Home » Keywords » critical infrastructure security
Items Tagged with 'critical infrastructure security'
The Internet of Things (IoT) continues to be a driving force behind smart buildings, with the ability to optimize all areas of building operations – from HVAC to surveillance, offering massive potential for facility owners and system integrators to create added value for customers. While goals such as reducing energy consumption and space utilization are still priorities, building owners and operators are searching for solutions to help make workspaces and common areas safe and useable, abiding by new health and safety guidelines. Security professionals are also searching for ways to leverage and augment their technology infrastructure to contribute to the overall safety of their facility, beyond the traditional capabilities of access control and surveillance.
The Consumer Brands Association announced the launch of the Critical Infrastructure Supply Chain Council (CISCC), which consists of 35 trade association to address long- and short-term supply chain challenges and weaknesses due to the coronavirus pandemic.
Mark Rosa has been named Senior Vice President (SVP) and Chief Information Officer (CIO) of Mohegan Gaming & Entertainment to oversee strategic business decisions related to technology across all MGE properties.
In 10 months, U.S. citizens will elect a new president. As the race heats up and election day nears, a key component of the U.S. election infrastructure remains vulnerable to cyberattacks and misinformation campaigns.
As municipalities continue to harden their frontline defenses against attacks on their IT infrastructure, one area that should not be overlooked are public-private partnerships, as these are prime targets for criminals and others.
This month in Security magazine, we examine how physical security leaders are being propelled into a unique position of revenue preservers and risk managers for their businesses. In addition, we profile Scott Ashworth, Director of Security for Atlanta United. Also, security leaders discuss how to develop cybersecurity careers, election security, data protection strategies, measuring and reporting security operations maturity and more!