This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Topics » Columns » Overseas and Secure Column

Overseas and Secure Column
Overseas and Secure Column RSS Feed RSS

travel-enews

Crafting a “Yes, But” Travel Security Program

Scott Stewart
October 17, 2017
Instead of saying "no" to enterprise travel requests, deploy a little thought and creativity to find "yes, but" solutions to almost any travel situation.
Read More
ports 2 responsive default security

5 Security Risks Professionals Face While Working on Vacation

Joseph Carson
July 14, 2017

Many of those with demanding jobs know that even when on vacation they must remain connected to the world in more ways than one to answer emails and handle important business matters. With the increased use, online services by these traveling professionals, especially in unknown territory, those traveling can quickly become a target of cyber criminals and hackers. 


Read More
airport-enews

Business Travelers: Worrying About Terrorism May Kill You

Mark Deane
Mark Deane
May 30, 2017
The looming shadow of terrorism is pervasive. The recent suicide attack that targeted a music concert in Manchester, UK; the vehicle attack in London, UK, two months prior; and compounded further by regular images across the media of marauding attacks in cities such as Paris and Berlin.
Read More
nigeria-enews

Security Concerns on the Rise for Foreign Travelers in Nigeria

The temporary closure of Abuja International Airport adds further security issues for visitors.
Ed Hill
March 14, 2017
The international community looked on with increasing concern and interest last week as the security situation in parts of Nigeria looks increasingly volatile. The kidnapping of two German archeologists in central Nigeria on Wednesday further heightened worries regarding the safety and security of foreign visitors to the county.
Read More
travel-enews

5 Key Components of a Robust Travel Risk Management Program

Mark Deane
Mark Deane
March 14, 2017

Meeting duty of care requirements is a complex process to navigate for any organization with employees who are traveling overseas on company business. Understanding what measures one can take to manage risk to an acceptable standard remains a considerable challenge. Now, more than ever in our volatile world the question arises: how best to meet this legal obligation?


Read More
Robert L. Quigley

Addressing the Continued Risk of Zika: Protection, Prevention and Communcation

Robert L. Quigley
October 1, 2016

With Zika now a “foreseeable” risk under Duty of Care, organizations are realizing their potential liability and are proactively mitigating their employees’ exposure to the threat by educating and protecting their employees traveling to – or living in – Zika endemic regions.


Read More
Oversea

Deteriorating Security Environment Threatens Business in Southwestern Mexico

Justin Kersey
August 1, 2016

Increased criminal activity has led to heightened insecurity throughout Mexico, especially in southwestern states. 


Read More
study abroad

How Universities Should Prepare Students and Faculty for Travel Abroad Programs

Oren Alter Brandon Biederman
July 26, 2016
A student missing after a catastrophic earthquake, a bus carrying students is involved in a fatal accident in an area with no cellphone connectivity, or a terrorist attack closes a major international airport – each of these realistic scenarios can quickly turn an exciting study abroad program into a personal and organizational crisis.
Read More
Measuring the Zika Virus's International Security Implications

Measuring the Zika Virus's International Security Implications

Katherine Harmon
Katherine Harmon, PA
April 1, 2016

Public health officials and policy makers have recently learned lessons regarding high-profile health events of international concern. SARS revealed that disease may be more easily transportable with global travel.


Read More
Operational Risk management model © iJET International, Inc. All rights reserved.

Proactive Planning for International Response and Recovery

Michael Payne
Michael Payne
August 1, 2015

In the wake of disasters like Nepal’s earthquake, proactive efforts provide a significant return on investment when reacting to the extraordinary challenges of response and recovery; they reduce the demand for reactive resources in environments rife with life safety constraints and limitations.


Read More
Previous 1 2 3 4 5 Next
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

Popular Stories

The 2023 Security Benchmark Report

The 2023 Security Benchmark Report

SEC Top Cybersecurity Trends of 2023 header

Top cybersecurity trends of 2023

Electronic scale of justice

SolarWinds CISO faces fraud charges for misleading investors

mall decorated for christmas

Data breach and identity protection concerns are at an all-time high

computer with green vertical text

Organizations face an average of 86 ransomware attacks annually

SEC AuditBoard webinar

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
LinkedIn

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing