In 2018, we witnessed some of the biggest data breaches ever – affecting businesses and consumers alike. From social media, hospitality, healthcare and even mail delivery, 2018 proved that there is no escaping cybersecurity flaws, regardless of the type of business or its popularity. For example, we witnessed the data of approximately 500 million Marriot guests get breached and a USPS security flaw that exposed the personal data of more than 60 million people.
Whether you’re establishing your firm’s first Global Security Operations Center (GSOC), including a co-located Network Security Operations Center (NSOC) or refreshing your current GSOC’s and/or NSOC’s capabilities, here are my recommendations for success.
While risk management is a "significant" commitment for organizations, 76 percent of enterprises lack a holistic strategy, and more than 70 percent are in the dark about critical assets and vulnerabilities, according to a new survey.
Security executives in property management secure commercial buildings in a variety of ways, depending on location, risk, whether the building is public, private or semi-public, what sort of asset is being protected, hours of operation, and the like. Protecting buildings from risks such as theft, loitering, vandalism, rioting and workplace violence comes with a variety of unique challenges and can take a lot of forethought, planning and creativity.
In his opening keynote at RSA Conference 2013, Art Coviello,Executive Vice President of EMC Corporationand Executive Chairman of RSA, The Security Division of EMC® addressed a crowd about the ways that Big Data is transforming the security industry, information technology, business and society.
Let’s start with the basics: the reason we take off our shoes at the airport is because the shoe bomber tried to get a bomb on a plane. The reason we can only carry on 3-ounce bottles? Someone tried to get a liquid bomb on a plane. Body scanners? Underwear bomber. But what if we took a look at suspicious behavior of the people attempting these acts of terrorism instead of relying primarily on machines to do our dirty work?
You have to create a strategic plan knowing that there’s a high likelihood it will change. Does that mean you shouldn’t plan? Absolutely not,” says Mark Lex, Security Executive Council faculty member and former director of security for Abbott Labs. Over his career, Lex learned through hard-won experience that security strategic planning, done well, incorporates a balance of anticipation and response, detail and flexibility.
Our special report this month features 26 security leaders who are changing the industry, inspiring many and leading with innovation. Security experts discuss the CCPA, public-private relationships, mobile device security and how aware employees can mitigate active shooter events and workplace violence.