

Primary Topics
Career Transitions from Public to Private Sectors
How you choose to prepare or not to prepare for the end of your public service will become evident on your very first day as a civilian.
Focus on Security Operations Centers
When you’re considering whether your organization needs a SOC, here’s a handy guideline to keep in mind for a SOC that not only has the right equipment, but also the best support for your team.
Focus on Bank Robberies
As long as there have been banks, there have been bank robbers. But training, security technology, and enhanced relationships between the private sector and law enforcement can all play a role in deterring opportunistic criminals looking for a quick cash score.

Industry News: Montenegro Luxury Casino Boosts High-Definition Surveillance
A luxury casino and hotel resort in Montenegro opted for a new end-to-end video solution to support surveillance of gaming areas.

Legal Report: Australia Establishes a Right to Disconnect Rule
Also in this month’s legal roundup, an asphalt company settles a racial discrimination lawsuit, a voting machine tampering case resolves, and New York state establishes new retail security laws.

Certification Profile: Ali Nomais, CPP, PCI, PSP
Motivated by his enriching experience at 2018 ASIS Middle East Conference, Ali Nomais, CPP, PCI, PSP, became involved with the local Dhahran chapter in Saudi Arabia.

Protecting Payday: How Commercial Banks Enhance Robbery Deterrence and Investigations
As long as there have been banks, there have been bank robbers. But training, security technology, and enhanced relationships between the private sector and law enforcement can all play a role in deterring opportunistic criminals looking for a quick cash score.

FBI Data Illustrates Criminal Commonalities in Bank Robberies
Each year in the United States, the FBI collects data about reported bank crimes—including robberies. Here’s what the 2022 data tells us about the state of this activity and the security solutions in play.

How to Rob a Bank: 7 Major Heists from History
Tunnels. Kidnapping. Explosives. And a Richard Nixon connection. These seven bank crimes from history show the lengths some criminals are willing to go to achieve the perfect heist.

How the 1930s Changed Bank Robbery Investigations
At the beginning of the 20th Century, bank robbery in the United States was a state-level crime. That all changed when a slew of high-profile robbers—from John Dillinger to Bonnie and Clyde—began targeting banks.

Transaction Denied: How to Mitigate ATM Crime Risks
Following an uptick in physical and logical attacks on ATMs, security practitioners and the vendor community are hardening machines against assault.

A Canadian Retailer Supports its Cyber Response Team with a Centralized Security-as-a-Service Solution
When a technology and eCommerce team found they needed a centralized solution to help handle numerous alerts and investigations, the solution they found provided monitoring, filtering, and analysis.

How to Create and Maintain an Effective SOC
When you’re considering whether your organization needs a SOC, here’s a handy guideline to keep in mind for a SOC that not only has the right equipment, but also the best support for your team.

Why Ergonomics Matter for SOC Design
When designing or reviewing the function of a workspace, it’s important to consider the space’s functions and then consider them from the perspective of design and ergonomics. This can better support how personnel can operate effectively.

Weighing the Options: In-House Vs. Virtual GSOC
While a GSOC offers an organization significant security benefits, it’s worth taking the time to consider if an internal GSOC or one provided by a third-party vendor can generate the best results.

From Reactive to Proactive: Why GSOCs Must Evolve
The world and its threats are more dynamic. Global security operations centers need to evolve from responding to an event to having operational capabilities that elevate security.

How to Modernize Security Operations Centers
Highlighting vulnerabilities, financial risks, and reputational risks can emphasize the need to modernize a GSOC and secure buy-in.

What to Avoid When Planning a SOC
Security operations centers can be a significant business enabler for any organization, but ignoring a few key considerations can hinder their effectiveness.

Understanding the Alphabet Soup: What Each Type of SOC Does
Security operations centers (SOCs) are responsible for monitoring, managing, and responding to threats to an organization. But there’s more than one kind.

A CSO Career Change: James Mehta
Most public service skills tend to translate well to the private sector since they mirror the skills desired in employees: dedicated work ethics, clear and timely communication, reliability, and integrity, says James Mehta, CSO for Acuity International, LLC.

A CSO Career Change: Scott Wolford, CPP
The skills Scott Wolford, CPP, developed as a state trooper were valuable to corporate America, so after an injury forced him to retire from the force, he started expanding his horizons into private security.

A CSO Career Change: Anders Noyes, CPP
When moving from law enforcement to private security management, Anders Noyes, CPP, had to learn how to influence others by linking their work and decisions to the success of the organization.

Editor’s Note: Beyond the Job, Who Are You?
Military, law enforcement, and private security professionals often over-identify with the job. While professional pride is admirable, letting it take over your personality can be risky.

How to Cope with Cross-Sector Culture Differences
Will Knehr built a successful career in the military as a cryptologist before transitioning into private sector cybersecurity. Here’s what he learned.

Fast Facts: How to Develop an Effective Private Sector Résumé
For security professionals changing from the public to the private sector, their résumés often fall flat with recruiters and HR professionals.

A Strategic Approach to Transitioning from Police Work to the Business World
Before embarking on the transition from police work to the private sector, it's crucial to undertake thorough preparation and self-assessment.

Your Two-Year Map for Public to Private Career Transitions
How you choose to prepare or not to prepare for the end of your public service will become evident on your very first day as a civilian.

Corporate Vernacular, Translated
Just as the military and law enforcement professions have specific jargon, the corporate world has a language of its own, too.

Q&A: How Public Sector Experience Can Benefit Security Technology Development
For professionals in law enforcement and the military, transitioning to a career in the private security sector can present opportunities and challenges.

4 Ways Leaders Can Drive Private-Sector Employee Growth
Helping employees grow beyond their roles allows them to understand the bigger picture, fostering a deeper connection to the company’s mission and goals.

3 Steps to Prepare for A New Position in Security Management
This three-step approach is an excellent way to get hiring managers and prospective employers to see how you are professionally engaged and active.
Security News
What Growing Outsourcing Means for Security Management
Outsourced security roles—from guarding to GSOCs to intelligence analysis—are on the rise, but are management skills keeping up?
Improving Museum Security and Visitor Experiences
The Detroit Institute of Art was able to pull off a four-month exhibition of the largest concentration of Vincent Van Gogh’s works with the help of an updated surveillance system.
Criminal Phishing Network Taken Down in Spain and Latin America
A joint operation between Europol and the Specialized Cybercrime Center of Ameripol dismantled a criminal phishing network that had targeted more than 480,000 victims worldwide.
Exploding Pager Attack Puts Spotlight on Tampering Along the Supply Chain
Thousands of pagers were allegedly tampered with during production to facilitate an orchestrated attack on Hezbollah personnel on 17 September.
Creating a Safe Space
An Arkansas school district adopts a storm shelter solution to address tornado and active shooter threats.
What Will the Future of Work Look Like?
New research shows how different types of people come to different conclusions about what the future holds. And that we will end up living in The Matrix.
Suspect is in Custody Following Alleged Assassination Attempt on Former U.S. President Trump
U.S. Secret Service agents spotted the muzzle of a rifle sticking out of shrubbery lining the Trump International Golf Course as they swept the course for security hazards ahead of the former president and current presidential nominee while he played.
Typhoon Yagi is Over, But Its Aftermath Continues to Batter Vietnam
Even though Typhoon Yagi touched down on Vietnam and dissipated days ago, the storm’s aftermath continues to wreak damage and death. The resulting floods and landslides have caused almost 200 deaths, with more than 125 more people still listed as missing.
Prison Visitor Subjected to Cavity Search Reaches $5.6 Million Settlement
A California woman will receive $5.6 million under a settlement agreement after she sued a prison system, hospital, and multiple individuals for allegedly conducting an unlawful strip search.
Insider Interference: U.S. Agencies Highlight Threat Insiders Can Pose to Election Security
New guidance from U.S. federal agencies seeks to help state and local officials counter the threat that malicious insiders could pose to election infrastructure.
Indictment Shows How Online Groups Allegedly Encourage and Solicit Extremist Acts
The U.S. Department of Justice unsealed an indictment that shows how two individuals allegedly used the Telegram social messaging app to inspire, teach, and encourage other extremists to inflict mass casualties, assassinate officials, and target critical infrastructure.
New York Retailers Must Document Workplace Violence Prevention Plans, Add Silent Alarms
New York retailers with 500 or more employees nationwide must install silent alarms in easily accessibly locations or provide wearable or smartphone-based alarm devices to alert emergency authorities of trouble.
U.S. Charges 5 GRU Officers, 1 Civilian, with Conspiracy to Hack Ukraine’s Government Prior to 2022 Invasion
U.S. prosecutors charged six Russian nationals for their alleged role in a conspiracy to hack Ukraine’s government prior to Russia’s invasion in February 2022, according to an indictment unsealed Thursday.
Apalachee High School Shooting: What We Know
Officials charged a 14-year-old student with the murder of two students and two teachers in a shooting that occurred at Apalachee High School in Winder, Georgia, on the morning of 4 September.
Grenfell Tower Fire Inquiry Maps Out Chain of Failures That Led to Disaster
A chain of failures by governments, “dishonest” companies, and a lack of fire service strategy or coordination for high-rise building fire response culminated in the 2017 Grenfell Tower fire disaster that killed 72 people, a new public inquiry report concluded.
Strange Security: Drugs in Strange Places Edition
These are the places drugs have been found recently: fake watermelons, English rivers, hard candy, fast food, and celery. Read about it in this month's Strange Security roundup.