This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Authors » Adam Stone

Adam Stone

Adam Stone has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Articles

ARTICLES

security officers

Preparing to Protect and to Serve

How well-trained and well-paid security officers can benefit enterprise security
Adam Stone
September 26, 2019
No Comments

As president and CEO of Des Moines-based security consultancy The Conley Group, Tom Conley has seen firsthand the consequences of inadequate training among security officers.


Read More
SEC0819-VMS-Feat-slide1_900px

Video Management Systems for Your Security Enterprise

How can a VMS provide you with a set of tools to give you timely access to your surveillance video?
Adam Stone
August 12, 2019
No Comments

Security professionals must understand drones, conduct security, assess limitations and implement a drone response plan to mitigate its threats and attacks.


Read More
Mandalay Bay

Closer Ties: Private Security and Public Safety Need Interoperable Communications

Expert panel will discuss interoperability at 2019 Security 500 Conference
Adam Stone
July 18, 2019
No Comments

On October 1, 2017 a lone gunman fired down from the 32nd floor of the Mandalay Bay Hotel in Las Vegas, killings dozens of people attending a country music festival.


Read More
SEC0719-Asset-Feat-slide1_900px

IoT, Robots and ROI: Asset Tracking Industry

Security makes asset tracking a core business function.
Adam Stone
July 11, 2019
No Comments

The asset tracking industry is worth billions and technology is one of its main drivers. What tools can your security enterprise use to protect assets?


Read More
SEC0719-Profile-Feat-slide1_900px

Safeguarding Security and Loss Prevention at Gap Inc.

How EVP of Loss Prevention Keith white manages security at Gap Inc.
Adam Stone
July 3, 2019
No Comments

How does Keith White, EVP of Loss Prevention at Gap, Inc., manage security across a vast enterprise?


Read More
SEC0619-Ports-Feat-slide1_900px

Security Risk Management in Maryland's Seaports

How David Espie, Director of Security, secures Mayland's Seaports.
Adam Stone
June 5, 2019
No Comments

How does David Espie secure Maryland's seaport while managing more than 1,000 acres, 4,000 entries and exits and billion dollars' worth of cargo?


Read More
SEC0519-profile-Feat-slide1_900px

Security by the Book

Barnes & Noble's Loss Prevention chief reflects on retail security trends.
Adam Stone
May 3, 2019
No Comments

Barnes & Noble's Loss Prevention chief reflects on retail security trends.


Read More
SEC0419-recruit-feat-slide1_900px

How to Find Talent in a Tough Job Market

How do you lure employees with high level talent and keep them amongst tight labor markets with low unemployment?
Adam Stone
April 3, 2019
No Comments

How can security leaders recruit and retain top talent?


Read More
SEC0319-Events-Feat-slide1_900px

Surveillance's Role in Controlling Crowds

How are security enterprises leveraging video to secure temporary events?
Adam Stone
March 12, 2019
No Comments

Thanks to technological innovations, video is being used in much more creative ways than in the past.


Read More
SEC0119-mass-Feat-slide1_900px

Critical Communications

In the event of a disaster, social media can spread essential messages near and far, but how do official communications outlets cut through the noise?
Adam Stone
January 9, 2019
No Comments

When the Cold Springs Fire tore through 528 acres of Boulder County, Colo., Director of Emergency Management Mike Chard took to social media.


Read More
View All Articles by Adam Stone
Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cybersecurity-blog

European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing