Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

July 2017 SEC cover

2017 July

Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.

  • Cover Story
  • Featured Articles
  • Columns
  • Departments

Cover Story

Back to Top

Featured Articles

Back to Top
American Jihadist

What Does an American Jihadist Look Like Online?

July 1, 2017

In addition to its research into cybercrime, terrorism and security threats worldwide, the George Washington University’s Center for Cyber & Homeland Security’s Program on Extremism homes in on extremist and terrorist threats and trends, seeking to provide empirical information that policymakers and security leaders can wrap their heads around on this complex and evolving challenge.


Read More
Those charged with maintaining security at stadiums

When Touchdowns Lead to Earthquakes

Ed Finkel
July 1, 2017

The subject of security at sports venues usually revolves around traditional violence-related concerns like terrorism, active shooter or possibly drunken and rowdy fans getting into brawls.


Read More
Admit One

Growing Terrorism Threats Lead Sports Security Leaders to Change Tactics

Security directors in sports venues need to address challenges without undermining the fan fun and entertainment.
Ed Finkel
July 1, 2017

The terrorist incident at the Ariana Grande concert in Manchester, United Kingdom, in May raised new questions of how arenas that house sporting events and other types of attractions such as concerts can ensure fan safety.


Read More
Guarding Against ‘Dirty Bombs’ and Other Radiation Weaponry

Guarding Against 'Dirty Bombs' and Other Radiation Weaponry

Ed Finkel
July 1, 2017

Sports venues for many years have been on the lookout for weapons like guns and knives at their entrance ways, and it would probably be very difficult for a bad actor to enter a stadium with a nuclear warhead.


Read More
Leading the Cultural Revolution

Leading the Cultural Revolution for Security Leadership

Larry Pomykalski
July 1, 2017

Being an enterprise security manager in today’s world is getting more complex and challenging by the minute.


Read More

Columns

Back to Top
Insights on Emergency Management

Emergency & Medical Response Planning for Mass Casualty Terror Attacks

Dean C. Alexander Alex I. Halpern
July 1, 2017

This article addresses lessons learned from selected mass casualty terror attacks in Western Europe (Nice, Paris, Brussels and Oslo) and the United States (Orlando, San Bernardino and Boston).


Read More
Five Secrets for Incident Response

5 Secrets for Cyber Incident Response

diane-2016-200.jpg
Diane Ritchey
July 1, 2017

In theory, responding to a data breach should be straightforward.


Read More
Cyber Incident Recovery

3 Questions to Improve Cyber Incident Recovery

Chabinsky-2016-200px.jpg
Steven Chabinsky
July 1, 2017

The NIST Cybersecurity Frame-work focuses twice on the concept of improvement, doing so within both the Respond and the Recover functions.


Read More
You Are Already Obsolete

You Are Already Obsolete; It's Time to Evolve

Phil Aronson
Phil Aronson
July 1, 2017

I send a team of people every year to conferences in our industry such as The Great Conversation in Security, ISC West, ASIS and PSA Tec.


Read More
Competency-Based Interviews

Competency-Based Interviews

Brennan-2016-200px.jpg
Jerry J. Brennan
July 1, 2017

Many organizations have a defined set of competencies they value and have woven into their culture.


Read More
Trust: Difficult to Get – Easy to Lose

Trust: Difficult to Get – Easy to Lose

Mattice-2016-200px.jpg
Lynn Mattice
July 1, 2017

Trust can be fleeting.


Read More

Departments

Back to Top
Percentage of Agencies with a Formal Prevention Program

Federal Agencies Increasing Their Focus on Insider Threats

July 1, 2017

Eighty-five percent of federal IT managers say their agency is more focused on combating insider threats today than one year ago, and most are formalizing their efforts through formal insider threat programs, according to MeriTalk’s 2017 Federal Insider Threat Report, underwritten by Symantec


Read More
Changes to ASIS 2017 Education Program

Changes Coming to ASIS 2017 Education Program

July 1, 2017

The heart of the ASIS International Annual Seminar and Exhibits has been its education program, and in 2017 there are many exciting changes to the ASIS 2017 conference program.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Job interview

Why Security Teams Can No Longer Ignore Recruitment Fraud

Woman in suit

Can the Industry Do More for Women in Security?

Cyber tech background

Security’s Top Cybersecurity Leaders 2026

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing