Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

2015 September

Change-makers, thought leaders and industry pioneers, these 16 security executives, legislators and mavericks are making a difference in security, impacting enterprises, communities and nations. Can Hackers Really Control Airplanes? Discover 3 steps for timely cyber intrusion detection. Read all this and more in the September 2015 issue of Security.

  • Cover Story
  • Featured Articles
  • Columns
  • Departments

Cover Story

Back to Top

The Most Influential People in Security 2015

Claire Meyer
September 1, 2015

Every year, Security magazine honors top security executives and leaders who positively impact the security industry, their organization, their colleagues and peers, as well as the national and global security landscape. They have been nominated by their colleagues and associates, and were chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have had upon their shareholders, organizations, colleagues and the general public.


Read More

Featured Articles

Back to Top
hacker screen

Myth vs. Reality: Can Hackers Really Control Airplanes?

Max Leitschuh
September 1, 2015

Malicious actors don’t need to take over airplanes to wreak havoc on airline operations.


Read More

Finding High-Benefit, Low-Cost SMB Access Control

zalud-2016-200px.jpg
Bill Zalud
September 1, 2015

For smaller facilities wanting a low-cost, high-benefit access solution, it’s no longer an issue of wanting champagne on a beer budget.


Read More

Building Business Value in Loss Prevention

zalud-2016-200px.jpg
Bill Zalud
September 1, 2015

Video analytics are driving actionable intelligence for retail businesses – how can you get on board?


Read More

Increased Cyber Threat Intelligence in the Electricity Sector

Brian Harrell, CPP
Brian Harrell, CPP
September 1, 2015

To battle cyber threats, the utility industry and government intelligence agencies must act in unison to stay one step ahead.


Read More

Predictive Analysis Applied to Risk & Threat

Benjamin M. Butchko
September 1, 2015

Risk analysis is a well-established and widely used tool in strategic planning and budget development.


Read More

Developing a High-Class Security Brand

Claire Meyer
September 1, 2015

In North Carolina, High Point University is in its tenth year of a transition into a private, boutique university, and the security department is not exempt from the changes impacting the school. When Jeff Karpovich, CPP, CHPA, joined High Point University as its chief of Security, there were just 12 employees in the division and 62 surveillance cameras. Now, seven years later, he is responsible for 120 employees across three departments, managing 82 uniformed security officers for the school and working with approximately 900 surveillance cameras.


Read More

3 Steps for Timely Cyber Intrusion Detection

Michael Moshiri
September 1, 2015

You cannot prove your enterprise has not been hacked, but there are methods to mitigate your risk of an undetected breach.


Read More

How to Build a Quality Security Team

William Losefsky Kevin Mulcahy
September 1, 2015

For average results, aim for average goals. For extraordinary security and customer service, aim higher.


Read More

Columns

Back to Top

Don't Gamble with Your Future!

Brennan-2016-200px.jpg
Jerry J. Brennan
Mattice-2016-200px.jpg
Lynn Mattice
September 1, 2015

We have heard from a number of security executives about a very disturbing trend taking place when contracting out various services to support security programs. These reports indicate that a decline may be occurring in the integrity and ethical standards of a number of security services providers.


Read More

The Islamic State and Its Implications for Security

Dean C. Alexander
September 8, 2015

The so-called “Islamic State” (IS) that has swept into power in parts of Syria and Iraq presents an imminent danger to the global community, with its capacity as an effective, ideologically motivated and bloodthirsty fighting force, coupled with its expanding territorial reach, on the ground and online.  


Read More

Securing Operations in the Middle East and West Africa

Chris Mackmurdo
September 1, 2015

There is a wealth of business opportunities for companies seeking to meet growing demands for capital in frontier and emerging markets. The Middle East and West Africa are no exceptions.


Read More

Why Your Business Environment Should Drive Cybersecurity

Chabinsky-2016-200px.jpg
Steven Chabinsky
September 1, 2015

This is the second in a recurring series that explores the cybersecurity principles and best practices found within the National Institute of Standards & Technology Cybersecurity Framework. You may recall from last month’s column that NIST organizes cybersecurity risk management into five high-level functions: Identify, Protect, Detect, Respond and Recover.


Read More

Celebrating Resiliency 10 Years after Hurricane Katrina

diane-2016-200.jpg
Diane Ritchey
September 1, 2015

It’s not just the resiliency of the citizens of New Orleans that has earned the right to be celebrated this hurricane season. Businesses should also be celebrated for their resiliency. I recently spoke with executives from Cooperative Processing Resources (CPR) and LifeShare Blood Centers about the ways they avoided severe downtime during Hurricane Katrina, and bounced back as even more resilient organizations.


