ON DEMAND: DevSecOps creates an environment of shared responsibility for security, where AppSec and development teams become more collaborative. With the right training and tools, developers can become more hands-on with security and, with that upskilling, stand out among their peers... however, they need the security specialists on-side, factoring them into securing code from the start and championing this mindset across the company.
ON DEMAND: Chad Schermerhorn, Security Expert at Brivo, will discuss how your physical security stack should be an operational asset. It should be based on the strongest, and most-up-to-date smart security that can protect you today and adapt for unexpected threats that may come.
ON DEMAND: This presentation will show you the benefits of using high resolution cameras to monitor large venues. This will enable cost savings from reduced camera count. Various intelligent features and functions will be discussed that allow for ease of monitoring and searching videos as well as bandwidth reduction.
ON DEMAND: You spend countless hours assessing your vendors, stuck in spreadsheets, trying to sift through last year’s emails to find the right vendor contact and the most up-to-date questionnaire. And when assessments are finally completed (which can take months), you still need to review and validate the answers, as well as mitigate any identified risks.
ON DEMAND: New security technologies and services are often presented to security professionals within electrical utilities as a response to a perceived threat or risk, but end users can be unsure what solutions are appropriate or most effective for our specific needs. Enterprise physical security leaders are expected to make the right decisions in selecting and implementing security mitigations and controls that provide the best return on investment (ROI) and provide the appropriate level of security at their electrical utility sites.
ON DEMAND: This course will walk security professionals through five steps to creating a realistic security master plan and how to make the business case for funding. We start with where you're at and what capabilities you have.
ON DEMAND: The physical security industry adopts datacenter information technology in bits and pieces, but not to the extent possible. This prevents organizations from making strides in reducing costs and complexity, rapidly responding to change, and delivering on the prime security directives of keeping people and property safe.
ON DEMAND: At the center of an organization's security operation stands its nucleus, one of the most important pieces for overall functionality: the global security operations center (GSOC). But that can look different based on goals, budget and overall vision. However, one commonality remains: the GSOC is where a variety of systems and solutions come together to provide a singular operational picture, mitigate threats and promote enhanced communication during an incident.
ON DEMAND: Risk impacts every organization, and critical events and can cripple your operations if they’re not properly managed. For organizations focused on risk resiliency, the command center is quickly becoming the operational hub of risk management within an organization: the nerve center for risk.
This month in Security magazine, meet 13 female executives who are succeeding in security leadership roles. How are they contributing to the safety and success of their enterprise and to the industry? Also, experts discuss radio frequency threats, mental health during the global pandemic, the future of security networking, zero trust, AI and more.