Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2013 September

 Who are the Most Influential People in Security? Find out who is driving the security agenda in 2013, as well as why CSOs lose their jobs; how SMEs can gain efficiency through security officer contracts; how to start the conversation about K-12 school surveillance; building a stronger security architecture; how visitor management works at the Willis Tower and much, much more in this supersized edition of Security magazine.  

  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top

The Most Influential People in Security 2013

Nominated by their colleagues and associates, these top enterprise security executives are changing the security landscape for the better.
September 1, 2013

Each year, Security magazine honors top security executives who positively impact the security industry, their organization, their colleagues and their peers.


Read More

Featured Articles

Back to Top

Business, not Tourism: How the Willis Tower Handles Visitor Management

Visitor management challenges at Willis Tower, the tallest building in North America, extend beyond mere tourism.
Karyn Hodgson
September 1, 2013

At 110 stories, the Willis Tower (formerly known as the Sears Tower) is the tallest building in North America.


Read More

Columns

Back to Top

Black Hat Conference Evolves as Cyber Risk Soars

ATMs hacked to spit out $20s on stage, overriding pacemakers and insulin pumps via laptops – these are just a few of the demonstrations by enterprising hackers at Black Hat, but these presentations often help enterprises more than they hurt.
September 1, 2013

Black Hat, by its name, seems ominous. What was once a conclave of hackers in 1997 has become a fast-growing global conference series focused on the business of cyber security and includes technical presentations on vulnerabilities and solutions.


Read More

Concerns of Fed Phone, Internet Surveillance Lead to Privacy Discussion

The NSA’s data collection has proven troubling, and many Americans’ privacy concerns grow.
zalud-2016-200px.jpg
Bill Zalud
September 1, 2013

In a New York Times/CBS NewsPoll, a week after the Boston Marathon attack, which was unraveled after the release of video footage of the two suspects flushed them out of hiding, 78 percent of people said surveillance cameras were a good idea.


Read More

Building a Future of Security Collaboration and Convergence

Evolving threats necessitate increased collaboration among organizations, security providers and first responders – how can enterprise security executives adapt?
Nelson Barreto
September 1, 2013

 What’s trending in access control in security enterprises? Interest in outsourced managed access control solutions, particularly for retail establishments, financial institutions and high-end commercial enterprises, says Nelson Barreto, enterprise sales director for North Canton, Ohio-based Diebold Security.  


Read More

Upcoming World Events in Brazil Spark Health and Safety Concerns

Do you have employees making plans to travel to the 2014 World Cup or the 2016 Summer Olympic Games in Brazil? Make sure they go prepared – consider crime trends, health concerns and locations.
September 1, 2013

 Brazil will be on the world stage as it gears up for the 2014 World Cup and the 2016 Summer Olympic Games.  


Read More

What is the Most Influential Cyber Security Team?

The Information Technology Laboratory at the National Institute of Standards and Technology is leading the charge for cyber security.
Chabinsky-2016-200px.jpg
Steven Chabinsky
September 1, 2013

When it comes to changing the cyber security landscape for the better, there are a number of people, companies, agencies and associations driving both the policy debate and the solution set.


Read More

How to Safeguard Your Information Assets

How are lapses in cyber security leading to the loss of billions of dollars worth of intellectual property?
Mattice-2016-200px.jpg
Lynn Mattice
September 1, 2013

In today’s “Internet of Everything,” most enterprises dramatically underestimate the extent and scope of cyber-based attacks.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing