Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2014 March

In the March issue of Security Magazine, read how to leverage a GSOC for Unified International Security, sneak a peek at the ISC West 2014 technology and see how you can get realistic results from security technology. If you're traveling abroad, there are 24 easy steps to follow for data security, and traveling or not, this month we're giving you the top steps in handling an executive kidnapping.

  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top

How to Leverage a GSOC for Unified International Security

Across one entire wall of the room are dozens of camera feeds.
diane-2016-200.jpg
Diane Ritchey
March 1, 2014

Operators in the room are on their phones, either receiving or relaying information about security – physical and cyber-related events. Welcome to Exelon’s Security Operations Center (ESOC), with three entities: the ESOC, the Incident Command Center (ICC) and the Cyber Security Operations Center (CSOC).


Read More

Featured Articles

Back to Top

How Boston Hotels Are Adopting Twitter for Emergency Communication

Twitter allowed Boston’s hotels to communicate reliable information to their guests and employees.
Michael J. Soper
March 1, 2014

The lessons learned following the Boston Marathon bombings were many, but one lesson that was learned rather quickly was that Twitter was going to become the go-to platform for gathering timely and accurate information from city, state and federal officials regarding the rapidly unfolding events of that week.


Read More

ISC West 2014: New Technology Showcase

ISC West is fast approaching – April 2-4 – so while you’re booking your travel to the show, take a few moments to scope out what innovations you want to see for yourself.
March 1, 2014

Even if you can’t make it to Las Vegas for this year's show, there’s no reason you have to miss out on this year’s technology. Get a sneak peek of what will be shown and debuted at ISC West 2014.


Read More

Preparing for Litigation with Good Documentation

Security planning, regardless of business sector, is a company’s best effort to provide a proactive system to protect property and lives.
Patrick Murphy
March 1, 2014

Despite robust planning, a security director’s worst nightmare is a serious injury or death occurring on company property due to a violent criminal act.


Read More

Accounting for Local Hospitals in Emergency Preparedness

Hospital Incident Command Systems (HICS) are a component of security and emergency management that is often overlooked in many of the disaster plans in the United States.
Dean C. Alexander
March 1, 2014

Counterterrorist operatives perform drills on securing and neutralizing threats at major target areas. Although this is an extremely important concept to master, often ignored is one of the most important components in community disaster preparedness: the local area hospital.


Read More

Adding Badges to Save Budgets in Local Governments

Badging several thousand employees in several hundred different facilities can prove to be very complex.
diane-2016-200.jpg
Diane Ritchey
March 1, 2014

Like every public administration, managing ID/access badges in municipal security comes with significant challenges that include organizational changes, continually shifting economic factors, regulatory compliance and emerging technologies and best practices.


Read More

How Thermal Cameras Protect Critical Infrastructure

Thermal cameras have been a staple of popular culture media for decades, and it is now even available via smartphone.
Claire Meyer
March 1, 2014

But while the smartphone case, debuted at the 2014 Consumer Electronics Show, is marketed primarily for personal use, including identifying wildlife, detecting home energy loss or a variety of other practical and creative uses, thermal cameras remain a valuable investment for enterprise security leaders, even though you can’t fit them in your pocket.


Read More

How Video Surveillance Prevents Crime in Dover, Delaware

Law enforcement agencies are tasked with the difficult job of keeping communities safe, a responsibility that never goes away.
March 1, 2014

Advancements in security technology, however, are giving law enforcement agencies an advantage in the fight against crime. Video surveillance has long been used as a deterrent and tool for capturing incidents as they occur, but recent innovations in IP-based cameras and wireless networks have made it even more practical for law enforcement applications.


Read More

Changing Security with Big Data, the Internet of Things and Social Media

In some sense, our security systems don’t really give us very much information
Steve Van Till
Steve Van Till
March 1, 2014

Recently, there was a mall shooting in which three people died about five miles from my home in Columbia, MD. My wife and I were to have been there getting her phone fixed in the exact part of the mall where the killings took place.


Read More

Columns

Back to Top

Earning Security Success by Monitoring the Marketplace

Knowing what is happening in the marketplace is vital to the success of your enterprise
Mattice-2016-200px.jpg
Lynn Mattice
March 1, 2014

Monitoring emerging trends, customer likes and dislikes, and understanding unmet customer needs can determine how rapid a rate of incline or decline your business experiences. Companies spend millions of dollars conducting surveys of customers, potential customers, industry experts and key opinion leaders to determine if their products or services effectively meet, exceed or miss market expectations.


Read More

Joining the Security Enterprise Mainstream

Security executives are placing more importance on the intangible value-adds that an integrator brings versus just looking for the low-bid provider.
Kyle Hildebrand
March 1, 2014

Most security executives clearly understand cyber security is in a class by itself, and the risks associated with ignoring it are immeasurable. They are surrounding themselves with IT and technical security professionals instead of traditional security staffing and former law enforcement personnel.


Read More

Changing the Definition of Surveillance in the Age of Converged Risk

Surveillance deals with the act of carefully watching someone or something with the specific intent to prevent or detect a crime.
Bob Liscouski
March 1, 2014

The role of the CSO has significantly changed in the past 10 years and will change even more drastically over the next 10. For example, mention “convergence” and lines begin to blur – lines demarcating previously clear-cut, albeit traditional areas of management responsibility, budgets, reporting hierarchies, resourcing needs and geography.


Read More

Checklist: 24 Steps for Data Security While Traveling Abroad

When traveling overseas, there is already plenty of work to do in terms of planning, packing and then actually traveling.
Edward Yakabovicz
March 1, 2014

When we travel, the data we carry and our Internet habits can put our individual privacy and data security at risk.


Read More

The Top Steps to Handling An Executive Kidnapping

The most important step is to understand the level and type of kidnap risk in countries or regions where your organization operates or where employees are expected to travel for business reasons.
Aaron Sanchez
March 1, 2014

If your organization is operating in an area where the risk of kidnap is deemed high, you should consider the Special Risk options available through the insurance market. Carried by many leading underwriters, Kidnap/Ransom and Extortion (KRE) coverage reimburses the losses associated with a kidnap.


Read More

Why Cybersecurity is a Business Necessity

For well over a decade, CEOs have been relegating the operational, legal, reputational and competitive risks associated with cybersecurity to those responsible for Information Technology.
Chabinsky-2016-200px.jpg
Steven Chabinsky
March 1, 2014

Cybersecurity is the unsung linchpin of every company that has grown increasingly dependent upon vulnerable technologies, whether to communicate, to store sensitive data, or to manufacture and deliver its products and services.


Read More

Getting Realistic Results from Security Technology

As the security industry heads to the largest technology trade show in the world, ISC West in Las Vegas, it is a great time to do an inventory and reflect on your security technology investments and systems
Mark McCourt
March 1, 2014

There will be more than 1,000 exhibits at ISC West plus another 100 or so new technologies and solutions presented in hotel suites and meeting rooms off the show floor. Robust discussion about the movement toward IP, mobility and the cloud will buzz across the show floor, as it should.


Read More

Working with Canines in Healthcare

No one is quite sure when humans first domesticated dogs, however, dogs and people have been working side by side for thousands of years.
diane-2016-200.jpg
Diane Ritchey
March 1, 2014

Dogs have become an integral part of many people’s lives, not just as companions, but also as guide dogs, search-and-rescue dogs, and bomb- or drug-sniffing dogs, such as the ones used last month for Super Bowl security. Police forces in major cities use police dogs to track criminals, sniff out illegal materials, search buildings, and do other jobs human police officers can’t do as well as a dog can.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing