This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Authors » Mark McCourt

Articles by Mark McCourt

Mark McCourt

Society’s Dependence on Trust and Security

Mark McCourt
April 1, 2012
Just today, a stranger came to my door claiming he was here to unclog a bathroom drain. I let him into my house without verifying his identity, and not only did he repair the drain, he also took off his shoes so he wouldn’t track mud on my floors. When he was done, I gave him a piece of paper that asked my bank to give him some money. He accepted it without a second glance.
Read More
Mark McCourt

Nothing Personal, It’s Just Business

Mark McCourt
March 5, 2012
While the Security 500 may have CSOs, CISOs and CIOs leveraging state-of-the art-technology to prevent cybercrime, the real arms race is upon the Security 50,000 (small and medium business or SMBs). And while the large organizations, if impacted, will have sway with their banks and made whole, the SMBs are more likely to end up the victim of crime, often without recourse.
Read More
Mark McCourt

2012 Prediction: The Year of FDSACC

Mark McCourt
January 4, 2012
The 2011 Security 500 survey conducted last spring identified that only 19 percent of Security 500 CSOs manage cyber security at their organizations. By the November 2011 Security 500 conference, we had an overwhelming request among attendees for cyber security sessions.
Read More
SEC01110_Trends_Mccourt

What Every CEO Should Understand

Mark McCourt
December 1, 2011
During the past year I have had the wonderful opportunity to meet and interview the best and brightest CSOs. Each was asked what every CEO should understand about security. Their ideas, advice and wisdom are shared with you in this month’s column. What should your CEO know? Share it with us at mccourtm@bnpmedia.com
Read More
New Security 500 feature image

Sixth Annual Security 500 Report: Measuring Up

How the Best Security Leaders Deliver Business Value
Mark McCourt
November 1, 2011

Security leadership and value is being tied directly to business unit and organizational goals as the best measure of its contribution. So directly tied, that business unit leaders are paying for risk management and security as a direct service versus an allocation. Further, these internal customers view security as a consultancy, and they are routinely seeking their advice to understand and manage risks enabling them to reach their objectives. The transparency of this relationship allows the business unit to identify security’s value to achieving their goals, resulting in increased reliance, use and spending with security.


Read More
Mark McCourt

Point Blank: The Security 500

Mark McCourt
November 1, 2011
Witness, if you will, 50 years of security art and science collapsed into the post 9/11 decade. When the dot com era burst, many venture dollars were looking for a place to work. 9/11, sadly, happened and was followed by many changes, including the creation of DHS and the promises to “inspect every bag at airports,” which led to the venture capital and curious question: Inspect them with what? The need rose, the money poured in. Innovation followed.
Read More
SEC01110_Trends_Mccourt

Eat, Drink and Be Smarter...

Mark McCourt
October 1, 2011
During the many conversations we have during the Security 500 research survey and interview process, one trend we do not include in the findings is how busy you are keeping your heads above water. A consequence of being more than fully employed is that many readers tell me that staying current with new trends, technologies and best practices is a constant challenge.
Read More
Sky view of new World Trade Center

The Rising

Mark McCourt
September 6, 2011
"When I was growing up in New Jersey, going to the World Trade Center was a school trip,” I said to Lou Barani. “And it will be again,” he replied with enthusiasm and a smile as we walked through the 9/11 Museum, which is in the midst of construction and scheduled to open in 2012. Once it’s complete, expectations are for more than 1,500 visitors each hour.
Read More
Mark McCourt

Is There a War Dividend?

Mark McCourt
August 2, 2011

During the recent federal government budget debates, the “peace dividend” of the 1990s was mentioned a few times. Does the U.S. get a “war dividend” in the risk/reward decision of business location and expansion?


Read More
Mark McCourt

Curing Nephophobia

Mark McCourt
July 1, 2011

Will the next budget go around cloud your executive career aspirations? Think ahead to this fall, when you are at the round table patiently waiting your turn to present your strategy, plan and budget, including your CapEx request. Surely, you have worked hard on the budget this year. Zero-based it? Completed risk assessments? Tied the security processes to measurable business benefits? 


Read More
Previous 1 2 3 4 5 6 7 8 9 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • hacking vital data
    Sponsored byConvergeOne

    Securing Vital Data through a New Age of Cyberattacks

Popular Stories

casino

Casino security on the Las Vegas Strip

police-alert-freepik1170x658v5.jpg

DHS issues national terrorism alert

docs-freepik1170x658v2.jpg

Microsoft Office zero day vulnerability discovered

cyber-password-freepik1170x658v4.jpg

Four ways cybercriminals can hack passwords

domain-name-freepik1170x658v.jpg

4 emerging threats in the domain name landscape

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
June 29, 2022

How to Build and Scale a Security Operations Center (SOC)

Security Operations Centers (SOCs) are a crucial component of safety and security culture. They support many strategic business objectives, from lowering costs and minimizing risk to improving employee trust and morale.

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Clear Seas Research

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing