Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2013 November

Which security leaders are getting out in front of the storm to mitigate risk and reduce damage before it happens. These enterprise security executives aren’t only the first call after the Risk-Nado hits, but they’re carefully laying plans when the risks just begin to appear on the radar. In this Security 500 report, check your enterprise’s security ranking against your peers, read in-depth profiles on industry thought-leaders, understand the top risks for 2014 and learn how to push your enterprise security program beyond managing inside the Risk-Nado.

  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top

Security 500: How Security’s Risk Mitigation Focus Creates a Risk-Nado!

What are the Top 10 Trends enterprise security executives concerned with now, and what should you plan for in 2014?
November 5, 2013

Security 500 members are enabling enterprise missions through proactive risk and resilience programs built on strong customer service cultures. Transforming security into a service organization requires flexible strategy and brilliant execution in an ever turbulent and global Risk-Nado.


Read More

Featured Articles

Back to Top

Top Technologies from ASIS 2013

Hungry for the highlights from ASIS 2013? See Security magazine's editors' picks for this year's best in show.
November 5, 2013

The 2013 ASIS International Exhibition in Chicago was abuzz with new and renewed security solutions and technology. Hungry for the highlights? Check out Security magazine’s editors’ picks for some of the best products of the show.


Read More

Migrating from Keys: It’s All in the Journey

When “Do Not Duplicate” is not working as a key control strategy, perhaps it’s time to consider switching to electronic access control solutions.
zalud-2016-200px.jpg
Bill Zalud
November 5, 2013

 Among the worst things to hear: “I can’t find the master key.” Whether lost or stolen, that situation triggers a long and expensive process of rekeying. Perhaps this is the last straw pushing your enterprise toward an electronic access control solution. 


Read More

How Video Recorders Provide Critical Support to the Enterprise

While cameras are becoming a critical enabler of operational excellence, reliable video storage is the absolute necessity to ensure that the tool is there when you need it.
zalud-2016-200px.jpg
Bill Zalud
November 5, 2013

 More cameras, storage, sharing of security video and more uses…all of which leads to an expanding array of storage choices: digital video recorders (DVRs), hybrid DVRs and hybrid network video recorders (NVRs), pure NVRs, virtual storage, storage in the cloud and, for some, especially retail, storage to analytics by a specializing third party. 


Read More

2013 Security 500 Rankings

Compare Security 500 Company Rankings Sector-by-Sector in this Benchmarking Tool.
November 5, 2013

Where does your enterprise stand? Compare security rankings sector-by-sector in this benchmarking tool to determine who the frontrunners and thought-leaders are in your enterprise’s field. 


Read More

2013 Security 500 Sector Reports

Use Sector-Specific Benchmarking to Compare Your Enterprise’s Focuses to Those of Your Peers
November 5, 2013

What are security’s top critical issues? What department does security report to? How are budgets changing? What responsibilities do security leaders shoulder within their organization? Compare your enterprise’s focuses to those of your peers in the Security 500’s sector-specific analysis.


Read More

2013 Security 500 Report Methodology

Get the Background on the Security 500 Sources, Key Metrics and Feedback.
November 5, 2013

The Security 500 tracks 17 vertical markets and collects unique data where appropriate (such as patients in healthcare) and applies this data to key metrics.


Read More

John Bertsch: World Championship Security

“Without a doubt, leadership is about getting everyone to play nice.”
November 5, 2013

“When did Iget programmed? I’d have to say my mom was a huge contributor to molding my altruistic mindset growing up. My Mom never drove by someone or something in need. We’d always say, ‘Oh mom, don’t stop. Not again!’ But she always did.” And with that Bertsch has been an enthusiastic volunteer and then ‘CSO’ to make communities and events better through solid risk management and resilience.


Read More

Timothy J. Caddigan: Body and Spirit

“Successful leaders are surrounded by highly motivated and capable people who build relationships based on respect with a focus on results.”
November 5, 2013

“Managers care for the body of the organization. But leaders care for the spirit. And great leaders care about both. That is not my saying, but it is how I view leadership in any successful business,” says Tim Caddigan, Director, Corporate Security & Facilities for Altria Client Services.


Read More

Dr. Gerald Robert Harkins: Doctor, Soldier, Leader!

“Each year, 25 percent of our population turns over, and we start over to get buy-in, keep their attention and have them take appropriate action for their safety.”
November 5, 2013

“When I had the opportunity to move from parking and transportation at the University to leading the strategic security and safety effort on campus, we made a very strategic and important decision to build the structure to be broader than law enforcement. We incorporated all aspects of campus safety and security,” says Dr. Bob Harkins of the University of Texas, Austin. “That decision speaks volumes about the leadership at the University. It was a decision to make this department an enabler for the business of protecting and educating students, faculty and staff. That was a very strategic decision encompassing law enforcement, campus safety and security, business continuity and risk management as core missions.”


Read More

Mike Howard: Leading Security Innovation and Business Growth

“Leadership must also come from the C-Suite to positively influence security’s mission in a holistic manner. Security’s goal is to be viewed as a significant business enabler and partner.”
November 5, 2013

“Leadership is about understanding yourself first, recognizing strengths and weaknesses, and targeting continuous improvement,” says Mike Howard, Chief Security Officer at Microsoft. “It is an attitude and mindset to focus on the team and organizational goals first. Leaders are able to change focus from subject matter expertise to a focus on their team by setting strategic goals, letting go of the details and steering the team through execution.”


Read More

Bijan Karimi: Bringing Order to Chaos

“We discuss risk as a concept beyond just the financial exposure… From supporting the community’s planned events to planning for the unknown, our job is to both be ready today and to look ahead.”
November 5, 2013

No one better defines the adage “Find what you love to do and then figure out how to make a living at it” better than Bijan. While he held a successful career in financial services, he also volunteered as a member of the Marin (California) County search and rescue team. Following the events of 9/11, more government funding became available to help local jurisdictions prepare for, respond to and recover from disasters.


Read More

Patrick Murphy: Securing a World of Opportunity

“It is important for CEOs to understand that the safety and security departments provide an important role in protecting the brand reputation.”
November 5, 2013

“Leadership is best done by leading by example and through respect for others,” says Patrick Murphy, Senior Director, Global Safety and Security Services for Marriott International Inc. The black belt martial arts professional turned CSO has set the example for leadership during his outstanding career. “After martial arts, I asked myself, ‘Now what?’ I saw an advertisement for an executive protection academy. One thing led to another, and before I knew it I was a bodyguard for the Chairman and President of what was at first a small, fast-growing company.”


Read More

Joseph Perchetti: Tomorrow’s Leaders

“I believe our greatest contribution to every student, staff member, parent and community member is the availability of services from our security department.”
November 5, 2013

“We treat everyone, from kindergarten on up, with respect,” says Joseph Perchetti, Supervisor of Security for the Radnor, Penn., Public School District. “They are our customers, and their taxes pay our salaries. We go the extra mile to make sure they are secure and to ensure that they can focus on education.”


Read More

Dan Ryan: Rising Star

“We have a complex community with many tenants, people and events that include measurable risks. We identify both minimal and elevated risks, build security programs around them and measure our results.”
November 5, 2013

Dan Ryan’s story is classic, happy and all-American that those entering the profession can learn from and hope to emulate. “I guess you could say I started at the bottom and worked my way up.” Yes, you could say that Dan, but that would be understatement – Dan’s expertise and perfection have helped him rise through the ranks at a meteoric pace.


Read More

Stephen Scharf: Ensuring Trust

“Being satisfied with a program now does not mean you will be satisfied with it tomorrow. The threats, attacks, types of attackers are always changing.”
November 5, 2013

“Leadership isabout making the team better than the sum of its parts. Leaders look for people who will bring out the best from others and make the whole team better. Great leaders are force multipliers,” shares Stephen Scharf, the leader at Experian entrusted with protecting the business’ brand and customer information from ever changing and expanding threats.


Read More

Gordon M. Snow: Investing in Human Capital

“Our job is to provide exceptional care, service and quality through cost reductions, by performing more powerfully and continually refining our security and business acumen in parallel.”
November 5, 2013

“There is no longer a time in any field that you can be a good leader and be deficient in any area of managerial core competency. Leaders have to be comfortable being uncomfortable,” says Gordon Snow, chief of protective services for The Cleveland Clinic. “The environment is increasing in complexity. Education and training can provide you with many of the tools you need to make better decisions, but there isn’t always a formula to help you make the right decision.


Read More

Frank Taylor: Enabling the Mission

“Leaders get recognized for their ability to mitigate problems and choose effective strategies. The same is true for security… The status quo or yesterday’s success is never good enough.”
November 5, 2013

“Security is about enabling a mission. Business leaders are able to take our tools and apply them to a variety of settings to create success. Our job is to create an environment of success for the enterprise. It is not what we do, rather, it is how we enable the enterprise to achieve its goals,” shares Frank Taylor, Vice President and Chief Security Officer for The General Electric Company. It is important to note that as you read this, one of America’s (not just security’s) greatest leaders and thinkers will have retired, again.


Read More

How to Plan for Post-Incident “Golden Minutes”

You've heard about the "Golden Hour" after an incident, but you should be planning for the "Golden Minutes."
Joanne Pekich
November 5, 2013

In the wake of recent high-profile shootings and incidents, access control, video surveillance and armed guards have become the discussion of the day to deter future attacks. But what can enterprise security leaders do about threats that cannot be prevented? How can you plan for the golden minutes following an incident?


Read More

Understanding the Consequences of Skipping Fire Suppression

Having smoke and fire detectors without fire suppression technology is like having video surveillance without alarm response.
November 5, 2013

 A fire in 2013 that began in the attic of a Colorado sorority house burned for hours before anyone detected it, resulting in a million-dollar loss. Why? The three-story, wood-frame house had no fire detection system, and a sprinkler system covered the living spaces but not the attic. 


Read More

Columns

Back to Top

Studying the 'Wicked Problem' of Cyber Security

Cyber crime has been referred to as a “wicked problem,” and its solution may well lie in stronger education.
November 5, 2013

Frederick Chang recently joined Southern Methodist University to develop a multidisciplinary program to tackle the most pressing cyber challenges facing the world today.

 


Read More

How Security Ball Can Help Enterprises Succeed in a Risk-Nado!

Learn how to change the game of security with better statistics
November 5, 2013

Leveraging metrics and statistics can lead to a stronger security program, just as they led to a better baseball team for the Oakland Athletics in “Moneyball.” So how can these metrics protect your enterprise from a Risk-Nado?


Read More

Understanding and Mitigating Financial Asset Risk

How is Cybercrime the new Wild West of Theft?
Mattice-2016-200px.jpg
Lynn Mattice
November 5, 2013

Ever since the days of Jesse James, banks have always been a target of those after fast cash, but now, cybercrime is becoming the new Wild West of quiet, quick theft. Find out what the enterprise can do to mitigate cyber risks to its financial assets.


Read More

Top 5 Reasons to Report Computer Intrusions to Law Enforcement

Even when not legally required, reporting cyber crime to law enforcement can act as a deterrent for other malicious actors contemplating future attacks.
Chabinsky-2016-200px.jpg
Steven Chabinsky
November 5, 2013

 Judging by today’s headlines, it is only a matter of time until every company – yours included – is going to experience a computer intrusion, or perhaps another computer intrusion. When that happens, you may find yourself working with law enforcement. Sometimes, they will be the ones calling you.  


Read More

How Corporate Security Can Face Down Fourth-Generation Warfare

Just because your enterprise is not operating in a warzone does not make you immune to fourth-generation warfare.
November 5, 2013

Nation-states with political agendas and their standing militaries are no longer the primary participants in conflicts. Threat actors can come from anywhere.


Read More

How Security is Shifting to a Global Approach

Big Data is coming more and more into play in security, and the need to have real-time, actionable intelligence is key to security enterprises’ success in risk mitigation and management.
Rich Cillessen
November 5, 2013

Globally, the Siemens brand plays in many spaces. In security, Siemens is known for its integrated approach to security, with product applications demonstrating how different system configurations can be utilized in a given environment. Its success has given it a number two position on sister publication SDM’s 2013 Top Integrator Report.


Read More

Choosing the Right Video Recording Technology for Your Enterprise

Ignore the acronyms -- Use these five areas of comparison to shop smarter for video recording tools.
Keven Marier
November 5, 2013

The security industry is chock full of acronyms, especially in the field of video recording, and determining the correct choice for your enterprise can be confusing. These five areas of comparison can help security leaders ask the right questions about their potential purchases.


Read More

How the Fear of Terrorism Drives Corporate and National Culture

The threat of terrorism is shaping the cultural response to security in nations around the world – how is it affecting your enterprise?
Daniel Antonius Ph.D Justin Sinclair Ph.D
November 5, 2013

 Terrorism has emerged in the last decade as one of the most critical issues with which governments must contend, topping most Western nations’ agendas in terms of resource allocation. For example, some reports indicate the United States has spent more than one trillion dollars waging the “War on Terror” – money and resources that may have been allocated very differently in the absence of such threats.  


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing