Security breaches have become common place. Daily, we hear cybersecurity breach reports in the media. However, when healthcare institutions are impacted, consumers see this as “more detrimental” than other industry breaches.
When it comes to addressing global fraud and security in the financial sector, it takes a network to defeat a network.
August 8, 2018
With so many government agencies and departments involved in security operations abroad (such as eliminating key targets or searching for specific terrorists), the essential flow of information was so slow and clunky that only three operations could be coordinated each month.
While casting blame for your local team’s loss on Sunday may make for great sports talk, asserting blame for your company’s data breach is an uncomfortable exercise of self-effacement. It is a matter that many company leaders are struggling with. According to a recent survey conducted by the Ponemon Institute, 67% of CISOs expect a data breach or cyberattack in 2018.
In July’s column, I provided an overview of the concept of personal branding and why it is relevant to security professionals looking to further both their reputation and marketability. This month I want to expand on the topic by addressing specific steps you can take to better identify your individual brand.
On June 28, Wendi Winters lost her life when a man shot her and some of her colleagues in the Capital Gazette newspaper office.
Yet, Winters is being hailed as a hero, according to some who witnessed and survived the shooting, because Winters reportedly fought the gunman, and “charged forward holding a trash can and recycling bin,” reported the Capital Gazette.
Dedicating some portion of communications personnel time to the security team can drive global awareness of programs and initiatives critical to the safety of the organization, thereby increasing programmatic success.
Up to 85 percent of attacks on principals happen in or around a vehicle, says Greg Threatt of Threatt Protection Services in a recent Security article, What to Look for in Travel Security and Executive Protection Services. Threatt concludes that having a security-trained driver is paramount to a successful executive protection program.