The security industry is changing, as is the profile of a successful security executive. Maintaining the status quo is no longer an option, and ignorance of risks is no longer an excuse for not mitigating them. This topic in Security features game-changing security directors or industry leaders in different sectors. So who is breaking new ground in the security industry, making great strides forward in risk management while better supporting the enterprise as a whole? If you know someone (or are someone) who fits this bill – let us know! Send your recommendations and suggestions for future Profiles in Excellence to Security Managing Editor Claire Meyer at email@example.com.
As municipalities continue to harden their frontline defenses against attacks on their IT infrastructure, one area that should not be overlooked are public-private partnerships, as these are prime targets for criminals and others.
How is Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at Exelon Corporation, mitigating and managing risk on a daily basis?
Largest Texas school district converting to latest security technology
October 3, 2019
Imagine, a campus security installation so big that it will take years to complete all the work, and it also means installing solutions with the latest technology and greatest impact to school security.
University Hospital, the teaching hospital of San Antonio’s University Health Systems is a sprawling campus in the South Texas Medical Center, and one of the health system’s 23 locations across the community that needed the latest security technology.
While VR and AR have different fortes, both enhance and accelerate experiential learning that can help manifest and reinforce a culture of cybersecurity across industries. It is technology implications like this that will help propel cybersecurity awareness into a state of mass awareness.
An emerging challenge facing security leaders involves governance related to the collection, storage and transmission of personal information and the ethical utilization of it. While there are compliance programs currently in place that govern the protection of individual medical and financial data, there are clearly additional challenges on the horizon.
Enterprises are struggling to find the right talent to safeguard their networks; therefore, they must change their mindsets and begin recruiting talent from non-traditional backgrounds to ensure they have the "right" person on their SOC team.
ON DEMAND: With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s priority (Gartner puts it at the top of their “Top Security Projects” list for 2 years in a row). But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity?
ON DEMAND: In today's tumultuous global climate, where corporations span countries and employee travel is essential to doing business, crises are inevitable. This is why corporate security teams must always be ready for the unexpected and have procedures and plans in place to respond quickly and efficiently. A lag in crisis response or an ineffective response can cost money, resources, and even lives.
ON DEMAND:A critical event is defined as an incident that disrupts normal operations, such as severe weather, crime, violence and critical equipment or technology failures. Business continuity and crisis response plans can only go so far if there isn't buy-in across functions, with executive-level support.
Taking place from December 13-15, 2019 at the Venetian/Palazzo, our 27th Annual World Congress continues to deliver world-class education focused on integrative health: through the most recently emerging clinical research, newly discovered therapies, and future scientific advances.
Our special feature this month highlights the Department of Homeland Security's newest agency: the Cybersecurity and Infrastructure Security Agency. Also, this month we highlight the Leander Independent School District's data practices that protect student privacy. Security experts discuss video monitoring, cybersecurity for public-private partnerships, privacy and more.