<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Featured Stories</title>
    <description>
      <![CDATA[Featured Stories]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2129-featured-stories</link>
    <language>en-us</language>
    <item>
      <title>A resilience framework for the future</title>
      <author></author>
      <description>
        <![CDATA[<p>By making resilience a priority for an organization, business leaders can reduce disruptions and lessen the consequences from risks that may materialize. To build a framework for the future, considerations must include preparedness, hazard mitigation, insurance and resilience in the context of emerging risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/96211</guid>
      <pubDate>Mon, 04 Oct 2021 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/96211-a-resilience-framework-for-the-future</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2021/10/SEC1021-SR-Building-Feat-slide1_900px.webp?t=1635280786" type="image/jpeg" length="90011"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/2020/10/SEC1021-SR-Building-Feat-slide1_900px.webp?t=1633108372" type="image/jpeg" medium="image" fileSize="90011">
        <media:title type="plain">SEC1021-SR-Building-Feat-slide1_900px.jpg</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/2021/10/SEC1021-SR-Building-slide2_900px.webp?t=1633354550" type="image/jpeg" medium="image" fileSize="50634">
        <media:title type="plain">SEC1021-SR-Building-slide2_900px.jpg</media:title>
        <media:description type="plain">Image courtesy of the National Institute of Building Sciences</media:description>
      </media:content>
    </item>
    <item>
      <title>"Trust" Revisited: The Birth of Continuous Authentication</title>
      <description>
        <![CDATA[<p>The Philosopher Hericlitus once opined &ndash; &ldquo;You can&rsquo;t step in the same river twice,&rdquo; implying that no concept remains static but is always churning and evolving.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91201</guid>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91201-trust-revisited-the-birth-of-continuous-authentication</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-cyber-Feat-slide1_900px.webp?t=1572612900" type="image/jpeg" length="53992"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-cyber-Feat-slide1_900px.webp?t=1572612900" type="image/jpeg" medium="image" fileSize="53992">
        <media:title type="plain">SEC1119-cyber-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-cyber-slide2_900px.webp?t=1572612909" type="image/jpeg" medium="image" fileSize="49817">
        <media:title type="plain">SEC1119-cyber-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>The First 90 Days of Your New Security Job</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>You have just started your role as a senior security leader in a new organization. After having gone through an extensive interview and evaluation process, both you and your new employer likely start this relationship feeling very positive about the future.</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91200</guid>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91200-the-first-90-days-of-your-new-security-job</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-career-Feat-slide1_900px.webp?t=1572612559" type="image/jpeg" length="100733"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-career-Feat-slide1_900px.webp?t=1572612559" type="image/jpeg" medium="image" fileSize="100733">
        <media:title type="plain">SEC1119-career-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-career-slide2_900px.webp?t=1572612568" type="image/jpeg" medium="image" fileSize="51440">
        <media:title type="plain">SEC1119-career-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Vaping and Students: Enterprise Security Needs to Lead the Charge</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[<p>For years, manufacturers have been finding ways to make products more appealing to kids, either by design or through the senses (i.e. smell, taste).</p>
]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91199</guid>
      <pubDate>Fri, 01 Nov 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91199-vaping-and-students-enterprise-security-needs-to-lead-the-charge</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-talk-Feat-slide1_900px.webp?t=1572612105" type="image/jpeg" length="83611"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-talk-Feat-slide1_900px.webp?t=1572612105" type="image/jpeg" medium="image" fileSize="83611">
        <media:title type="plain">SEC1119-talk-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/Novmeber/SEC1119-talk-slide2_900px.webp?t=1572612136" type="image/jpeg" medium="image" fileSize="55684">
        <media:title type="plain">SEC1119-talk-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity for Public-Private Partnerships</title>
      <description>
        <![CDATA[<p>As municipalities continue to harden their frontline defenses against attacks on their IT infrastructure, one area that should not be overlooked are public-private partnerships, as these are prime targets for criminals and others.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91017</guid>
      <pubDate>Mon, 14 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91017-cybersecurity-for-public-private-partnerships</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-edu-Feat-slide1_900px.webp?t=1569927690" type="image/jpeg" length="60153"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-edu-Feat-slide1_900px.webp?t=1569927690" type="image/jpeg" medium="image" fileSize="60153">
        <media:title type="plain">SEC1019-edu-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-edu-slide2_900px.webp?t=1569928051" type="image/jpeg" medium="image" fileSize="58323">
        <media:title type="plain">SEC1019-edu-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Product Spotlight on Mass Notification</title>
      <description>
        <![CDATA[<p>Security manufacturers are providing mass notification and audio solutions to improve emergency response times during active shooter incidents and other emergency events.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91062</guid>
      <pubDate>Fri, 11 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91062-product-spotlight-on-mass-notification</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/Product-Spotlight/SEC1019-prodspot-Feat-slide1_900px.webp?t=1570546041" type="image/jpeg" length="61186"/>
    </item>
    <item>
      <title>Driving K-12's Digital Security and Privacy</title>
      <description>
        <![CDATA[<p>Amid headline-generating K-12 data breaches, the Leander, Texas Independent School District is ensuring its student data practices remain innovative.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91028</guid>
      <pubDate>Mon, 07 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91028-driving-k-12s-digital-security-and-privacy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-profile2-Feat-slide1_900px.webp?t=1570026935" type="image/jpeg" length="107009"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-profile2-Feat-slide1_900px.webp?t=1570026935" type="image/jpeg" medium="image" fileSize="107009">
        <media:title type="plain">SEC1019-profile2-Feat-slide1_900px</media:title>
        <media:description type="plain">“Our leadership team has been very helpful to us in the areas of governance, designating rules and procedures regarding data collection, use, security and the use of online educational programs,” says James Watson of the Leander, Texas Independent School District.

Photo courtesy of the Leander Independent School District.
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-profile2-slide2_900px.webp?t=1570026984" type="image/jpeg" medium="image" fileSize="99558">
        <media:title type="plain">SEC1019-profile2-slide2_900px</media:title>
        <media:description type="plain">“As a target, as a goal, as a deliverable, we are always trying to communicate the value of security,” says James Watson, Security Administrator at the Leander Independent School District in Leander, Texas.

Photo courtesy of the Leander Independent School District.
</media:description>
      </media:content>
    </item>
    <item>
      <title>Managing Risk and Threats at the Exelon Corporation</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[<p>How is Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at Exelon Corporation, mitigating and managing risk on a daily basis?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91025</guid>
      <pubDate>Thu, 03 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91025-managing-risk-and-threats-at-the-exelon-corporation</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-profile1-Feat-slide1_900px.webp?t=1570026160" type="image/jpeg" length="44643"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-profile1-Feat-slide1_900px.webp?t=1570026160" type="image/jpeg" medium="image" fileSize="44643">
        <media:title type="plain">SEC1019-profile1-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-profile1-slide2_900px.webp?t=1570026333" type="image/jpeg" medium="image" fileSize="42440">
        <media:title type="plain">SEC1019-profile1-slide2_900px</media:title>
        <media:description type="plain">“It’s not a matter of if, it’s a matter of when, and we just have to be on our guard to make sure that we are protecting the crown jewels  with everything we’ve got,” says Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services (CISS) business unit at the Exelon Corporation.

Photo courtesy of Mary Ludford
</media:description>
      </media:content>
    </item>
    <item>
      <title>Critical Infrastructure Security and Resilience - Today and Tomorrow</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[<p>Meet the Department of Homeland Security&#39;s newest agency - the Cybersecurity and Infrastructure Security Agency - that will serve as the pinnacle for national risk management for cyber and physical infrastructure.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91018</guid>
      <pubDate>Tue, 01 Oct 2019 00:01:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91018-critical-infrastructure-security-and-resilience---today-and-tomorrow</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/Cover-Story/SEC1019-Cover-Feat-slide1_900px.webp?t=1598361647" type="image/jpeg" length="57388"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/Cover-Story/SEC1019-Cover-Feat-slide1_900px.webp?t=1598361647" type="image/jpeg" medium="image" fileSize="57388">
        <media:title type="plain">SEC1019-Cover-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/Cover-Story/SEC1019-Cover-sidebar1-slide2_900px.webp?t=1569935108" type="image/jpeg" medium="image" fileSize="49145">
        <media:title type="plain">SEC1019-Cover-sidebar1-slide2_900px</media:title>
        <media:description type="plain">Dave Wulf, Associate Director, Chemical Security
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/Cover-Story/SEC1019-Cover-sidebar2-slide3_900px.webp?t=1569935141" type="image/jpeg" medium="image" fileSize="36297">
        <media:title type="plain">SEC1019-Cover-sidebar2-slide3_900px</media:title>
        <media:description type="plain">Sean Haglund, Chief of the Office for Bombing Prevention
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/Cover-Story/SEC1019-Cover-sidebar3-slide4_900px.webp?t=1569935668" type="image/jpeg" medium="image" fileSize="49957">
        <media:title type="plain">SEC1019-Cover-sidebar3-slide4_900px</media:title>
        <media:description type="plain">Daryle Hernandez, Director, Interagency Security Committee
</media:description>
      </media:content>
    </item>
    <item>
      <title>AR and VR: How Immersive Technology Is Bringing Cybersecurity Scenarios to Life</title>
      <description>
        <![CDATA[<p>While VR and AR have different fortes, both enhance and accelerate experiential learning that can help manifest and reinforce a culture of cybersecurity across industries. It is technology implications like this that will help propel cybersecurity awareness into a state of mass awareness.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91016</guid>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91016-ar-and-vr-how-immersive-technology-is-bringing-cybersecurity-scenarios-to-life</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-cyber-Feat-slide1_900px.webp?t=1569927384" type="image/jpeg" length="105215"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-cyber-Feat-slide1_900px.webp?t=1569927384" type="image/jpeg" medium="image" fileSize="105215">
        <media:title type="plain">SEC1019-cyber-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-cyber-slide2_900px.webp?t=1569927497" type="image/jpeg" medium="image" fileSize="49817">
        <media:title type="plain">SEC1019-cyber-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Privacy - An Emerging Security Career Challenge</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>An emerging challenge facing security leaders involves governance related to the collection, storage and transmission of personal information and the ethical utilization of it. While there are compliance programs currently in place that govern the protection of individual medical and financial data, there are clearly additional challenges on the horizon.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91015</guid>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91015-privacy---an-emerging-security-career-challenge</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-career-Feat-slide1_900px.webp?t=1569927023" type="image/jpeg" length="66401"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-career-Feat-slide1_900px.webp?t=1569927023" type="image/jpeg" medium="image" fileSize="66401">
        <media:title type="plain">SEC1019-career-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-career-slide2_900px.webp?t=1569927102" type="image/jpeg" medium="image" fileSize="51440">
        <media:title type="plain">SEC1019-career-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Have You Chosen the Right Person to Lead Your SOC?</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[<p>Enterprises are struggling to find the right talent to safeguard their networks; therefore, they must change their mindsets and begin recruiting talent from non-traditional backgrounds to ensure they have the &quot;right&quot; person on their SOC team.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/91014</guid>
      <pubDate>Tue, 01 Oct 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/91014-have-you-chosen-the-right-person-to-lead-your-soc</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-talk-Feat-slide1_900px.webp?t=1569926509" type="image/jpeg" length="35745"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-talk-Feat-slide1_900px.webp?t=1569926509" type="image/jpeg" medium="image" fileSize="35745">
        <media:title type="plain">SEC1019-talk-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/October/SEC1019-talk-slide2_900px.webp?t=1569926696" type="image/jpeg" medium="image" fileSize="55684">
        <media:title type="plain">SEC1019-talk-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Tailgating: A Common Courtesy and a Common Risk</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[<p>Learn how tailgating can open your facility to undocumented and unauthorized entry and increase security risks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90887</guid>
      <pubDate>Fri, 13 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90887-tailgating-a-common-courtesy-and-a-common-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Tailgating-Feat-slide1_900px.webp?t=1567786963" type="image/jpeg" length="59926"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Tailgating-Feat-slide1_900px.webp?t=1567786963" type="image/jpeg" medium="image" fileSize="59926">
        <media:title type="plain">SEC0919-Tailgating-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Tailgating-slide2_900px.webp?t=1567787210" type="image/jpeg" medium="image" fileSize="35622">
        <media:title type="plain">SEC0919-Tailgating-slide2_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Tailgating-slide3_900px.webp?t=1567787792" type="image/jpeg" medium="image" fileSize="29474">
        <media:title type="plain">SEC0919-Tailgating-slide3_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Tailgating-slide4_900px.webp?t=1567787805" type="image/jpeg" medium="image" fileSize="31702">
        <media:title type="plain">SEC0919-Tailgating-slide4_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Tailgating-slide5_900px.webp?t=1567788987" type="image/jpeg" medium="image" fileSize="87962">
        <media:title type="plain">SEC0919-Tailgating-slide5_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Tailgating-slide6_900px.webp?t=1567789001" type="image/jpeg" medium="image" fileSize="38140">
        <media:title type="plain">SEC0919-Tailgating-slide6_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Protect Your Enterprise by Setting Standards for Mobile Security</title>
      <author></author>
      <description>
        <![CDATA[<p>Compromises of mobile devices can be just as damaging. They have the potential to undermine an organization&#39;s customer data, intellectual property and more. How can enterprises take on persistent mobile security threats?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90884</guid>
      <pubDate>Wed, 11 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90884-protect-your-enterprise-by-setting-standards-for-mobile-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Mobile-Feat-slide1_900px.webp?t=1567784812" type="image/jpeg" length="38256"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Mobile-Feat-slide1_900px.webp?t=1567784812" type="image/jpeg" medium="image" fileSize="38256">
        <media:title type="plain">SEC0919-Mobile-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Mobile-slide2_900px.webp?t=1567784874" type="image/jpeg" medium="image" fileSize="33801">
        <media:title type="plain">SEC0919-Mobile-slide2_900px</media:title>
        <media:description type="plain">Matthew Montgomery, Business Operations Director for the Wireless Business Group (WBG) in Verizon, leads business operations, marketing and partner sales and support for WBG and the Markets. A 20 year industry veteran, Montgomery has held numerous leadership roles in sales, marketing and indirect channel management. While at Verizon, Montgomery has designed and launched several successful channel programs, including the Verizon Partner Program (VPP), and was awarded the CRN Channel Chief – a leading Industry designation for his contribution.
</media:description>
      </media:content>
    </item>
    <item>
      <title>How Strong Public-Private Partnerships Bolster Security Programs</title>
      <description>
        <![CDATA[<p>From combating terrorism to addressing cyber threats to maintaining public safety, public-private partnerships have the potential to boost security and emergency management programs.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90868</guid>
      <pubDate>Mon, 09 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90868-how-strong-public-private-parnertships-bolster-security-programs</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-public-Feat-slide1_900px.webp?t=1567707796" type="image/jpeg" length="75197"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-public-Feat-slide1_900px.webp?t=1567707796" type="image/jpeg" medium="image" fileSize="75197">
        <media:title type="plain">SEC0919-public-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-public-slide2_900px.webp?t=1567708002" type="image/jpeg" medium="image" fileSize="48982">
        <media:title type="plain">SEC0919-public-slide2_900px</media:title>
        <media:description type="plain">“These connections are vital to preventing problems and mitigating the damage from problems. The best resources come from these partnerships,” says Anthony Brown, security manager, emergency program manager and environmental health and safety coordinator at Concordia University Texas.

Photo courtesy of Anthony Brown
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-public-slide3_900px.webp?t=1567708028" type="image/jpeg" medium="image" fileSize="50996">
        <media:title type="plain">SEC0919-public-slide3_900px</media:title>
        <media:description type="plain">“Having those public-private partnerships, or even just memorandums of understanding, is critical in certain areas so law enforcement doesn’t have to go through the laborious process of getting a warrant or a subpoena to get video,” says Herbert Ubbens, CPP, PSP, president at Paratus Consultants Group.

Photo courtesy of Herbert Ubbens
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-public-slide4_900px.webp?t=1567708055" type="image/jpeg" medium="image" fileSize="42609">
        <media:title type="plain">SEC0919-public-slide4_900px</media:title>
        <media:description type="plain">James DeMeo, founder, president and CEO of Unified Sports &amp;amp; Entertainment Security Consulting, recommends education and career development resources from NCS4, IAVM, ASIS, FEMA, DHS, the U.S. Secret Service, NIMS and ICS, as well as after-action reports, computer simulations and reality-based scenario training exercises.

Photo courtesy of James DeMeo
</media:description>
      </media:content>
    </item>
    <item>
      <title>Making Security Assurance More Business-Focused</title>
      <description>
        <![CDATA[<p>In a fast-moving environment filled with evolving cyber threats, leaders want confidence that business processes, projects and supporting assets are well protected.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90867</guid>
      <pubDate>Fri, 06 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90867-making-security-assurance-more-business-focused</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Assurance-Feat-slide1_900px.webp?t=1567620161" type="image/jpeg" length="107942"/>
    </item>
    <item>
      <title>Ensuring Duty of Care for Traveling Employees</title>
      <description>
        <![CDATA[<p>How do enterprises account for the safety of all traveling employees? How can they further mitigate cybersecurity issues that traveling employees face?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90866</guid>
      <pubDate>Wed, 04 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90866-ensuring-duty-of-care-for-traveling-employees</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Travel-Feat-slide1_900px.webp?t=1567619250" type="image/jpeg" length="50301"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Travel-Feat-slide1_900px.webp?t=1567619250" type="image/jpeg" medium="image" fileSize="50301">
        <media:title type="plain">SEC0919-Travel-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Travel-slide2_900px.webp?t=1567619739" type="image/jpeg" medium="image" fileSize="44031">
        <media:title type="plain">SEC0919-Travel-slide2_900px</media:title>
        <media:description type="plain">Sherry Stein, Head of Technology Strategy at SITA
</media:description>
      </media:content>
    </item>
    <item>
      <title>The Most Influential People in Security 2019</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[<p>Who is leading the way in enterprise security? These 26 thought-leaders are making a difference, positively impacting the security field, their organization, colleagues and peers and the national and global security landscape.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90805</guid>
      <pubDate>Mon, 02 Sep 2019 09:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90805-the-most-influential-people-in-security-2019</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/2019-SEC-Most-Influential/SEC0919-Cover-Feature-slide_900px.webp?t=1567006236" type="image/jpeg" length="58071"/>
    </item>
    <item>
      <title>What Do You Need to Know About the California Consumer Privacy Act?</title>
      <description>
        <![CDATA[<p>When the General Data Protection Regulation (GDPR) was enacted more than a year ago, it was far reaching, and many organizations were caught off guard because they thought it didn&rsquo;t apply to them. But in fact, it did. Now the California Consumer Privacy Act (CCPA) is about to go into effect.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90818</guid>
      <pubDate>Mon, 02 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90818-what-do-you-need-to-know-about-the-california-consumer-privacy-act</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Edu2-Feat-slide1_900px.webp?t=1567099607" type="image/jpeg" length="129182"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Edu2-Feat-slide1_900px.webp?t=1567099607" type="image/jpeg" medium="image" fileSize="129182">
        <media:title type="plain">SEC0919-Edu2-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Edu2-slide2_900px.webp?t=1567099637" type="image/jpeg" medium="image" fileSize="38488">
        <media:title type="plain">SEC0919-Edu2-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Employee Training to Prevent Workplace Violence and Active Shooter Events</title>
      <description>
        <![CDATA[<p>Workplace violence is on the rise. In May, there was an active shooter event in Virginia Beach, where a disgruntled city employee murdered 12 of his co-workers. As the debate for sensible gun-control continues, gun laws alone will not stop the next massacre.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90813</guid>
      <pubDate>Mon, 02 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90813-employee-training-to-prevent-workplace-violence-and-active-shooter-events</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Edu1-Feat-slide1_900px.webp?t=1567089510" type="image/jpeg" length="44415"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Edu1-Feat-slide1_900px.webp?t=1567089510" type="image/jpeg" medium="image" fileSize="44415">
        <media:title type="plain">SEC0919-Edu1-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Edu1-slide2_900px.webp?t=1567089549" type="image/jpeg" medium="image" fileSize="23611">
        <media:title type="plain">SEC0919-Edu1-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>How Sense of Privacy Threatens Facial Recognition's Protective Power</title>
      <description>
        <![CDATA[<p>Anxious feelings towards facial recognition can, if unchecked, reach a point where they undermine common sense and our ability to leverage new technologies in the protection of the innocent and prosecution of the guilty.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90812</guid>
      <pubDate>Mon, 02 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90812-how-sense-of-privacy-threatens-facial-recognitions-protective-power</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Cyber-Feat-slide1_900px.webp?t=1567089025" type="image/jpeg" length="108527"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-Cyber-Feat-slide1_900px.webp?t=1567089025" type="image/jpeg" medium="image" fileSize="108527">
        <media:title type="plain">SEC0919-Cyber-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-cyber-slide2_900px.webp?t=1567089280" type="image/jpeg" medium="image" fileSize="49817">
        <media:title type="plain">SEC0919-cyber-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>The Insider's Guide to Security Recruitment</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>From an employer perspective, hiring top security talent for your team can be a challenge. As a hiring manager, you need to understand how to best select and leverage a search firm to support your efforts.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90809</guid>
      <pubDate>Mon, 02 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90809-the-insiders-guide-to-security-recruitment</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-career-Feat-slide1_900px.webp?t=1567020282" type="image/jpeg" length="84825"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-career-Feat-slide1_900px.webp?t=1567020282" type="image/jpeg" medium="image" fileSize="84825">
        <media:title type="plain">SEC0919-career-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-career-slide2_900px.webp?t=1567021819" type="image/jpeg" medium="image" fileSize="51440">
        <media:title type="plain">SEC0919-career-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>How Different Personality Types Affect Cybercrime</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[How are different kinds of cybersecurity errors more common among people with certain personality preferences?]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90808</guid>
      <pubDate>Mon, 02 Sep 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90808-how-different-personality-types-affect-cybercrime</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-talk-Feat-slide1_900px.webp?t=1567019584" type="image/jpeg" length="107442"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-talk-Feat-slide1_900px.webp?t=1567019584" type="image/jpeg" medium="image" fileSize="107442">
        <media:title type="plain">SEC0919-talk-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/September/SEC0919-talk-slide2_900px.webp?t=1567019674" type="image/jpeg" medium="image" fileSize="55684">
        <media:title type="plain">SEC0919-talk-slide2_900px</media:title>
      </media:content>
    </item>
    <item>
      <title>Spotlight on New Security Technology at GSX 2019</title>
      <description>
        <![CDATA[<p>Intrusion detection, lockdown initiation, fingerprint matching. What other security solutions can you expect to see at GSX this September?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90662</guid>
      <pubDate>Thu, 15 Aug 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90662-spotlight-on-new-security-technology-at-gsx-2019</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/Product-Spotlight/SEC0819-Prods-Feature-slide_900px.webp?t=1565023109" type="image/jpeg" length="62670"/>
    </item>
    <item>
      <title>Video Management Systems for Your Security Enterprise</title>
      <description>
        <![CDATA[<p>Security professionals must understand drones, conduct security, assess limitations and implement a drone response plan to mitigate its threats and attacks.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90661</guid>
      <pubDate>Mon, 12 Aug 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90661-video-management-systems-for-your-security-enterprise</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-VMS-Feat-slide1_900px.webp?t=1565022399" type="image/jpeg" length="103230"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-VMS-Feat-slide1_900px.webp?t=1565022399" type="image/jpeg" medium="image" fileSize="103230">
        <media:title type="plain">SEC0819-VMS-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-VMS-slide2_900px.webp?t=1565022641" type="image/jpeg" medium="image" fileSize="51399">
        <media:title type="plain">SEC0819-VMS-slide2_900px</media:title>
        <media:description type="plain">At High Point Regional High School in Sussex, N.J., Director of Safety and Security Kevin M. Craig uses remote access not just to keep an eye on things, but also to enhance his collaborations with the police.

Photo courtesy of Kevin Craig
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-VMS-slide3_900px.webp?t=1565022668" type="image/jpeg" medium="image" fileSize="36275">
        <media:title type="plain">SEC0819-VMS-slide3_900px</media:title>
        <media:description type="plain">Academic publisher McGraw Hill has distribution centers around the world, all stacked to the rafters with pricey textbooks. Drew Brennan, Director Global Security and Crisis Management for McGraw Hill, relies on his video management system’s remote access feature for suspicious activities on site.

Photo courtesy of Drew Brennan
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-VMS-slide4_900px.webp?t=1565022696" type="image/jpeg" medium="image" fileSize="41006">
        <media:title type="plain">SEC0819-VMS-slide4_900px</media:title>
        <media:description type="plain">At Noble Energy, an oil and gas exploration company based in Houston, Senior Security Manager Steve Brack uses remote access to help minimize security headcount across a global operation.

Photo courtesy of Steve Brack
</media:description>
      </media:content>
    </item>
    <item>
      <title>Instituting Security in IoT Networks to Prepare for Massive 5G Rollouts</title>
      <description>
        <![CDATA[<p>Analytics, playback, integration, video sharing, facial recognition and AI&hellip; What VMS features must you have when looking for a new one?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90660</guid>
      <pubDate>Fri, 09 Aug 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90660-instituting-security-in-iot-networks-to-prepare-for-massive-5g-rollouts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-5G-Feat-slide_900px.webp?t=1565021906" type="image/jpeg" length="130427"/>
    </item>
    <item>
      <title>Powering Cybersecurity at Global Sustainable Energy Facilities</title>
      <description>
        <![CDATA[<p>The AES Corporation owns and operates global sustainable energy and thermal and renewable facilities, expanding over four continents and 14 countries with more than 9,000 employees worldwide.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90658</guid>
      <pubDate>Wed, 07 Aug 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90658-powering-cybersecurity-at-global-sustainable-energy-facilities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Profile2-Feat-slide1_900px.webp?t=1565021365" type="image/jpeg" length="50223"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Profile2-Feat-slide1_900px.webp?t=1565021365" type="image/jpeg" medium="image" fileSize="50223">
        <media:title type="plain">SEC0819-Profile2-Feat-slide1_900px</media:title>
        <media:description type="plain">Melody Balcet, director of the Global Cybersecurity Program at AES, oversees the cybersecurity of the energy company's assets, ensuring that the right solutions are put in place.

Photo courtesy of Melody Balcet
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Profile2-slide2_900px.webp?t=1565021402" type="image/jpeg" medium="image" fileSize="116359">
        <media:title type="plain">SEC0819-Profile2-slide2_900px</media:title>
        <media:description type="plain">Balcet looks for individuals who bring something new to the table, a skill that her team currently lacks or there is a need for, or how candidates can help accelerate progress in challenges that the team faces.

Photo courtesy of Melody Balcet
</media:description>
      </media:content>
    </item>
    <item>
      <title>At the Intersection of Business, Analytics and Security</title>
      <description>
        <![CDATA[<p>What does Anne Marie Zettlemoyer, President, Security Engineering at Mastercard, attribute to her professional success?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90642</guid>
      <pubDate>Mon, 05 Aug 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90642-at-the-intersection-of-business-analytics-and-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Profile1-Feat-slide1_900px.webp?t=1564666719" type="image/jpeg" length="107017"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Profile1-Feat-slide1_900px.webp?t=1564666719" type="image/jpeg" medium="image" fileSize="107017">
        <media:title type="plain">SEC0819-Profile1-Feat-slide1_900px</media:title>
        <media:description type="plain">Zettlemoyer takes part in the SheLeadsTech™ program, which seeks to increase representation of females in technology leadership roles and the tech workforce.
</media:description>
      </media:content>
    </item>
    <item>
      <title>Ensuring Security and Safety at The State Street Corporation</title>
      <author>ritcheyd@bnpmedia.com (Diane Ritchey)</author>
      <description>
        <![CDATA[<p>As CSO, Steve Baker is reponsible for the strategic plans and operations of the Global Security and Investigatives function. How does he guide direction and ensure alignment with the business functions of a successful enterprise?</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90617</guid>
      <pubDate>Thu, 01 Aug 2019 00:01:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90617-ensuring-security-and-safety-at-the-state-street-corporation</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Cover-Feat-slide1_900px.webp?t=1564430267" type="image/jpeg" length="37785"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Cover-Feat-slide1_900px.webp?t=1564430267" type="image/jpeg" medium="image" fileSize="37785">
        <media:title type="plain">SEC0819-Cover-Feat-slide1_900px</media:title>
        <media:description type="plain">Steve Baker, CSO of State Street Corporation, is humble about his successful career with State Street. “I’m lucky to work with people that adapt and change,” he says. “I have probably one of the longest tenured organizations in the company – many people have been here more than 20 years. I also feel blessed to work with some of my former colleagues from Digital Equipment Corporation.”

Photo courtesy of State Street Corporation
</media:description>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Cover-slide2_900px.webp?t=1564430910" type="image/jpeg" medium="image" fileSize="119625">
        <media:title type="plain">SEC0819-Cover-slide2_900px</media:title>
        <media:description type="plain">One Lincoln Street, also known as State Street Financial Center, is a skyscraper in Boston, Massachusetts on the edge of both the Financial District and neighborhood of Chinatown.

Photo courtesy of State Street Corporation
</media:description>
      </media:content>
    </item>
    <item>
      <title>Interconnected Security Systems, IoT and the Future</title>
      <author></author>
      <description>
        <![CDATA[<p>Today, technology is evolving at a faster rate than ever before. As a result of the rapid rate of change, we are creating an ever-increasing amount of data.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/90631</guid>
      <pubDate>Thu, 01 Aug 2019 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/90631-interconnected-security-systems-iot-and-the-future</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Edu-Feat-slide1_900px.webp?t=1564517695" type="image/jpeg" length="129476"/>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Edu-Feat-slide1_900px.webp?t=1564517695" type="image/jpeg" medium="image" fileSize="129476">
        <media:title type="plain">SEC0819-Edu-Feat-slide1_900px</media:title>
      </media:content>
      <media:content url="https://www.securitymagazine.com/ext/resources/Issues/2019/August/SEC0819-Edu-slide2_900px.webp?t=1564517919" type="image/jpeg" medium="image" fileSize="42733">
        <media:title type="plain">SEC0819-Edu-slide2_900px</media:title>
      </media:content>
    </item>
  </channel>
</rss>
