This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
      • Featured Products
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Management » Security Leadership and Management

Security Leadership and Management
Security Leadership and Management RSS Feed RSS

security integrators

Examining Best Practices for Security Executives and Integrators

Building and maintaining long-term working relationships with a security integrator takes time, commitment and plenty of resources.
Maggie McFadden
April 1, 2013
Long-term relationships between security leaders and their integrators are born from years of consultations, installations and service work. Once you find a security integrator that you trust and that meets your needs and exceeds your expectations, you can bet that you will go back to them time and time again. There are many examples of security executives forming multi-decade working relationships with their integrator. Those relationships are built from trust, communication and delivering results.
Read More
Bill Zalud

Boardroom Trends Go Viral

Zalud 2016 200px
Bill Zalud
April 1, 2013
It’s never boring in the boardroom. At the later part of the 1990s, “paradigm shift” emerged as the buzz phrase, popularized as business speak until it was overused to the point of becoming meaningless.
Read More
Joseph Dunne

Port Authority’s New CSO Aims to Build Interagency Cooperation

Diane 2016 200
Diane Ritchey
April 1, 2013
Last year, Joe Dunne, a 32-year NYPD veteran, was appointed to the newly created position of chief security officer of the Port Authority of New York and New Jersey. Specifically, he’s in charge of all the Port Authority’s security and public safety issues, including its 1,700-man police department. Now six months into his new role, what challenges has he faced in securing one of the most visible ports in the world?
Read More
Building Strong Policies for Ongoing Structure and Security

Building Strong Policies for Ongoing Structure and Security

Brennan 2016 200px
Jerry J. Brennan
Mattice 2016 200px
Lynn Mattice
April 1, 2013
In every element of our daily lives there are rules that guide our behavior. These rules come to us in many forms. From the time we are infants, our parents teach us what types of behaviors are acceptable and those that are not. We all remember the dreaded “No” from our mothers or fathers which was usually coupled with a stern look on their face.
Read More
IT employee

How Teaming Up with IT Protects the Enterprise

Jill Knesek
April 1, 2013
Over the last few years, I’ve written several articles and blogs about how critical collaboration is to the success of a security organization. I’ve also worked very hard in my job to practice what I preach. Security will not work in a silo and unless we, as security practitioners, understand our business and its core assets, it will be pretty difficult for us to successfully ensure their security.
Read More
hospital

Saving Money and Increasing Security with GTRI Training

Bryan warren authorpic
Bryan Warren
April 1, 2013
In 2004, the United State’s Department of Energy’s National Nuclear Security Administration established the Global Threat Reduction Initiative (GTRI) to, as quickly as possible, identify, secure, remove and/or facilitate the disposition of high-risk vulnerable nuclear and radiological materials around the world that pose a threat to the United States and the international community.
Read More
Lee Zeidman (right), CEO of AEG, which operates STAPLES Center, and David Born (left), Director of Security for STAPLES Center

Forging a Stronger Partnership with Your CEO

Diane 2016 200
Diane Ritchey
March 1, 2013

When the LA Kings won the Stanley Cup last year in their hometown of Los Angeles and home ice rink, STAPLES Center, Lee Zeidman and David Born celebrated with them. Both men were not only proud that the LA Kings brought home a championship, but they celebrated the fact that during the series, the team, their families, fans and employees were safe and the facility was secure.


Read More
SEC01110_Trends_Mccourt

Top Lessons Learned from the Security 500 Conference

Mark McCourt
March 1, 2013
From the highest technology solutions against cyber crime, to the low-technology sandbags that saved $4 billion of Goldman Sachs’ New York City and Jersey City buildings against Superstorm Sandy, to the far-reaching and thought-provoking keynote presentation by Roland Cloutier, Vice President & Chief Security Officer of ADP, the Security 500 Conference gathered security’s thought leaders for a day of provoking and valuable networking.
Read More
Phil Hopkins

Building Trust and Confidence through Partnerships

Diane 2016 200
Diane Ritchey
March 1, 2013
Phil Hopkins, Vice President Global Security for Western Union, has a successful background in the public and private sectors. To what does he attribute his success, and what are the qualities that make him successful, including his relationship with his CEO?
Read More
Lynn Mattice & John Brennan

Founding Security on Enterprise Risk Management

Mattice 2016 200px
Lynn Mattice
February 28, 2013
Utilizing the principles, standards and methodologies of ERM and/or ISO 31000 as the foundation of security programs is vital in order to transform your security program to holistically address the full scope of the risk, threat and hazard landscape that your organization faces today and into the future. Going forward, we will provide some insight into the concepts of ERM and why it is so important to utilize ERM as the foundation of your security program.
Read More
Previous 1 2 … 510 511 512 513 514 515 516 517 518 … 528 529 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • security camera
    Sponsored byAxis

    The power of analytics in surveillance: What can they do for you?

  • security office
    Sponsored byExperian

    Taking a Personal Approach to Identity Will Mitigate Fraud Risk & Ensure a Great Customer Experience

  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

Top cyber security conferences 2023

Top cybersecurity conferences of 2023

Top security conferences of 2023

Top security conferences of 2023

health care data privacy

The outlook for healthcare cybersecurity in 2023

Cyber tactics

2023: The year for contextual cyber threat intelligence

Campus security officer

Considerations for security officer training in healthcare facilities

Most Influential

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

February 16, 2023

Executive Protection for Hospitals and Healthcare Facilities

A head of state needs heart surgery at your facility. High-profile members of a national sports team are getting updated vaccinations. What do you do when you get the call?

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security Most Influential

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing