This month, Security magazine highlights emergency preparedness and natural disaster planning during COVID-19. Also, experts discuss the changing role of security, a new approach to workplace violence prevention, fostering an inclusive environment within the enterprise, future security career challenges and more!
Tried-and-true protocols don't work or can't be enforced during a global health crisis. Emergency disaster planning must now expand to consider insufficient hospital capacity, workforce shortages, delays in supplies and materials, and funding shortfalls. Ensure your organization is prepared for the next disaster with these six tips.
If an armed assailant started shooting in your facility, could you, your employees and your organization survive? If your answer is "I have no idea," now's the time to take a proactive approach to preventing violence.
Progress in diversity and inclusion is being made, albeit slow. Here's how your team can foster an environment of diversity and inclusion for better performance and agility within your department and enterprise-wide.
Threat actors who phish see themselves as businesspeople, even if that business is illegal. They’re always seeking ways to maximize their profits, and with phishing, they know they can do that by better tailoring the email lure to resonate with the intended recipient.
By the end of 2020, it is expected that more than 59 zettabytes of data will be generated globally. With access to data from sources such as social media, news and the dark web, encrypted connected security systems, and public and company-proprietary records and communications, physical security and safety professionals are challenged not only with parsing through this “big” data but transforming it into actionable intelligence.
Michael Oberlaender has had cybersecurity leadership positions and CSO/CISO titles at enterprises around the world. He’s recovered companies from data breaches, built cyber-hardening strategies and policies, implemented cybersecurity budgets, forged relationships and communications with the C-suite, analyzed risks, and dealt with privacy laws around the world.
Lessons are best learned when we don’t expect them. When someone proselytizes us or pontificates, our defenses go up. Therefore, the best time to influence someone is when their guard is down.
As what has been a unique and difficult year for many finally comes to a close, I find I have been engaging in a significant number of conversations regarding what the future holds for security careers in these challenging market conditions.