For two years after a gunman opened fire inside a Southern California Edison office, corporate security rebuilt and reframed their corporate culture toward active shooter policies.
While casting blame for your local team’s loss on Sunday may make for great sports talk, asserting blame for your company’s data breach is an uncomfortable exercise of self-effacement. It is a matter that many company leaders are struggling with. According to a recent survey conducted by the Ponemon Institute, 67% of CISOs expect a data breach or cyberattack in 2018.
"Acts of violence such as active shooters aren’t random,” says A. Benjamin Mannes. “From events such as Adam Lanza and Newtown, Nikolas Cruz and Marjory Stoneman Douglas High School, Jin Yu Park at Virginia Tech, and even Jared Loughner, who shot Congresswoman Gabby Giffords, all were planned.”
After a data breach, regulators strive to evaluate if an enterprise fulfilled "reasonable" cybersecurity standards… without defining what "reasonable" looks like.
In July’s column, I provided an overview of the concept of personal branding and why it is relevant to security professionals looking to further both their reputation and marketability. This month I want to expand on the topic by addressing specific steps you can take to better identify your individual brand.
Dedicating some portion of communications personnel time to the security team can drive global awareness of programs and initiatives critical to the safety of the organization, thereby increasing programmatic success.
Up to 85 percent of attacks on principals happen in or around a vehicle, says Greg Threatt of Threatt Protection Services in a recent Security article, What to Look for in Travel Security and Executive Protection Services. Threatt concludes that having a security-trained driver is paramount to a successful executive protection program.
More than 7 million data records are stolen every day.
July 27, 2018
As companies and businesses rely more on technological advancements to collect and store consumer information, they run the risk of exposing sensitive data to anyone from malicious groups to tech-savvy individuals.