When it comes to addressing global fraud and security in the financial sector, it takes a network to defeat a network.
August 8, 2018
With so many government agencies and departments involved in security operations abroad (such as eliminating key targets or searching for specific terrorists), the essential flow of information was so slow and clunky that only three operations could be coordinated each month.
While casting blame for your local team’s loss on Sunday may make for great sports talk, asserting blame for your company’s data breach is an uncomfortable exercise of self-effacement. It is a matter that many company leaders are struggling with. According to a recent survey conducted by the Ponemon Institute, 67% of CISOs expect a data breach or cyberattack in 2018.
As the industry moves toward holistic 360-degree security systems to satisfy business needs, security professionals are beginning to appreciate the role of voice in the equation.
After a data breach, regulators strive to evaluate if an enterprise fulfilled "reasonable" cybersecurity standards… without defining what "reasonable" looks like.
In July’s column, I provided an overview of the concept of personal branding and why it is relevant to security professionals looking to further both their reputation and marketability. This month I want to expand on the topic by addressing specific steps you can take to better identify your individual brand.
On June 28, Wendi Winters lost her life when a man shot her and some of her colleagues in the Capital Gazette newspaper office.
Yet, Winters is being hailed as a hero, according to some who witnessed and survived the shooting, because Winters reportedly fought the gunman, and “charged forward holding a trash can and recycling bin,” reported the Capital Gazette.
Dedicating some portion of communications personnel time to the security team can drive global awareness of programs and initiatives critical to the safety of the organization, thereby increasing programmatic success.
Up to 85 percent of attacks on principals happen in or around a vehicle, says Greg Threatt of Threatt Protection Services in a recent Security article, What to Look for in Travel Security and Executive Protection Services. Threatt concludes that having a security-trained driver is paramount to a successful executive protection program.
Problems with home alarm sales tactics were flagged as an issue to watch in the latest report from the annual survey of state and local consumer agencies conducted by Consumer Federation of America (CFA).
A study IBM Security and conducted by Ponemon Institute found that the average cost of a data breach globally is $3.86 million, a 6.4 percent increase from the 2017 report.