This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Authors » Maggie Shein
Maggie Shein

Maggie Shein

Maggie Shein is Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handles the overall direction of the brand, organizes and executes the annual conference, facilitates Solutions by Sector webinars, researches and writes exclusive cover stories, manages social media, and authors the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Articles

ARTICLES

soft skills
Security Talk

The super power of soft skills in security

Success in the security industry is made easier by possessing a number of soft skills. Security leaders advise embodying these character traits yourself and looking for these soft skills when hiring.
Maggie shein
Maggie Shein
May 9, 2022

Certain soft skills are more indicative of success within the security industry than some technical skills.


Read More
school communication
Leadership

Emergency communications: Considerations for K-12

School security experts talk about technology, processes and procedures when it comes to K-12 emergency communications.
Maggie shein
Maggie Shein
May 6, 2022

Security magazine sits down with a number of school security experts to talk about crafting security and safety plans for school districts within the K-12 sector.


Read More
konar
Integrated Solutions

Mixed-use development deploys integrated access control and security solution

The City of Rochester’s Neighborhood of Play includes a residential facility that needed a unified platform to connect residents across buildings, while giving management visibility into access.
Maggie shein
Maggie Shein
May 4, 2022

Rochester, N.Y. planned a mixed-use neighborhood for visitors & residents alike and required integrated security & safety technology to match.


Read More
Risk mitigation
Education & Training

Risk mitigation for domestic terrorism and radicalization

Maggie shein
Maggie Shein
April 11, 2022

The risk of radicalization for private and public organizations is real. Security leaders can mitigate some risk by evaluating processes and procedures.



Read More
construction
Security Talk

Reassessing the role of loss prevention

Maggie shein
Maggie Shein
April 4, 2022

Loss prevention teams must balance asset recovery and employee safety. Going beyond the traditional with solutions and strategies can help.


Read More
News item image 780 439.jpg

The Security Benchmark Report survey is now open!

Fill out our editorial survey to receive a free copy of the raw data collected to benchmark your security program with your peers.
Maggie shein
Maggie Shein
March 23, 2022

The survey gathers information about security budgets, numbers of security personnel, main concerns and responsibilities, and security missions and goals.


Read More
masks in public
Leadership

COVID-19 lessons learned in enterprise security

Security leaders have learned a number of lessons during the global pandemic that will help with future incident response and operational continuity.
Maggie shein
Maggie Shein
March 9, 2022

Security leaders have learned a number of lessons during the global pandemic that will help with future incident response and operational continuity.


Read More
Iowa state
Integrated Solutions

The Iowa State Fair deploys analytics to maximize security & situational awareness

Attracting more than one million visitors each year, the Iowa State Fair makes safety and security a top priority.
Maggie shein
Maggie Shein
March 9, 2022

One of the oldest state fairs in the United States, the Iowa State Fair attracts more than one million visitors each year. Securing such an event necessitates interagency law enforcement engagement and a dose of security technology.


Read More
security talk
Security Talk

School security: A focus on doors

Maggie shein
Maggie Shein
March 4, 2022

When it comes to gun violence within schools, security leaders should focus on one practical consideration first: doors.


Read More
Jaffe leader profile
Special Report

Embracing challenges and making a difference

Josh Jaffe, Vice President, Cybersecurity, Dell
Maggie shein
Maggie Shein
March 1, 2022

Josh Jaffe believes the future of cybersecurity lies in helping more people from more diverse communities see themselves in it.


Read More
View All Articles by Maggie Shein
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • hacking vital data
    Sponsored byConvergeOne

    Securing Vital Data through a New Age of Cyberattacks

Popular Stories

phishing attack.png

4 phishing trends observed in Q1 2022

cyber-ransomware-freepik1170.jpg

BlackCat/ALPHV ransomware breaches 60+ organizations

password-freepik1170x658v678.jpg

The 20 most common passwords leaked on the dark web

ikea-unsplash-1170x658.jpg

IKEA Canada suffers data breach

internet of things

Implement NIST IoT cybersecurity guidelines early

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
June 9, 2022

Cannabis Risk Management

This webinar will cover additional, and often overlooked, security risks and mitigation strategies for cannabis businesses, including vaults and storage, guards and transportation.

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Clear Seas Research

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing