Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

September cover

2022 September

This month, Security magazine presents its annual Most Influential People in Security 2022 report, honoring men and women who have shaped the security function at their organizations and the industry as a whole. These professionals represent the depth, breadth and diversity that make up security professionals across all functions, roles and responsibilities within the industry.

Throughout this month, check out stories on access control, cybersecurity burnout and management, executive security roles, corporate risk protection, and more! 

  • Cover Story
  • Featured Articles
  • Columns
  • Departments

Cover Story

Back to Top
most influential logo
Special Report

The Most Influential People in Security 2022

This year’s Most Influential People in Security recipients represent a small cross section of people protecting their organizations, furthering their missions and elevating the security industry in significant ways.
Security Staff
September 1, 2022

Security’s Most Influential People in Security 2022 represent a number of professionals protecting their organizations, furthering their missions and elevating the security industry in significant ways.


Read More

Featured Articles

Back to Top
Mass Notification and Emergency Communications products
Product Spotlight

Mass notification and emergency communications: Security technology spotlight

Maria Henriquez
September 14, 2022

Security magazine spotlights some mass notification and emergency communication solutions that can help bolster emergency management and preparedness.


Read More
SEC_energy_780x439.jpg
Enterprise Services

Protecting utilities: Top criminal and terrorist targets

A comprehensive, layered and thorough security program is a vital component of any utility or critical infrastructure organization’s operations.
Brian Baker
July 25, 2022

A comprehensive, layered security program is critical for utility or critical infrastructure organization’s operations.


Read More
elementary school students on computers

Setting a national standard for K-12 cybersecurity

Matt Dascoli
June 16, 2022

School districts need to increase their awareness and preparedness to combat cyberattacks. Governments and businesses need to join forces to support districts via training, testing and tools to ensure threat detection, appropriate response and minimal damage.


Read More
reputation
Strategic Security

The issue of corporate risk and reputation

How can a security leader build resilience and internal risk management programs to protect an organization’s reputation and, ultimately, operational continuity?
James Blake
James Blake
September 9, 2022

To protect reputation and operational resilience, security leaders must focus on resilience and internal risk management programs. 


Read More

Columns

Back to Top
zero trust-freepik1170x658v59703.png
Cybersecurity Education & Training

The fundamentals of implementing a zero trust security policy

What exactly does it entail to enforce a zero trust security policy? A lot.
Patrick Beggs
September 1, 2022

A zero trust security approach is an enterprise-wide mindset and commitment. Let’s look at the implementation process and best practices to ensure a smooth transition to zero trust security.


Read More
leaving workplace
Leadership & Management

A chief security officer (CSO) by any other name

Michael Gips
Michael Gips
September 7, 2022

Would a Chief Security Officer (CSO) by any other name retain the same authority, respect and gravitas?


Read More
trophy
Career Intelligence

Are awards valuable to your security career?

Everyone enjoys a trophy but it’s important for security professionals to do their due diligence before accepting.
Pollock-2016-200px.jpg
Joanne R. Pollock
Brennan-2016-200px.jpg
Jerry J. Brennan
September 7, 2022

Everyone enjoys a trophy but it’s important for security professionals to do their due diligence before accepting.


Read More
man on elephant
Cyber Tactics

Flaming torches and cybersecurity

Being a security leader while juggling business priorities and daily operations is a challenge that requires pragmatic solutions.
John McClurg
John McClurg
September 6, 2022

For CISOs, particularly those at a small or medium-sized business (SMB), juggling security and business priorities and operational exigencies require pragmatic solutions.


Read More
person-sitting
Security Talk

Designing schools with mental health in mind

Safety and security stakeholders can empower students and staff to help mitigate mental health issues, violence or unwanted behaviors by starting with facility design.
Maggie Shein
Maggie Shein
September 6, 2022

Safety and security stakeholders can empower students and staff to help mitigate mental health issues, violence or unwanted behaviors by starting with facility design. 


Read More

Departments

Back to Top
flooded street
Global News

Improving national disaster preparedness and resilience

Maria Henriquez
September 16, 2022

How can your enterprise improve disaster resilience and emergency preparedness?


Read More
AI
Global News

5 benefits of humanoid security robots in guarding

Maria Henriquez
September 16, 2022

Learn about the security benefits of robots in guarding. 


Read More
security camera
Global News

Video surveillance cameras optimize security operations

Maria Henriquez
September 14, 2022

Learn about the top security trends in video surveillance.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing