Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

Security's Women in Security 2024
Special Report

Security's Women in Security 2024

This year's awardees are devoted change-makers in their organizations and the security industry as a whole.
Rachelle Blair-Frasier, Editor in Chief
Rachelle Blair-Frasier
July 2, 2024

This year's awardees are devoted change-makers in their organizations and the security industry as a whole.


Read More
Shaking hands

The power of partnership in mitigating cyber risk: A CFO’s perspective

McNally headshot
J. Stephen McNally
July 1, 2024

Security leaders, by closely partnering with CFOs, can ensure cybersecurity risks are considered and investments to mitigate such risks are prioritized.


Read More
Drawing a flowchart

Recovery point objectives 101: Planning for cyberattacks

Thorsen headshot
Todd Thorsen
July 1, 2024

Recovery point objectives and data recovery capabilities are foundational to a solid disaster recovery plan. 


Read More
Magnifying glass on keyboard

Remote digital forensics is redefining investigation and cybersecurity

Harsh-Behl.jpg
Harsh Behl
July 1, 2024

Embracing integrated, proactive forensic systems is essential for protecting global digital assets. 


Read More
Man standing in front of window

Will decentralized identity unlock the future of identity protection?

Patrick Harding
June 28, 2024

Decentralized identity is fast becoming a strategic approach to respond to security and identity fraud challenges. 


Read More
5 Minutes with Riccardo Ocleppo
5 Minutes With

How to close the widening AI and cybersecurity skills gap

Jordyn Alger, Managing Editor, Security
Jordyn Alger
June 28, 2024

With so many emerging cybersecurity threats, it can be easy to forget about a notable, growing cybersecurity concern: the talent gap.


Read More
Locked vault

Fortifying the software supply chain: A crucial security practice

David Close
David Close
June 27, 2024

The software supply chain is the backbone of software development. However, the very interconnectedness that makes it efficient also renders it vulnerable to escalating cyber threats.


Read More
Home office

3 ways hybrid workforces can benefit from a zero trust approach

Ketkar headshot
Prashant Ketkar
June 26, 2024

Zero trust helps organizations secure their workforce, but it also offers other advantages to the organization’s strategy.


Read More
Jim Coyle podcast news header

Risk management and mobile devices

Listen to Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, in this podcast episode
Security Staff
June 26, 2024

Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, discusses what organizations can do to manage mobile device risks.


Read More
Focused man looking at laptop

How to tackle burnout at the source in the security operations center

Hinchy headshot
Eoin Hinchy
June 25, 2024

As organizations face internal and external pressures, burnout among security professionals has hit worrying levels — leaving many heading for the door.


Read More
Previous 1 2 … 37 38 39 40 41 42 43 44 45 … 639 640 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing