Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers. They change the security landscape for the better. They are nominated by their colleagues and associates, and they are chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have on their shareholders, organizations, colleagues and general public.
Information storage, according to psycho cybernetics author Paul Thomas, has to take place at the unconscious level. Less psycho– and more cyberfocused, Thomas has – unconsciously, no doubt – managed to get security video storage right, too.
Not exactly Maxwell Smart’s Cone of Silence, there was a time when security staff members monitoring blurry CCTV video images on CRTs would look through a kind of cone device to cut down on monitor glare.
The problem is ageless – you want outstanding security to protect your organization’s assets, but where does the money come from? CSOs across the globe have to petition their CFOs and other C-suite executives for appropriate funding to meet compliance requirements, keep software up to date and, generally, keep the right doors closed.
Meet Miki Calero, CSO for the city of Columbus, Ohio. As the city’s top security executive, he establishes and leads the enterprise security risk management program for the 15th largest city in the nation. Calero is also one of Securitymagazine’s 2012 Most Influential Security Executives, featured in this issue.
Afghanistan, Syria, North Korea, Yemen, Somalia.
Remember that Barry McGuire 1965 song, “Eve of Destruction?” “The eastern world, it is exploding / Violence flarin', bullets loadin' / You don't believe in war, but what's that gun you're totin'?”
Big Data Is…. Big! It also poses big risks and big opportunities.
As you know, there has been a lot written lately about cloud computing, and due to the platform’s design, cloud computing security. Securing the cloud is the work of technical experts at places like Google, Amazon, NSA and the DOD. And that cloud is being secured more each minute through both better procurement policy and technology.
Over the coming years the surveillance industry will follow a similar path that the IT industry has tread increasingly more service offerings. These offerings will range from live remote monitoring to managed surveillance systems, with both private and public cloud deployments.
Whistleblower tips are the most common method of detecting occupational fraud. Research by the Association of Certified Fraud Examiners shows that more than 60 percent of frauds are uncovered by tips; in organizations with a hotline in place, tips expose more than half of all frauds. Further, nearly 40 percent of tips are received from internal employees.
Problem identified and communicated, plan created, funds provided, problem resolved. This is the lifecycle senior business leaders often expect – and prefer – organizational challenges to have. It’s the way decisions are made and issues addressed for many functions of the business.
In August 2010, the International Association for Healthcare Security & Safety (IAHSS) published a survey of healthcare security executives which revealed an increase in violent crimes within the reporting hospitals.