According to Lance Hayden, Managing Director of Berkeley Research Group, harnessing the power of people and culture is the next great frontier for information security.
In my first column I invited you into the office of the CSO and the CEO of a company that had re-positioned itself as a security risk management services (SRMS) provider; a new category that I feel is emerging to address the need for a 360-degree view and understanding of an organization’s risk strategy, plan, processes and metrics.
I am the CEO of a risk, resilience and security company that is redefining the services required to provide a 360-degree view and understanding of an organization’s risk strategy, plan, processes and metrics.
There are significant opportunities for security and risk executives to be influenced as well as to be the ones that are acting as the ones that are influencing others.
As drone popularity, function and capabilities rise, it becomes increasingly apparent that unmanned aerial vehicles will have a hand in transforming campus security.
Having Lock-Down Protocols are useful, however it can delay law enforcement’s entry time. Do not expect to always escort law enforcement to threat areas; directions and diagrams are very helpful.
It is easy for hackers to hijack global social media accounts because of the sheer volume of accounts of this type and the large number of people managing them.