Read More

Departments

Back to Top

Federal Prosecution for White Collar Crime Hits 20-Year Low

September 1, 2015

During the first nine months of FY 2015, the U.S. government brought 5,173 white collar crime prosecutions. If the year’s pace continues until the end of FY 2015 in September, the total will only be 6,897 – down by 36.8 percent from levels seen two decades ago, despite the rise in population and economic activity during this period, according to a report from Syracuse University’s Transactional Records Access Clearinghouse (TRAC).


Read More

Study Finds School Shootings, Mass Killings are 'Contagious'

July 6, 2015

Mass killings and school shootings spread "contagiously," a new study found.


Read More

Designed for IP Setup Simplicity

September 1, 2015

This series of network video recorders (NVRs) come with either 4- or 8-port embedded Power over Ethernet (PoE) switches, and they are pre-configured with video management software and have 2TB and 4TB of storage, respectively.


Read More

Blends Advanced Wireless Access Control and Décor

September 1, 2015

This access control solution offers customizable designer locking form factors in a variety of trims and finishes, pairing with advanced wireless access control on smartphones.


Read More

Unfolds to Create Ballistic Shield

September 1, 2015

This shield looks like an average laptop bag, but built into it is a lightweight and discreet ballistic shield – a three-foot long blanket of protection against most handgun, shotgun and pistol-caliber sub-machine gun threats.


Read More

Reduces Investigation Times by Organizing Events

September 1, 2015

For busy investigators and security departments, this VMS organizes and manages events and create incident reports.


Read More

Uses Location-Tagged Data to Gather Social Intelligence

September 1, 2015

This updated social media monitoring and analysis platform enables the use of location-tagged data to discover, engage and analyze content across Twitter, Instagram, Facebook, YouTube, Picasa, Flickr, Sina Weibo and other social media channels.


Read More

Reduces Cost of Repairs from Vandalism or Harsh Environments

September 1, 2015

These rugged smart card access control readers feature stainless steel construction, epoxy encapsulated electronics, audiovisual feedback, and a modern low-profile design, which helps reduce the cost of repairs and replacement due to vandalism and harsh environments.


Read More

44% of Companies Report Risks of Doing Business Are Increasing

September 1, 2015

Cybersecurity continues to climb the list of concerns for business leaders, along with executives’ concerns over medical cost inflation, legal liability, attracting and retaining talent, compliance and apprehension over economic uncertainty.


Read More

Registration Still Open for ASIS 2015

September 1, 2015

It’s still not too late to register for ASIS International 61st Annual Seminar & Exhibits, September 28 to October 1, in Anaheim, California.


Read More

You're Invited: Texas Night at ASIS International

September 1, 2015

Y’all come join us at the 2015 TEXAS NIGHT and help us kick-off the 61st annual ASIS International Seminar & Exhibits in Anaheim, California, on Sunday, September 27 at 7 p.m. at Tortilla Jo’s in Downtown Disney.


Read More

Would You Flunk a Cybersecurity Test?

September 1, 2015

When asked seven questions related to cybersecurity during an AARP survey, 45 percent of respondents (aged 18 and older) failed the quiz, answering just four or fewer questions correctly.


Read More

Provides Intrusion Detection Day and Night

September 1, 2015

This bullet camera combines 24/7 high-contrast thermal video and high-performance built-in video motion detection to provide intrusion detection and visual awareness in daytime and nighttime conditions.


Read More

September Marks First National Security Officer Appreciation Week

September 1, 2015

The week of September 20, 2015, AlliedBarton Security Services is establishing the first annual National Security Officer Appreciation Week. Subsequent years will feature this event during the third full week of September.


Read More

Attend the 2015 Security 500 Conference

September 1, 2015

Registration is now open for the Annual Security 500 Conference, to be held November 16, 2015, at the Hyatt Regency in Washington D.C.


Read More

Security Concerns Discourage Business Travelers from Ride-Sharing

September 1, 2015

 The most important factors business travelers and travel buyers consider when choosing ground transportation is traveler and vehicle safety, followed by availability for a timely pick-up and convenience of payment methods, according to The2015 Ground Transportation Study, sponsored by Dav El/Boston Coach Chauffeured Transportation Network and Empire CLS Worldwide Chauffeured Services.  


Read More

Streamlines Security Door Maintenance to Minimize Downtime

September 1, 2015

An update to the existing BoonConnect software tool will enable technicians to access a verity of door functions remotely to resolve issues faster and minimize downtime.


Read More

Provides Personalized Self- Service Venue Management

September 1, 2015

This operational intelligence solution covers many customer service operations processes at venue entries, including welcoming and greeting, access control and ticket validation, marketing and sponsorships, and non-intrusive security screening.


Read More

Angling for Fraud Detection Buy-In

September 1, 2015

The impact of digital technology on fraud investigations has yet to reach the C-Suite.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing