This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
    • Security Blog
    • Newsletter
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
    • Cybersecurity News
    • More
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Authors » Bob Liscouski
Bob Liscouski

Bob Liscouski

Bob Liscouski has more then 30 years of experience in security and law enforcement, and he is the Executive Vice President of Integrated Strategies Group. Liscouski and ISG have founded four additional firms — Steel City Re, Edge360, Axio Global and Convergent Risk Group.

Articles

ARTICLES

Surveillance Strategies Default

10 Factors to Assess Your Integrator's Cyber Skills

Robert Liscouski
Bob Liscouski
August 1, 2015

Cybersecurity is more than just a headline associated with attacks on critical infrastructure assets, such as utility companies or our nation’s repository of its personnel records of employees with the highest security clearances.


Read More
enterprise responsive default

Using Continuous Evaluation to Thwart Insider Threats

Robert Liscouski
Bob Liscouski
July 1, 2015

Before November 2009 little attention was paid to the silent threat cultivating inside of the U.S. Army. That all changed when a common U.S. Army officer, Major Nidal Hasan, killed 13 soldiers and injured 30 others during a shooting spree in the morning hours of November 5, 2009, at Fort Hood, Texas. The significance of insider threats has been reiterated with the shooting at the Washington, D.C., Navy Yard, and the intentional crashing of a Germanwings jet into the French Alps.


Read More
Surveillance strategies

Crowd-Sourced Surveillance: A Public Threat or a Public Service?

Robert Liscouski
Bob Liscouski
June 1, 2015

The past several months, more than any time in history, have highlighted the evolving role of surveillance in law enforcement, public safety and security.


Read More
surveillance 1 feat

Finding the Right Technology to Unlock Cloud and Mobile Surveillance

Robert Liscouski
Bob Liscouski
May 1, 2015

Businesses have listened to staff and abandoned in-house developed tools in favor of consumer products and ubiquitous software-as-a-service (SaaS) capabilities. They want to exploit the benefits that extensive R&D and manufacturing can bring and are willing to trade off the minor compromises that come with standardized solutions. Also, security managers are starting to ask why sites can’t be secured in the time it takes to add a Dropcam to their home network…


Read More
Surveillance Strategies

How to Use Smarter Surveillance to Close Intelligence Gaps

Robert Liscouski
Bob Liscouski
April 1, 2015

The ISIS-inspired terrorist attacks in Paris in January and the threats against shopping malls in the U.S., Canada and the UK by Al-Shaabab highlight threats that call for more fully integrated surveillance solutions to enhance security. The horrifying Paris attacks demonstrated that, while various forms of video were available to record the attackers’ movements during and after the attack, the video wasn’t being made available in real time or near real time to help law enforcement’s response to the attack.


Read More
Surveillance Strategies Liscouski default

Addressing Profiling Changes to the Department of Justice

Robert Liscouski
Bob Liscouski
John Halinski
February 1, 2015

 We’ve gotten pretty good at collecting all sorts of data from cameras and other sensors – but in the end, it is what we do with the information that counts. Surveillance technologies provide the capability to capture the minutest details, but the real value in collecting information is in its analysis. While technology allows us to observe behaviors that predict criminal intent and can interdict before events occur, often this data is subverted by security professionals and law enforcement misinterpretation based on spurious factors. 


Read More
Surveillance Strategies Liscouski default

Right-Sizing Technology for Agile Surveillance Success

Robert Liscouski
Bob Liscouski
January 7, 2015

 In recent years, “cyber” has monopolized most of the serious coverage in the security industry, and rightly so, given the underprepared stance of many government and commercial organizations in the face of persistent “leakage” of information and malicious attacks. Yet too often, the equivalent dialogue around physical security has been disappointingly predictable. The industry fixates on pixel counts and IP versus analog. The more enlightened may debate the benefits of the latest breakthrough technology or an attempt at greater industry cooperation. At this point, insert “video analytics” and “ONVIF interoperability,” or any one of a hundred themes. 


Read More
Surveillance Strategies Liscouski default

How the Internet of Things Impacts Surveillance

Robert Liscouski
Bob Liscouski
December 1, 2014

If the revelations by Edward Snowden proved anything, it is that the U.S., its allies and its enemies possess tremendous capabilities to know as much about individuals, groups, companies, and virtually any other entity, as they want. While Snowden’s revelations give specific insight to U.S. capabilities, many of the same technologies our intelligence apparatus use are either commercially available or within the ability of nations or non-state actors to acquire on their own. 


Read More
How PSIM and Unified Platforms Drive Risk Management

How PSIM and Unified Platforms Drive Risk Management

Robert Liscouski
Bob Liscouski
Michael P. Jackson
November 1, 2014

 Risk management too often is perilously fragmented and insufficiently funded. Managing the overall risk equation is assuredly a CEO-level and management team obligation. But the design and execution of effective strategies to identify and moderate risk is, of necessity, complex and typically spread among numerous organizational silos.  


Read More
Bob Liscouski

Integrating Security Systems for Greater Business Value

Robert Liscouski
Bob Liscouski
October 1, 2014

 Security countermeasures, such as surveillance, address threats and if done effectively eliminate them; this is more likely the case when an integrated solution is deployed.  In looking at integrated security solutions, there exists an opportunity to move beyond a view of providing countermeasures to threats toward a new perspective of security as a means of delivering critical business value. 


Read More
View All Articles by Bob Liscouski
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service
  • eMagazine Subscriptions
  • Manage My Preferences

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • doctor with cellphone.jpg
    Sponsored byAxis

    How remote patient monitoring safeguards patient care and optimizes workflows

Popular Stories

The 2023 Security Benchmark Report

The 2023 Security Benchmark Report

SEC Top Cybersecurity Trends of 2023 header

Top cybersecurity trends of 2023

Electronic scale of justice

SolarWinds CISO faces fraud charges for misleading investors

mall decorated for christmas

Data breach and identity protection concerns are at an all-time high

computer with green vertical text

Organizations face an average of 86 ransomware attacks annually

SEC AuditBoard webinar

Events

December 6, 2022

Building a Resilient Enterprise

ON DEMAND: Business-impacting events such as severe weather, man-made disasters, and supply chain disruption are increasing in frequency and making impacts around the globe. 

June 29, 2023

From Crisis Response to Proactive Defense: Shifting the Paradigm of Threat Intelligence

In today's rapidly evolving security landscape, organizations face an ever-growing array of disruptive events, security threats and risks. Traditional reactive approaches to security intelligence often leave businesses vulnerable and ill-prepared to anticipate and mitigate emerging threats that could impact the safety of their people, facilities or operations.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
LinkedIn

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY
    • UPDATE MY PREFERENCES
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing