Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

SEC September cover

2016 September

Who are the thought-leaders pushing the security industry forward, in government, cybersecurity, corporate security and education? Learn about this year’s security champions in our annual Most Influential People in Security report. Also in this issue: Data security concerns for healthcare institutions; ruggedized security technology; covert surveillance installations; how to polish up your resume and references; infinity background screening for workplace violence risk mitigation and more.

  • Cover Story
  • Featured Articles
  • Columns
  • Departments

Cover Story

Back to Top
Cover-feature-MIP
Special Feature

The Most Influential People in Security 2016

Impacting enterprises, communities and nations, these 19 leaders are making a difference in the security industry.
diane-2016-200.jpg
Diane Ritchey
September 1, 2016

Every year, Security magazine is pleased to honor top security executives and leaders who positively impact the security industry, their organization, their colleagues and peers, as well as the national and global security landscape.


Read More

Featured Articles

Back to Top
retail-feature

Preventing Loss and Preserving the Customer Experience

Retail loss prevention faces numerous challenges in a changing and dynamic retail environment.
September 1, 2016

Several years ago, an organized shoplifting ring near Buffalo, New York, stole millions of dollars in merchandise from big box stores such as Walmart, Sears, Home Depot, JoAnn Fabrics, Tops and Wegmans.


Read More
spot feature slide

Healthcare Institutions Ramping Up Data Security Prescriptions

Despite sensitivity of data, many have been slower to lock it down than other industries.
Ed Finkel
September 1, 2016
Hospitals and medical centers face a panoply of threats and challenges around data security, yet the healthcare field has not yet responded as quickly as others, according to chief information security officers (CISOs) and others close to such institutions.
Read More
In Tough Environments, Security Gets More Resilient

In Tough Environments, Security Gets More Resilient

How tough can it get? Deep in snow tough. Egg-cooking hot. Salty-dog environments near the sea. How rugged are your security solutions?
zalud-2016-200px.jpg
Bill Zalud
September 1, 2016
It can get tough out there. Common challenges include limited visibility due to illumination problems or environmental factors, as well as vibration and background noise with video solutions.
Read More
The Hard Rock Casino and Hotel

Developing Low-Profile Surveillance for High-Profile Security

In the continually moving environment of a casino, adding covert surveillance tools proves an unobtrusive way to get unobstructed images.
Claire Meyer
September 1, 2016

It’s not Spy vs. Spy; it’s good security.


Read More
The 'People' Part of Enterprise Cybersecurity Strategies

The 'People' Part of Enterprise Cybersecurity Strategies

Wesley Simpson
September 1, 2016

For many years, enterprise leaders have approached their network and systems defense strategies with a technology-centric focus


Read More

Columns

Back to Top

Becoming a Global Chief Security Executive Officer

diane-2016-200.jpg
Diane Ritchey
September 1, 2016

I’m pleased to offer an excerpt from the book Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, by author Roland Cloutier and published by Syngress.


Read More
The Corner Office

The 'Insecurity' Profession

Phil Aronson
Phil Aronson
September 1, 2016

Imagine a world of things that serve you. Sensors and machines that collect information about everything: your environment, your presence, your calendar and your diet.


Read More
Jerry Brennan

Selecting the Right References Proves Critical for Job Searches

Brennan-2016-200px.jpg
Jerry J. Brennan
September 1, 2016

During the course of the recruitment process, you will inevitably be asked to provide contact details for, on average, four to six references.


Read More
Lynn Mattice

Who's the Boss? Reporting to the Chief Human Resources Officer

Mattice-2016-200px.jpg
Lynn Mattice
September 1, 2016

Last month’s column addressed the security organization reporting to the Chief Financial Officer.


Read More

How Continuous Is Continuous Monitoring?

Chabinsky-2016-200px.jpg
Steven Chabinsky
September 1, 2016

To quote Shakespeare, “What’s in a name?”


Read More
Barry Nixon

The Emergence of Infinity Screening to Mitigate Risk

Barry Nixon
Barry Nixon
September 1, 2016

The practice of conducting employment background screening has been around a long time and has become ubiquitous that it is inexplicably tied to the employment hiring process.


Read More
Bill Zalud photo

Goodbye, Bill

diane-2016-200.jpg
Diane Ritchey
September 1, 2016

We have lost a dear friend and valued colleague: Bill Zalud, who passed away last month in Chicago.


Read More

Departments

Back to Top

Americans Changing Travel Plans Due to Terrorism Risks

September 1, 2016

Eighty-six percent of Americans are concerned about terrorist attacks occurring while on vacation in various regions of the world, prompting many to make major changes to their travel plans.


Read More
Brings HD Quality Video and IP Functionality to Analog Surveillance HD Analog DVR from Dahua Technology

Brings HD Quality Video and IP Functionality to Analog Surveillance

September 1, 2016

This 8-channel HDCVI 3.0 DVR brings HD quality video and IP functionality to long-distance transmissions over coax cable.


Read More
Stores Virtual Credentials on  Smartphones for Access Management MACE from Nedap Identification Systems

Stores Virtual Credentials on Smartphones for Access Management

September 1, 2016

This platform, Mobile Access Control Entities, supports Bluetooth, NFC and QR-codes to identify people using virtual credentials, which are stored in a MACE app.


Read More
Allows for Quick, Enhanced and Adaptable Surveillance Public Safety Video System from Edge360 and IDIS

Allows for Quick, Enhanced and Adaptable Surveillance

September 1, 2016

This mobile surveillance system is purpose-built to assist public safety personnel in the coverage of urban events and incidents, especially those of a chaotic or changing nature, such as large sporting events or city-wide festivals.


Read More
Redefines User Experience to Improve Access Management Sielox Pinnacle v. 10

Redefines User Experience to Improve Access Management

September 1, 2016

The latest version of this access control platform features a new look and feel to accommodate wider monitors, compatibility with the latest operating systems, up to 16 privilege levels for responders during lockdown, data sharing, integration with biometrics, and more.


Read More
Provides Intuitive Access with Low Energy Requirement Winglock Swing from Boon Edam

Provides Intuitive Access with Low Energy Requirement

September 1, 2016

This single-wing access gate is designed to either coordinate with the Speedlane Lifeline series or be used as a standalone installation.


Read More
Features Pan/ Tilt Capabilities Over WiFi O2CP2 WiFi IP Camera from Speco Technologies

Features Pan/Tilt Capabilities Over WiFi

September 1, 2016

This 1080p WiFi camera features motorized pan and tilt capabilities for expanded coverage and control.


Read More

Report Suggests Physical Security Information Management Market to Grow

Kylie Bull
September 1, 2016

Analysts from Research and Markets forecast the global physical security information management market to grow at a CAGR of 14.82 percent during the period 2016-2020.


Read More

OSCE-Trained Cyber Officers Start Work in Ukraine

Kylie Bull
September 1, 2016

On July 18, 84 cyber-police officers, trained by the Office for Security and Cooperation in Europe (OSCE) started work in Ukraine on the grounds of Kharkiv National University of Internal Affairs.


Read More

Biometric Payments Trusted by Majority of Europeans

Kylie Bull
September 1, 2016

Visa’s Biometric Paymentsstudy, which surveyed 14,000 people across Europe, revealed that 73 percent of people think biometric security checks on a payments device is a secure authentication, with fingerprint the preference for 81% of consumers, followed by iris scanning.


Read More

Malaysia to Increase Airport Security

Kylie Bull
September 1, 2016

Malaysia’s government has proposed to increase security at the country’s international airports in the wake of terrorist attacks at similar facilities overseas, such as Brussels, Belgium; and Ataturk, Turkey.


Read More

National Security in Jamaica Receives JD1 Billion Boost

Kylie Bull
September 1, 2016

Jamaica’s Ministry of Tourism will contribute a further 1 billion Jamaican dollars to the Ministry of National Security to assist with security and law enforcement across the island.


Read More

Maritime Companies Warned of Cyber Attacks

Kylie Bull
September 1, 2016

The International Maritime Bureau (IMB) is asking shipping and maritime companies to be vigilant to the potential commercial impact that cyber attacks can cause.


Read More

UK Official Calls for Security Spending Review Post-Brexit

Kylie Bull
September 1, 2016

Professor Malcolm Chalmers, Deputy Director-General of the UK’s Royal United Services Institute (RUSI) has argued that the British public’s decision to leave the European Union would necessitate a significant a shift in UK national strategy and has called for a new Strategic Defence and Security Review (SDSR).


Read More

EU Enacts New Law to Improve Critical Infrastructure Cybersecurity

Kylie Bull
September 1, 2016

Firms supplying essential services – such as energy, transport, banking and health, or digital services – such as search engines and cloud services, will have to improve their ability to withstand cyber attacks under the first EU-wide rules on cybersecurity, approved by the European Parliament in July.


Read More

Europeans Call for Increased Action on Terrorism

Kylie Bull
September 1, 2016

The European Police Agency Europol released its annual terrorism trend report on July 20.


Read More

Employers Implementing 'Zero Tolerance' Policies on Workplace Violence

September 1, 2016

In response to recent mass shootings at U.S. workplaces, 52 percent of employers have updated or implemented a “zero tolerance” workplace violence prevention policy, according to The Executive Employer Surveyfrom labor law firm Littler Mendelson.


Read More

Singapore Tops Bill as Lowest Risk Country

September 1, 2016

According to The Pinkerton Risk Index: A Spatial Analysis of Risk Around the World, Singapore is the world’s lowest risk country for business.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Half open laptop

4 Data Security Incidents to Know About (February 2026)

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing