The previous three columns have laid the groundwork for establishing yourself as an effective influencer. In this month’s column, we will explore gaining the unique insights necessary to establish a program that will truly provide value to the enterprise.
Starting last August, we began the current series of articles to provide our readers with a deep dive into the NIST Framework and its approach to Identify, Protect, Detect, Respond to and Recover from cybersecurity incidents.
A crisis situation on school grounds can come in many forms. From devastating campus gun violence to carbon monoxide leaks that can leave students and staff ill, the outcome of any crisis situation depends largely on how prepared the school is beforehand.
An emphasis on officer service partnerships is the formula for Time Warner Cable’s Brian Reich, director of security for the Northeastern U.S., and that requires two-way communication.
When the Allegheny County Housing Authority’s old surveillance system proved more of a hindrance than a help in providing security, Chief Michael Vogel invested in a new hybrid solution.
Websites and Web applications are the most visible and vulnerable part of a company’s infrastructure so it’s no surprise that cybercriminals scan thousands of websites every hour in search of vulnerabilities.