in Security 2025

Jennifer Swann — Great Leaders Don’t Just Manage Teams — They Build Them

Chief Information Security Officer (CISO), Bloomberg Industry Group
Jordyn Alger, Managing Editor, Security
Jordyn Alger
September 2, 2025

Jennifer Swann had a part-time job in college as a Teller for the Bank of America and while in this role, her eyes were opened to the realities of data protection.


Read More
Previous 1 2 3 4 5 6 7 8 9 … 635 636 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing