This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Polls

Polls

Who has ownership or primary responsibility of video surveillance at your enterprise?

January 11, 2021
Vote Now! View Results

Workplace Safety and COVID-19

June 11, 2020

Which new safety and security protocols are now in use at your enterprise to protect employees from COVID-19 exposure?

Vote Now! View Results

Emergency Communications

August 27, 2019

What does your enterprise use to communicate emergencies to company employees?

Vote Now! View Results

Employee Background Screening

January 11, 2019

How Often Does Your Organization Conduct Background Screening on Employees?

Vote Now! View Results

Your Security Officer Budget

December 14, 2018
How often does your security officer program receive budget and financial pressure from your senior executives?
Vote Now! View Results

Recruiting Diverse Candidates

July 3, 2018
Vote Now! View Results

New Security Technology in 2018

January 18, 2018
Vote Now! View Results

Workplace Violence Training with Video

October 9, 2017
Vote Now! View Results

Policies Addressing Personal Devices

August 22, 2017
Does your organization have a policy addressing the use of personal devices in the workplace?
Vote Now! View Results

Voice Recognition in Enterprise Security

June 20, 2017

Audio and voice recognition can be invaluable to an enterprise security system, yet it’s still not widespread.

Vote Now! View Results

Background Check Policies

April 24, 2017

Background checks are often a subjective process, with some industries or positions requiring them for compliance and others building them voluntarily and some not bothering with them at all. Where does your enterprise fall on this spectrum?

Vote Now! View Results

Professional Certifications

February 22, 2017
Vote Now! View Results

What are your security programs in your enterprise based on?

January 15, 2017

This poll is sponsored by Securing New Ground.

 

Vote Now! View Results

In which sector of the security industry do you foresee the most growth in the near future?

October 24, 2016

This poll is sponsored by Securing New Ground.

 

Vote Now! View Results

At ASIS 2016, security professionals saw a growing number of automated security robots on display and on patrol.

October 3, 2016
Vote Now! View Results

How will you attract new business?

September 1, 2016

This poll is sponsored by Securing New Ground.

Vote Now! View Results

Top Revenue Sources

August 12, 2016

This poll is sponsored by Securing New Ground.

Vote Now! View Results

Cybersecurity Threat - Sponsored by Securing New Ground

July 13, 2016

This poll is sponsored by Securing New Ground.

Vote Now! View Results

Mitigate Risk to your Enterprise

May 24, 2016
Vote Now! View Results

Drones for Surveillance?

April 13, 2016
Vote Now! View Results

Security Conference Value

January 26, 2016
Vote Now! View Results

Test Phishing Attack Penalties

September 21, 2015
Vote Now! View Results

Movie Theater Security

August 10, 2015
Vote Now! View Results

Insider Threats

June 24, 2015
Vote Now! View Results

Body Cameras on Security Officers

March 25, 2015
Vote Now! View Results

Tougher Cybersecurity Legislation

January 21, 2015
Vote Now! View Results

Security Emergency Preparedness Training

December 17, 2014
Vote Now! View Results

Travel & the Ebola Risk

October 20, 2014
Vote Now! View Results

Adopting New Technology

July 8, 2014
Vote Now! View Results

Background Checks

April 8, 2014
Vote Now! View Results

School Security

February 18, 2014
Vote Now! View Results

International Crime Intelligence

January 8, 2014
Vote Now! View Results

Cyber Security Insurance

November 18, 2013
Vote Now! View Results

Social Media Violations

October 24, 2013
Vote Now! View Results

Reader Poll

August 9, 2013
Vote Now! View Results

International Travel Security

June 28, 2013
Vote Now! View Results

Situational Awareness

May 14, 2013
Vote Now! View Results

Security Integrator

May 14, 2013
Vote Now! View Results

Green security

March 25, 2013
Vote Now! View Results

TSA Announcement

March 8, 2013
Vote Now! View Results

Investigations

February 4, 2013
Vote Now! View Results

Government compensation

January 3, 2013
Vote Now! View Results

Active Shooter Threat

December 18, 2012
Vote Now! View Results

Mobile Security

November 7, 2012
Vote Now! View Results

Leadership Practices

September 28, 2012
Vote Now! View Results

Working relationships

August 6, 2012
Vote Now! View Results

‘Lone Wolf’ Terror

July 20, 2012
Vote Now! View Results

Wish List

June 28, 2012
Vote Now! View Results

Security Improvements

May 25, 2012
Vote Now! View Results

Your Time

April 26, 2012
Vote Now! View Results

Top security risk in 2012

February 8, 2012
Vote Now! View Results

Security Technology

January 23, 2012
Vote Now! View Results

Virtual Guard Services

January 6, 2012
Vote Now! View Results

Private Security for Government

December 21, 2011
Vote Now! View Results

Background Checks

November 29, 2011
Vote Now! View Results

Risk Management

November 9, 2011
Vote Now! View Results

Compensation

October 14, 2011
Vote Now! View Results

Organizational Risks

August 23, 2011
Vote Now! View Results

Mobile Device Security

July 6, 2011
Vote Now! View Results

Campus Emergency Phones vs Cell Phones

June 27, 2011
Vote Now! View Results

Security 10 Years After 9/11

April 19, 2011
Vote Now! View Results

Japan Earthquake

March 23, 2011
Vote Now! View Results

Motivation of Security Staff

February 28, 2011
Vote Now! View Results

Security Department Personnel

February 8, 2011
Vote Now! View Results

Security Budget

January 14, 2011
Vote Now! View Results

Social Media

January 3, 2011
Vote Now! View Results

YOUR TAKE

July 14, 2010
Vote Now! View Results
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Sponsored content bnp covid  3j9fmqpy3i  1
Sponsored By
SureView Operations

How command centers are responding to COVID-19

In recent months, I’ve had many different conversations with our customers about how the COVID pandemic has impacted their security operations—from global companies with hundreds of thousands of employees to much smaller organizations with control rooms responsible for local operations and campuses. The overwhelming feedback is that everyone has needed, in one way or another, to change their processes, and expect to continue having to do so for the foreseeable future.

Popular Stories

twitter

Dutch police confirm hack of Donald Trump's Twitter account

SEC1120-Protests-Feat-slide1_900px

Terrorism and security threat trends in 2021

SEC0719-Privacy-Feat-slide1_900px

5 cybersecurity predictions for 2021

Suburbs of Chicago install gunshot detection solution

Kankakee and North Chicago in Illinois deploy gunshot detection solution for patrol

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

CISA updates emergency directive for SolarWinds Orion compromise

2.16_SEC_SBS_360X180_customcontent.png

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing