In business, anomalies (events that differ from the norm) should get your attention. From a loss prevention perspective, one of the most effective ways to counter theft and fraud is to identify and track POS transactions that differ from the norm.
Get to know Taylor Carr, Vice-President, Business Development & Integration for Securadyne Systems, and learn how Securadyne’s enterprise security executive customers are addressing cybersecurity in their enterprises.
May 1, 2014
Virtually all of the new video solutions we have deployed over the past few years have been IP-based. However, we still have many customers with existing large analog systems, and they need to operate, expand and optimize those systems today.
Would there be a greater return on investment if our information sharing focused less on enabling private sector victims to better duck and cover, and focused more on enabling the government to get the bad guys?
May 1, 2014
Regardless of how vigorously the industry applies risk management principles and how diligently the government shares information, there is no chance the private sector can consistently withstand intrusion attempts from foreign military units and intelligence services or even, for that matter, from transnational organized crime.
Changing your organizational culture is the key to aggressively protecting your stakeholders’ information – how can involving your C-Suite make all the difference?
An engaged leadership team already understands the greater domain awareness provided by converged surveillance systems, but how about the next step toward robust risk management: cybersecurity and cyberspecific insurance?
In February, a crowd of cybersecurity professionals attended the RSA Conference in San Francisco.
April 1, 2014
Kent Lawson, founder of Private WiFi, decided to test the wireless network provided at the RSA Conference, and he was surprised at the large amount of completely unprotected communications from security professionals, discovered in a mere 15 minutes.
Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.
Kratos Public Safety & Security Solutions’ Robert Gaulden discusses the latest trends in security technology and how to manage surveillance for rooftop helipads.
Corporate executives can develop enough expertise to comfortably navigate key cybersecurity risk management concepts
April 1, 2014
The National Institute of Standards and Technology’s cybersecurity framework is now available, so how can CSOs and CISOs use it to better frame their cyber efforts and prove their case to the C-Suite?