Change-makers, thought leaders and industry pioneers, these 16 security executives, legislators and mavericks are making a difference in security, impacting enterprises, communities and nations. Can Hackers Really Control Airplanes? Discover 3 steps for timely cyber intrusion detection. Read all this and more in the September 2015 issue of Security.
Every year, Security magazine honors top security executives and leaders who positively impact the security industry, their organization, their colleagues and peers, as well as the national and global security landscape. They have been nominated by their colleagues and associates, and were chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have had upon their shareholders, organizations, colleagues and the general public.
In North Carolina, High Point University is in its tenth year of a transition into a private, boutique university, and the security department is not exempt from the changes impacting the school. When Jeff Karpovich, CPP, CHPA, joined High Point University as its chief of Security, there were just 12 employees in the division and 62 surveillance cameras. Now, seven years later, he is responsible for 120 employees across three departments, managing 82 uniformed security officers for the school and working with approximately 900 surveillance cameras.
We have heard from a number of security executives about a very disturbing trend taking place when contracting out various services to support security programs. These reports indicate that a decline may be occurring in the integrity and ethical standards of a number of security services providers.
The so-called “Islamic State” (IS) that has swept into power in parts of Syria and Iraq presents an imminent danger to the global community, with its capacity as an effective, ideologically motivated and bloodthirsty fighting force, coupled with its expanding territorial reach, on the ground and online.
There is a wealth of business opportunities for companies seeking to meet growing demands for capital in frontier and emerging markets. The Middle East and West Africa are no exceptions.
This is the second in a recurring series that explores the cybersecurity principles and best practices found within the National Institute of Standards & Technology Cybersecurity Framework. You may recall from last month’s column that NIST organizes cybersecurity risk management into five high-level functions: Identify, Protect, Detect, Respond and Recover.
It’s not just the resiliency of the citizens of New Orleans that has earned the right to be celebrated this hurricane season. Businesses should also be celebrated for their resiliency. I recently spoke with executives from Cooperative Processing Resources (CPR) and LifeShare Blood Centers about the ways they avoided severe downtime during Hurricane Katrina, and bounced back as even more resilient organizations.
During the first nine months of FY 2015, the U.S. government brought 5,173 white collar crime prosecutions. If the year’s pace continues until the end of FY 2015 in September, the total will only be 6,897 – down by 36.8 percent from levels seen two decades ago, despite the rise in population and economic activity during this period, according to a report from Syracuse University’s Transactional Records Access Clearinghouse (TRAC).
This series of network video recorders (NVRs) come with either 4- or 8-port embedded Power over Ethernet (PoE) switches, and they are pre-configured with video management software and have 2TB and 4TB of storage, respectively.
This access control solution offers customizable designer locking form factors in a variety of trims and finishes, pairing with advanced wireless access control on smartphones.
This shield looks like an average laptop bag, but built into it is a lightweight and discreet ballistic shield – a three-foot long blanket of protection against most handgun, shotgun and pistol-caliber sub-machine gun threats.
This updated social media monitoring and analysis platform enables the use of location-tagged data to discover, engage and analyze content across Twitter, Instagram, Facebook, YouTube, Picasa, Flickr, Sina Weibo and other social media channels.
These rugged smart card access control readers feature stainless steel construction, epoxy encapsulated electronics, audiovisual feedback, and a modern low-profile design, which helps reduce the cost of repairs and replacement due to vandalism and harsh environments.
Cybersecurity continues to climb the list of concerns for business leaders, along with executives’ concerns over medical cost inflation, legal liability, attracting and retaining talent, compliance and apprehension over economic uncertainty.
Y’all come join us at the 2015 TEXAS NIGHT and help us kick-off the 61st annual ASIS International Seminar & Exhibits in Anaheim, California, on Sunday, September 27 at 7 p.m. at Tortilla Jo’s in Downtown Disney.
When asked seven questions related to cybersecurity during an AARP survey, 45 percent of respondents (aged 18 and older) failed the quiz, answering just four or fewer questions correctly.
This bullet camera combines 24/7 high-contrast thermal video and high-performance built-in video motion detection to provide intrusion detection and visual awareness in daytime and nighttime conditions.
The week of September 20, 2015, AlliedBarton Security Services is establishing the first annual National Security Officer Appreciation Week. Subsequent years will feature this event during the third full week of September.
The most important factors business travelers and travel buyers consider when choosing ground transportation is traveler and vehicle safety, followed by availability for a timely pick-up and convenience of payment methods, according to The2015 Ground Transportation Study, sponsored by Dav El/Boston Coach Chauffeured Transportation Network and Empire CLS Worldwide Chauffeured Services.
An update to the existing BoonConnect software tool will enable technicians to access a verity of door functions remotely to resolve issues faster and minimize downtime.
This operational intelligence solution covers many customer service operations processes at venue entries, including welcoming and greeting, access control and ticket validation, marketing and sponsorships, and non-intrusive security screening.