The role of the CSO has significantly changed in the past 10 years and will change even more drastically over the next 10. For example, mention “convergence” and lines begin to blur – lines demarcating previously clear-cut, albeit traditional areas of management responsibility, budgets, reporting hierarchies, resourcing needs and geography.
Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.
The most important step is to understand the level and type of kidnap risk in countries or regions where your organization operates or where employees are expected to travel for business reasons.
If your organization is operating in an area where the risk of kidnap is deemed high, you should consider the Special Risk options available through the insurance market. Carried by many leading underwriters, Kidnap/Ransom and Extortion (KRE) coverage reimburses the losses associated with a kidnap.
Most security executives clearly understand cyber security is in a class by itself, and the risks associated with ignoring it are immeasurable. They are surrounding themselves with IT and technical security professionals instead of traditional security staffing and former law enforcement personnel.
Monitoring emerging trends, customer likes and dislikes, and understanding unmet customer needs can determine how rapid a rate of incline or decline your business experiences. Companies spend millions of dollars conducting surveys of customers, potential customers, industry experts and key opinion leaders to determine if their products or services effectively meet, exceed or miss market expectations.
For well over a decade, CEOs have been relegating the operational, legal, reputational and competitive risks associated with cybersecurity to those responsible for Information Technology.
Cybersecurity is the unsung linchpin of every company that has grown increasingly dependent upon vulnerable technologies, whether to communicate, to store sensitive data, or to manufacture and deliver its products and services.
I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.
In last month’s column, we explored the Top Five Reasons to Report Computer Intrusions to Law Enforcement. This month’s column will provide you with a sense of what your company, as a victim of a computer intrusion, should expect when working with the Feds.
In a fiercely competitive international business landscape, corporations race to increase profits by taking advantage of lower labor, manufacturing and distribution costs that only emerging markets can offer.