This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Publications » Security Magazine

Security Magazine

march magazine

2022 March

Meet Security’s 2022 Top Cybersecurity Leaders — 12 security professionals whose leadership qualities and contributions have positively shaped their organizations, colleagues and the general public. This year’s recipients are bridging the cybersecurity skills gap, championing diversity and focusing on making the industry safer and more successful as a whole. 

This month, check out stories on school security, travel risk management, NGO security risk management, COVID-19 lessons learned, Iowa State Fair case study, security career tips, leadership and management, cybersecurity journeys and more! 

  • Cover Story
  • Featured Articles
  • Columns

Cover Story

Back to Top
top cyber security
Special Report

Security’s 2022 Top Cybersecurity Leaders

These cybersecurity professionals are bridging the cybersecurity skills gap, championing diversity and focusing on how to make the industry safer and more successful as a whole.
Security Staff
March 1, 2022
Meet Security magazine’s Top Cybersecurity Leaders of 2022 — 12 security professionals who are bridging the cybersecurity skills gap, championing diversity and focusing on making the industry safer and more successful as a whole.
Read More

Featured Articles

Back to Top
man at subway
Enterprise Services

A new era of travel risk management

The past few years have propelled a need for intelligence and scalable travel risk management programs to protect organizations and their people.
Travelauthor
Cal Pratt
March 11, 2022

The past few years have propelled a need for intelligence and scalable travel risk management programs to protect organizations and their people.


Read More
non profit
Education & Training

Security risk management within the nonprofit sector

Lisa Oliveri
March 11, 2022

Security leaders within nonprofits can make basic considerations to protect their organizations and provide robust risk management.


Read More
masks in public
Leadership

COVID-19 lessons learned in enterprise security

Security leaders have learned a number of lessons during the global pandemic that will help with future incident response and operational continuity.
Maggie shein
Maggie Shein
March 9, 2022

Security leaders have learned a number of lessons during the global pandemic that will help with future incident response and operational continuity.


Read More
Iowa state
Integrated Solutions

The Iowa State Fair deploys analytics to maximize security & situational awareness

Attracting more than one million visitors each year, the Iowa State Fair makes safety and security a top priority.
Maggie shein
Maggie Shein
March 9, 2022

One of the oldest state fairs in the United States, the Iowa State Fair attracts more than one million visitors each year. Securing such an event necessitates interagency law enforcement engagement and a dose of security technology.


Read More
online risks
Global News

Top 10 risks for global organizations

Madeline lauver headshot
Madeline Lauver
March 4, 2022

From pandemic risk and reputational damage to supply chain failure and business interruption, these are the top 10 threats for risk management professionals to watch going forward, according to Aon's 2021 Global Risk Management Survey.


Read More

Columns

Back to Top
product spotlight
Product Spotlight

Product spotlight on pandemic management and contact tracing solutions

Security magazine spotlights solutions that aid enterprises in their efforts to mitigate COVID-19 risk, including disinfecting robots, employee wellness checks and more.
Madeline lauver headshot
Madeline Lauver
March 14, 2022

Security magazine spotlights solutions that aid enterprises in their efforts to mitigate COVID-19 risk, including disinfecting robots, employee wellness checks and more.


Read More
cyber tactics
Cyber Tactics

A transformative journey

John mcclurg
John McClurg
March 4, 2022

John McClurg reflects on the transformation of BlackBerry as a handset company to a software company.


Read More
security talk
Security Talk

School security: A focus on doors

Maggie shein
Maggie Shein
March 4, 2022

When it comes to gun violence within schools, security leaders should focus on one practical consideration first: doors.


Read More
raising hands
Leadership & Management

How to practice DIY DE&I

Michael gips headshot
Michael Gips
March 7, 2022

Michael Gips talks about going a step further with diversity, equity and inclusion.


Read More
work meeting
Career Intelligence

The definition of senior security executive

Brennan 2016 200px
Jerry J. Brennan
Pollock 2016 200px
Joanne R. Pollock
March 7, 2022

To understand the senior security leadership role of the future, you must understand organizational approaches to risk-related issues.


Read More
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • Cyber-Security
    Sponsored byConvergeOne

    5 Steps to Building a Cyber-Aware Organization

Popular Stories

cyber-ransomware-freepik1170.jpg

BlackCat/ALPHV ransomware breaches 60+ organizations

phishing attack.png

4 phishing trends observed in Q1 2022

password-freepik1170x658v678.jpg

The 20 most common passwords leaked on the dark web

authentication-freepik1170x.jpg

GitHub notifies organizations of third-party OAuth token theft

ikea-unsplash-1170x658.jpg

IKEA Canada suffers data breach

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
May 18, 2022

The Future of Physical Security Communication with Push-to-Talk 2.0

Security departments have long struggled to bring their real-time voice communications into the present, resorting to communicating with radios, unsecure applications, multiple devices, and Wi-Fi-only solutions.

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

Clear Seas Research

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing