This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Subscribe
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2018
      • ASIS 2017
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
  • InfoCenters
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Keywords » security metrics

Items Tagged with 'security metrics'
%{topic} RSS FeedRSS

ARTICLES

SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

How did Brian Tuskan use technology, his reputation, networking and a desire to help people to become Microsoft's new CSO?
Diane-2016-200
Diane Ritchey
February 1, 2019
No Comments

Throughout his career, Brian Tuskan has been driven by a love of technology, a hardworking reputation and a desire to help others. However, his eye has always been on the Microsoft CSO role. Now, he’s taking his place at the head of the pioneering global security organization.


Read More
SEC0219-leadership-Feat-slide1_900px

How to Evaluate Security's Role

Brian_allen-portrait-3
Brian Allen
February 1, 2019
No Comments

Last month we asked the question, “What is security’s role in the enterprise?” It turns out the answer isn’t that simple. I’d like to follow that up with what seems to be an easy question.


Read More
Danville Hospital, Hendricks Regional Health System

Collecting Insights and Metrics with Guard Tour Software

How Hendricks Regional Health's Security Team Went from 99% Paper to 95% Paperless
January 25, 2019
No Comments

When Steven Wagner joined Indiana-based Hendricks Regional Health, the department was run on 99-percent paper, with no electronic method of tracking security officers’ activity or sharing information across shifts except for a sporadically updated blog without a search function.


Read More
control room

How Modern Security Solutions Are Engineered for Greater ROI

3 Ways Businesses Are Deriving More Value from Their Security Systems
Jimmy Palatsoukas
October 16, 2018
No Comments
Measuring a return on investment (ROI) for security infrastructure is challenging. Most organizations primarily view security investments as a must-have capital expenditure. They know security systems are fundamentally necessary to protect people and assets and keep operations running smoothly. So while these technologies fulfill objectives and successfully help security teams prevent incidents, organizations oftentimes will ask: How can we truly quantify the value of a breach that never occurred?
Read More
Revised NIST Cyber Security Framework - Security Magazine

5 Things You Need to Know about the Revised NIST Cybersecurity Framework

Chabinsky-2016-200px
Steven Chabinsky
June 1, 2018
No Comments
To get you quickly up to speed, here’s a list of the five most significant Framework clarifications and revisions.
Read More
cyber-frame

5 Steps to Turn the NIST Cybersecurity Framework into Reality

Anupam Sahai
January 4, 2018
No Comments

Looking to implement the NIST Cybersecurity Framework in your organization this year? Take stock of your organization's current cyber maturity level and the path forward with these five steps.


Read More
Doorway to Cybersecurity

36% of Government Websites Fail 'Important' Security Tests

December 4, 2017
No Comments

At least 91 percent of U.S. government websites are failing to perform in at least one key security metric, according to a report from the Information Technology and Innovation Foundation.


Read More

Improving Guarding with Data

Banruo Zhou Mike Ginty
August 29, 2017
No Comments
Bringing hard science to an industry measured by soft skills and judgement leads to less subjectivity and more transparency in management, as well as overall improvement in your enterprise’s guard force.
Read More
Cybersecurity Leadership Images

Most Companies Failing to Measure Cybersecurity Effectiveness and Performance

July 27, 2017
No Comments

More than half of respondents to a survey scored an “F” or “D” grade when evaluating their efforts to measure their cybersecurity investments and performance against best practices. 


Read More
doors-enews

Can You Measure Your Building’s Penetration Risk? - Part 2

Part 2 of a 2-part series on security entrance metrics
Mark Perkins
February 28, 2017
One Comment
We all must stop running from the “elephant in the room” by implementing a real, effective tailgating prevention strategy. Combined with other analytical methods available today, this will allow security professionals to more effectively meet the challenges of our increasingly insecure world.
Read More
More Articles Tagged with 'security metrics'
Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

security-center

The Top 5 Reasons Why Your Security Program Needs Intelligence Personnel

Globe

Which Countries Have the Worst and Best Cybersecurity?

SEC0219-cover-Feat-slide_900px

The Road to CSO: Meet Microsoft's New Security Leader

password1-900px.jpg

New Vulnerabilities Found in Top Password Managers

password1-900px.jpg

How Americans Leave their Personal Info Open to Thieves

20180226SEC_DataminrFeb_360x184customcontent

Events

February 26, 2019

Harness Real-time Public Information to Improve Active Shooter Response

Corporate security teams hope never to respond to an active shooter situation. But given today’s realities, companies spend a great deal of time developing guidelines, holding training sessions, and carrying out drills to ensure that their staff will be prepared in case an active shooter event occurs.
March 7, 2019

Finding Your Physical Security Blind Spots with Artificial Intelligence (A.I.)

Security infrastructures are undergoing a digital transformation with growing adoption of intelligent access control, video surveillance and analytics as well as IoT devices and sensors – generating more data to than ever before. Harnessed properly with artificial intelligence and a risk-based model, this data can be exposed and leveraged to improve life safety, minimize risk and increase operational efficiency.
View All Submit An Event

Poll

Employee Background Screening

How Often Does Your Organization Conduct Background Screening on Employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security-500

Security Magazine

SEC-Feb-2019-Cover_144px

2019 February

In Security’s February 2019 issue, meet Brian Tuskan, Microsoft's New Security Leader. Learn how he has used technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO. Read about the Next Generation of White Hat Hackers, How to Evaluate Security's Role, and more.

View More Subscribe
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing