In the July issue, read about how information-sharing and security officer training are helping sports security leaders on game day and beyond. Plus, read about how hospitals are battling against employee abuse and workplace violence, personal branding for career advancement, key control technology & more.
“The country’s come quite a long way. Fans now expect security, and it made me feel good that I could take my wife and daughter to a baseball game, spend a couple hundred dollars, and feel safe about it,” says Adam Stockwell, Vice President of Security for the Milwaukee Bucks.
“For us, a game day activity is no small matter,” says James (Jimmy) Johnson, Assistant Vice President for Campus Safety at the University of Texas at Austin.
No kidding – Longhorn football games regularly sell out, hosting more than 100,000 fans in the Darrel K Royal (DKR)-Texas Memorial Stadium, not counting the small army of vendors, staff, security personnel and law enforcement that keep operations running smoothly.
From pharmaceuticals to documents to electronic devices or forensic evidence, maintaining security for various assets can be paramount to compliance in some organizations.
When the Mercedez-Benz Stadium was being built, leadership at AMB Sports & Entertainment decided to aim high when it comes to the quality of experience for fans attending events and games there. One key factor to becoming an “elite” venue, says Joe Coomer, CSSP, Vice President, Security, AMB Sports & Entertainment, was the game day associates – including parking attendants, ushers, beer vendors, the popcorn guy and, of course, the security staff.
The security industry’s calendar seems to revolve around a few key events: ISC West, ASIS International’s Global Security Exchange (GSX), ISC East… But have you ever considered how much effort goes into securing tradeshows and other large-scale events?
Police have benefited from in-car video and surveillance for decades, but private security departments rarely utilize this asset. Here’s why: Since most security departments do not perform vehicle stops, in-car video systems are not believed to be of value. Also, cost is a deterrent.
Violence perpetrated against employees by patients, their families, and unauthorized visitors – including estranged members of employees’ own families – tops the list of concerns and threats for healthcare security directors.
Go to any security conference and you’ll be quick to discover that getting “buy-in” and maintaining a “seat at the table” are still the predominant concerns among security leaders. After all, unlike other business units that bring in revenue directly, corporate security must show that it is not merely a cost center but a cost- (and sometimes a life-) saver.
Mass notification systems (MNS), since becoming part of the Clery Act in 2010, are an integral part of how colleges and universities communicate with students and faculty. Security and police departments put in the time and effort to implement these notifications systems for important security situations.
Every security professional should plan their career objectives and develop a broad range of experience and competencies. This is a proven method for achieving your career goals. Development of a personal brand is equally important and should occur simultaneously. It will positively affect both your reputation and your marketability.
I love technology. My college degree is in math. I enjoy solving problems using technology. I love its disruptive nature. It can force us to rethink the way we do things. It changes us; how we think of ourselves, our families, our work and our society. It provides hope to the crippled, opportunities for the poor and disenfranchised, and healing for our environment. Its potential is a two-sided blade. It can harm us or help us. It can be used for good or evil.
When NIST recently updated its Cybersecurity Framework, it added only one new core category: Supply Chain Risk Management (SCRM). Placed within the Framework’s “Identify” function, SCRM encompasses, but typically extends beyond, traditional vendor management approaches. That’s because the supply chain typically extends beyond suppliers to include other external parties, such as integrators and even third-party communications providers.
Shoplifting continues to rise, according to the 30th Annual Retail Theft Survey from Jack L. Hayes International, Inc. 432,046 shoplifters and dishonest employees were apprehended in 2017, up 1.7 percent from 2016.
From September 23-27, ASIS International is bringing its world-class networking events to Las Vegas for Global Security Exchange (GSX), formerly the Annual Seminar and Exhibits. ASIS is pulling out all the stops, offering invaluable opportunities to forge new connections and build existing relationships at the industry’s premier networking events.