Advancing Security Worldwide
Educational institutions can help fill the deficit in national cybersecurity capacity. One way this can be accomplished is by bridging the gap between STEM and non-STEM disciplines through the creation of educational programs that provide essential technical cybersecurity-related knowledge, skills, and abilities.
Even during a period of remote and hybrid work, office romance is on the rise. So, it’s essential to have a policy and best practices in place.
What started as investor terminology to measure environmental and worker relations transparency has drifted into something quite different: environmental, social, and governance (ESG) is now synonymous with creating the most sustainable, socially conscious, and progressive brand possible.
Legally, companies can’t have different rules for LGBTQ employees than they do for employees who do not identify as LGBTQ.
Even though many employees are working remotely, workplace romances are on the rise—6 percent more workers reported being involved in a workplace romance in 2022 compared to 2019, according to a January 2022 survey of 550 U.S. employees.
Whether a person likes and trusts a healthcare institution or not can have consequences for their care and their behavior.
Inflation is high, and it’s driving retail theft higher. Organized retail crime groups are perusing grocery store shelves to steal easily resold items, which could have heavy ramifications for stores’ bottom lines.
Seven Latin American countries have World Heritage Sites that are on the in danger list. These are some basic security steps that could help protect them.
Protests at cultural properties are nothing new. But a recent trend of environmental protestors gluing themselves to artwork is. Here are some best practices to prepare your institution to respond.
Jurors expect landlords and property management companies to exercise a reasonable standard of care in protecting tenants from violent crime. The law demands it.
The purpose of training is to inspire a sense of confidence and competence where knowledge and skill are otherwise wanting. Training that leaves participants terrorized, anxious, and bruised fails the foundational ideal that makes it meaningful.
In the European Union alone, the profits of some criminal networks involved in environmental crimes—from trafficking protected wild animals to waste and pollution crimes—reach millions of euros every year.
Illegal wildlife trafficking is the fourth most profitable illicit activity in the world, behind only narcotics, human trafficking, and counterfeiting.
College debt, inflation, racial and gender inequity, political upheaval, the lingering effects of the COVID-19 pandemic, and recession fears plague Generation Z, so it’s no wonder that many of them say they’re facing mental health issues.
Nearly three-quarters of Generation Z people recently surveyed claimed to be familiar with the Army—the highest amount of any generation. But it turned out they weren’t well-informed.
The most effective security leaders maximize their investments in talent, technologies, and services to address the cybersecurity talent shortage.
A recent wave of violent attackers crosses traditional active assailant categories, vastly complicating traditional threat assessment practices.
Serious, persistent threats are already looming in your infrastructure. The lowest-hanging fruit—and the most vulnerable point of attack—is where you may least expect it: the hardware and firmware that lies in the deep layers of your physical infrastructure.
Virtual reality isn’t typically used to hone soft skills such as improving leadership or communication, though more companies are considering it. Instead, it’s a conduit to developing physical skills like repairing a piece of equipment or learning the most effective way to stack boxes in a warehouse.
"Trust is the key to being a successful CSO. I must continuously cultivate my brand to demonstrate that I am a trustworthy person who has the experience and expertise to guide my company through a maze of security risks," writes Scott Wolford, CPP. "This is achieved by building a system that consistently communicates my values, skills, and personality."
To learn more about how security practitioners can respond to online threats and protect influencers—from social media to basketball stars—Security Management interviewed a risk expert.
Manufacturers face an increase in cybersecurity threats which can threaten sensitive data and disrupt production.
When colocation data center provider Flexential looked for a way to support their lone workers, it went back to what was familiar and what would support a complex regulatory environment.
Although Mexico’s famous tourism hub Cancún has been in the spotlight lately for violent incidents, its crime rates are still significantly lower than many U.S. cities.
Cancun remains one of the safest locations for tourists and travelers in Mexico, but recent incidents reinforce the message that violence can happen anywhere, and cartel activity can spill over and threaten bystanders.
Cancun remains one of the safest locations for tourists and travelers in Mexico, but recent incidents reinforce the message that violence can happen anywhere, and cartel activity can spill over and threaten bystanders.
Building a sustained security culture starts with the security leader’s ability to emotionally connect, engage, and partner with people at all levels of the organization, from the C-suite to the third-shift frontline associate.
A hacker breached a video surveillance provider, gaining access to its systems to view live footage of client sites. The incident prompted security companies to reassess their own authentication and segmentation practices to prevent a similar hack.
Executive branding expert Lida Citroën shares insight on how to craft your brand with authenticity and credibility for future success.
Social media messaging platforms are even more effective than email in landing a spearphishing campaign, says Peter Warmka, founder of the Counterintelligence Institute.
Many organizations don’t think about succession planning until someone retires or dies. But in an increasingly volatile job market, that's an untenable strategy.
In a 2021 survey, 36 percent of HR professionals said they had no succession planning program in place.
The biggest mistake in succession planning is the failure to plan at all, but for those implementing succession planning processes, there are a few other pitfalls to watch for.
Security professionals’ relationship with information is complicated, especially where risk management decisions are concerned.
Security professionals often view risk only in negative terms, and they are taught there are four commonly accepted options for treating risk: accept it, avoid it, manage it, or share it. However, there is a fifth option that is often overlooked but can be very positive to those who understand it: exploit it.
Ready to take control of your professional reputation? It requires intention, dedication, and diligence to keep your message on track, and it’s a skill that CSOs need to be particularly adept at.
Port operators and shipping companies are getting back to full capacity after widespread resignations, but is the new workforce skilled enough and sufficiently trustworthy to keep shipments flowing safely?
As security professionals launch and cultivate their personal brands on public-facing channels such as social media, they can draw attention to themselves. While increasing security’s profile is not necessarily a bad thing, understanding the risks and challenges is essential.
These tips will help you implement natural and low-impact security measures using landscaping, signage, and workplace culture.
Most refugees are women, children, and elderly people. Without means of subsistence in a situation of political, economic, social instability, these refugees often become a target for traffickers.
For organizations seeking to manage risk and security operations in tenuous circumstances—including in countries or regions where there is conflict or where the rule of law has been undermined—a little guidance is more than welcome.
What approach can companies take to keep their staff from joining the millions of Great Resignees? To put it simply: implement a people-first mind-set within your hybrid business model.
Background checks are a critical tool for employers to help avoid liability for negligent hiring—but navigating myriad U.S. federal, state, and local laws that govern such investigations can be a difficult task.
“Branding doesn't mean boasting, but it means being really clear about who you are, who you want to serve, and how you want people to experience you,” says Lida Citroën, a personal branding expert and a 2022 CSO Center Leadership Series speaker.
The U.S. National Transportation Safety Board conducts thousands of investigations each year to understand why crashes happen. The process it uses to collect evidence, analyze material, and share recommendations with stakeholders provides best practices for private investigators on the job.
ASSA ABLOY Opening Solutions America implemented a Bluzone fob system to prevent its factories and distribution facilities from shutting down while protecting staff from infection.
Major outdoor festivals and concerts require a comprehensive, holistic, and layered approach to security and safety that includes the inclusion of internal and external stakeholders. This process should start with a threat, vulnerability, and risk assessment.
Human trafficking, frequently referred to as a ghost crime, occurs in plain sight within casino and resort properties, but it remains largely unseen because the indicators of this crime are invisible to most.
Security professionals across the globe should be taking note of the creative uses of recreational drones in Ukraine because nefarious actors certainly are.
Is there a general duty to provide first aid? As is often the case, the answer is “it depends.”
With near record-high job openings, engage your employees to ensure you don’t lose them to a costly turnover tsunami.
To get out of a crisis, any crisis, we need to focus on building unity through purposeful communication, ethical reciprocity, and authentic trust-building efforts with our stakeholders.
Crisis communications is focused on not only communicating messages regarding a disruptive event but also on broader issues that support the organizational resilience, survival of the organization’s business model, and future strategic business plans.
Houses of worship must turn to different types of training to protect their flocks. One synagogue shifted to a non-confrontational crisis response exercise.
Ransomware thrives as organizations remain vulnerable and continue to pay criminals.
As young professionals build up their experience within security, it can be easy to miss some essential areas that CSOs look for in their successors. Here, two members of the ASIS CSO Center share career advice and professional development tips.
Early-career security professionals bring unique and valuable perspective to organizations, but their soft skills often outweigh their subject matter expertise. Two ASIS Young Professional leaders share advice on how to rebalance.
New threat actors emerge on the scene to target industrial control systems and operational technology networks around the world, often with little insight into their activities until an incident occurs.
Being a security leader can feel like an unending race, but establishing personal and professional finish lines to mark accomplishments and demonstrate progress can reinvigorate both managers and their departments.
Romance scams are easier than ever through social media and online dating, and the schemes can be very profitable for fraudsters.
There is almost infinite data freely available, and yet, it is so often ignored because of its sheer size and complexity. So, how can security professionals sift through the information to detect fraud?
If you’re a new manager and are feeling overwhelmed, here’s some good news: There are immediate steps you can take to acclimate yourself to a leadership role.
In strengthening one’s organization to withstand the challenges of tomorrow, it is critical to focus on the three most common disconnects taking place today, primarily around standardization, personnel, and system maintenance.
Understanding how policies, procedures, and tools impact your security posture is critical. A new report helps shed light on what’s working, what’s not, and how security leaders can adopt best practices with C-suite engagement.
U.S. agencies will lean on their private sector mission partners to continue to assess and resolve risks as they arise—and the government contracting community must take similar steps.
In the last three years, the U.S. Postal Inspection Service and the U.S. Bureau of Alcohol, Tobacco, Firearms, and Explosives responded to an average of more than 10 dangerous mail or package incidents per day.
At industrial gas company Air Products, the global security operations center continues to play a critical role and add value for the organization and its stakeholders during the COVID-19 pandemic.
Criminals have long leveraged information and communications technology to commit crimes. They are now using these tactics to engage in insider trading on the Dark Web.
Incoming ASIS President Malcolm Smith, CPP, takes the helm with inclusion and community as his top priorities.
In the face of natural disasters increasing in both frequency and ferocity, when the lights go out businesses should look to a nearby network of neighbors to get back up and running faster.
Flash robberies have been reported since the early 1990s, but recent high-profile thefts in the United States demonstrate that the method is alive and well. What brought them back, and how can retailers prepare to respond?
Highly publicized flash robs are only a small portion of organized retail crime (ORC) thefts, though overall, loss and damage from ORC is on the rise.
Firearms and improvised explosive devices take time to acquire and finesse to operate. These factors may be encouraging attackers to turn to more easily obtainable weapons, like knives, to inflict harm.
A modern enterprise's products and services increasingly exist online or in software code. Corporate assets are increasingly digital assets. This shift calls for the implementation of preventive intelligence, an approach that spans the online and physical worlds.
Despite federal commitment to upgrade U.S. electrical grid, businesses and homeowners must still protect equipment from power surges.
Before the COVID-19 pandemic, schools were typically very regimented about the main entrance security of their buildings. Security assessments conducted during the pandemic, by contrast, illustrated a very relaxed main entrance security posture.
Organizations are increasingly embracing opportunities to leverage the cloud, which can create security risks if vulnerabilities are left unaddressed.
In cases where an individual’s values clash with the organization’s, negative emotions—sadness, frustration, anger—can result in inappropriate behaviors and choices.
As COVID-19 approaches its two-year anniversary, security and risk management professionals would be wise to reflect on past failures in hopes of making our society antifragile to future global calamities.
Researchers conducted a case study in 43 bank branches in the Brazilian city of Campos dos Goytacazes to determine the most important aspects of what security guards considered in evaluating their quality of work life (QWL).
The researchers’ goal was to evaluate the various tools available to determine whether they are effective in accurately measuring the security culture within an organization.
In addition to dealing a blow to a company’s culture, a lack of trust can sabotage productivity, engagement, and retention.
Millions of people are transitioning to new, changed, or evolving roles in the post-pandemic upheaval. As onboarding shifts virtual, CSOs have an opportunity to leverage a new normal of online meetings to get up to speed and begin adding value faster and more effectively.
When it comes to cybersecurity, there are many terms and concepts that are beneficial for physical security professionals and IT professionals alike to understand. Here are a few to help you get started.
The high student population, prevailing freedom, lack of guardians, and homogenous nature of the college campus setting create an environment with many opportunities for crime to occur. A modified security model is therefore needed.
The initial step in developing a balanced security program is engagement with users at all levels. This includes understanding the privacy concerns of residents, safety issues surrounding various modes of transport, and layered security controls of a multipurpose building.
More than half of respondents to a recent survey agreed their CEO has received physical threats both as a result of either expressing (58 percent) or not expressing (40 percent) a position on racial and/or political issues.
As the threat landscape has changed, security leaders have had to adapt. It is infinitely important that the leaders responsible for the safety and security on university and healthcare campuses comprehend and strike a balance between needs versus wants as they build their programs to respond to changes.
Incorporating financial needs into strategic plans can give organizations a more complete and proactive picture of the proposed system and its future, paving a clearer path to avoid administrative and technical challenges.
In the competition for labor, employers may be prone to hire the first living, breathing person who applies. As tempting as it may sound, this hiring practice is fraught with danger.
Technology challenges at universities are often ones of scale and sustainability, which can limit the organization’s ability to meet current security needs or maintain compatibility with contemporary edge devices.
How are certification and professional development changing perceptions of security practitioners in Jamaica?
Multifaceted requirements at universities make creating a project portfolio for management large and expensive to build, complex to manage, and challenging to maintain. Portfolios can therefore risk exposure to legacy systems, inefficient processes, and high costs of ownership.
Integration into the workforce environment, rather than mere patrol of it, is more necessary than ever for an accurate assessment, prevention, and disruption of threats.
As pandemic restrictions ease and calls continue to defund the police, security guard firms should understand their risks before taking on high-profile clients.
Casinos and gaming facilities are increasingly relying on touchless methods to ensure guests can safely play, allowing them to scale their pandemic mitigation measures.
The combination of increased activism and elevated divisiveness presents a heightened threat for conflict entering the workplace, particularly for corporations whose employees are returning to the office after working remotely.
Job seekers are holding potential employers to higher standards in workplace health and safety efforts, diversity initiatives, and flexible work arrangements in the wake of the coronavirus pandemic and social unrest of 2020, according to a recent survey.
Left unchecked, extreme beliefs can not only threaten cohesion and productivity, they can compromise safety and raise the risk of disruptive behaviors, even violence.
We live in a world filled with visual images, and their meanings often changed based on context--benign in one case but inflammatory in another. So what does this mean for monitoring signs of extremism in the workplace?
The mental wellbeing of the workforce needs to be a major consideration as organizations move forward after the last year-and-a-half of turmoil.
With more than 40 countries in close proximity, managing security and teams in Europe is a test of cultural intelligence and flexibility.
Months of turmoil and upheaval take a toll; the mental wellbeing of the workforce has never been a more important topic.
Security professionals need to ask themselves two key questions: Can we protect our property when the police are overwhelmed and does our company have the resources to win the communications battle?
While the growth of polarizing and extremist rhetoric may be most commonly attributed to an advancing Internet, the traditional approaches to mitigating insider threat risks may also be effective in reducing the incendiary quality of extremist rhetoric before it results in harm or destruction.
Psychologically, executives will want to believe that things will go back to normal, but COVID-19 has changed that for the foreseeable future.
With vaccinations on the rise, organizations are seriously contemplating whether and how to return to physical workspaces. By leveraging ESRM principles, security leaders can help steer the conversation.
Worrisome indicators often precede insider threats. More and more, these indicators are reflected in publicly available spaces.
Private security personnel are ideally situated to observe people who are vulnerable to trafficking or are currently being trafficked.
World events from 9/11 to today demonstrate that violence and extremism are a prevalent threat, with the risk of right-wing terrorism rising globally. But 25 years after a major terrorist attack in Argentina, complacency is setting in.
Worries over workplace safety in the COVID-19 era, as well as concerns about the impacts of business closings, plant shutdowns and mandatory stay-at-home orders, spawned more than 2,000 lawsuits from January 2020 through March 2021.
The Internet can be a powerful force multiplier for investigators. When used prudently and strategically, online information sources are undoubtedly a critical component of a thorough investigation.
Many security leaders have discovered that, due to the pace of change and increasing demands for real-time risk analysis, organizational capabilities that were effective five years ago are no longer sufficient in today’s environment.
Core services do not mean all services. In a private enterprise scenario, your core functions must be identified so that your continuity plan ensures at least their partial operation within the shortest amount of time possible.
The organization needs to have mechanisms in place to leverage any and all investigative findings for process improvement.
TSA’s Instagram account has nearly 1 million followers. Here’s how it uses its feed to share important security updates, one great catch and K9 at a time.
When it comes to protecting priceless pieces of cultural heritage, following industry best practices with planning, automation, and early response measure proves essential.
“If we don’t start growing the number of people we’re fostering, our industry will go extinct,” says Rob Duhart, Jr., global head of federated security at Google.
The COVID-19 pandemic may have provided an ideal push for organizations to implement an ESRM approach to resilience and crisis management, which can multiply security’s value to the business.
When leaders fail to see how toxic masculinity affects their teams’ dynamics, the whole organization is at risk.
Organized crime groups, terrorists, and state actors have all dabbled in antiquities trafficking to fund their operations. But the scale of the market remains elusive due to the diversity and secrecy of the art world.
Most museums and heritage sites were forced to close during 2020 in response to COVID-19-related lockdowns. Here’s what should be top-of-mind as they reopen.
While most protests are peaceful, some trigger violence, riots, looting, and clashes with law enforcement, and where one protest escalates, other movements are likely to watch, learn, and adopt similar tactics or countermeasures.
Requirements for information protection are changing. The U.S. government is taking a new approach in marking and handling Controlled Unclassified Information, which can lead to best practices in the private sector by modeling proper protection methods for sensitive information.
Investing in expensive technology when it is not required can be a hard sell. So before you invest, carefully weigh the benefits and considerations of access control technology.
The COVID-19 pandemic will continue to impede aspects of employment screening in 2021, leading employers to use alternative procedures such as conditional hiring and remote drug testing.
These new requirements act as the U.S. Department of Defense’s response to strengthen its focus on cybersecurity and resilience against outside forces and emerging security risks.
Along with investigating fine art thefts, the FBI Art Crime Team also works with partners around the globe to track down and return antiquities to their rightful homes.
As security personnel are expected to stay responsive and nimble in the face of the unexpected, knowing how to de-escalate yourself is key.
Resilience is a multifaceted concept, and depending on which way you view it, you may see different challenges and stronger solutions, says Michael Szönyi, Flood Resilience Program Lead at Zurich Insurance Company.
Eighty-seven percent of security, legal, and compliance executives agree that investment in technology to advance physical security effectiveness and mitigate violent threats is necessary for the future of their company, according to a recent study from the Ontic Center for Protective Intelligence.
As the lines between work and leisure time become increasingly blurred and employees use company-issued devices and resources for personal use—such as social media, online shopping, and even telehealth—the potential for cyberattacks is ever present.
Nearly three decades ago, the U.S. government grew increasingly concerned of the potential negative impacts of rising globalization and terrorism on U.S. corporations with international operations, giving rise to the creation of the Overseas Security Advisory Council (OSAC).
The differences between training and learning will require a major shift in preparation and standards for armed security officers.
With more employees working remote and from home, companies’ have become increasingly liable once a victim informs them that he or she now works and lives with the abuser.
The contemporary CSO has to understand the geopolitical dynamics of the 21st century. In an interconnected and a globalized world, a crisis in one part of the world will have profound cascading effects on organizations on the other side of the globe.
Where do I start? It’s a common refrain, whether it’s coming from a young professional just entering the security industry, a former law enforcement officer building her first private sector SOP, or a security industry veteran preparing to combat a new crisis. Fortunately, few of these paths need to be walked alone.
After five years, six managers, and three promotions, Carla Gray shares her insights and guidance for security managers operating in both global enterprises and agile, rapidly growing startups.
The business case for diversity is stronger than ever. A 2020 report found that companies that foster gender diversity are 25 percent more likely to have above-average profitability than companies that don’t.
Child sex trafficking is a multi-billion dollar a year business. Besides the moral obligation to combat domestic minor sex trafficking, businesses are criminally and civilly liable as facilitators for indirectly, but knowingly, profiting from the venture in reckless disregard to use of a minor.
For companies to maintain a motivated, productive workforce, organizations need to find the best methods to gather and interpret employee feedback, including from remote workers, and make changes accordingly, experts say.
Rising hate crimes in the United States show the increasing threat of accelerationists in white supremacist groups.
As U.S. federal law enforcement agencies warn of a potential wave of armed protests across the United States in the coming week, members of the ASIS International Extremism and Political Instability Community share lessons learned, analysis, and preparedness advice for the days ahead.
At its core, QAnon is a militant and anti-establishment ideology focused on destroying the existing corrupt world order and accelerating the arrival of a new Golden Age. When true believers turn violent, workplaces and employees are at risk.
Knowing the basics about QAnon, as well as the terminology and beliefs of this movement, can help security leaders recognize when someone is being led down the rabbit hole and possibly becoming a risk.
Hardening is an offensive security measure; it stops the fight before it starts.
As organizations double down on remote work policies, security leaders shift their management, communication, and mentorship styles to foster team wellness and personal resilience.
Organizations need to begin to plan now for the wider rollout of the COVID-19 vaccine and what policies and procedures they need to have in place.
As companies begin readying their workforce for a new normal in anticipation of use of widespread COVID vaccine, eLearning can offer a safe, flexible, and perhaps more efficient method of ensuring business travelers are appropriately versed in risk mitigation wherever they go.
If security screening lines are too crowded, many Americans said in a recent poll that they would abandon plans to attend an event or enter a facility.
The year 2020 started inauspiciously with a hard security insurance market in the United States. This meant security firms experienced rising premiums and tightening underwriting guidelines, largely due to concerns about claims, costly legal settlements, and risk management in the industry. These issues were only exacerbated by the emergence of COVID-19 and civil unrest.
The pandemic, the recession, and various protests are driving a record increase in gun purchases in the United States, and some experts are concerned about what that might mean for employees.
Crises are by nature unpredictable and uncertain. Our brains process uncertain and unpredictable events as life-or-death threats. During a crisis, one of the key steps to manage our stress and our emotions and to foster our perspective and analytical reasoning is to de-shame.
Airports have seen a drastic reduction in international travel due to the coronavirus pandemic. Once traffic resumes, however, security screeners will need to hit the ground running.
Beyond retail shrink caused by shoplifters, internal thieves, or fraudulent returns, retailers are also aware of the risks posed by those taking advantage of chaos from mass protests that have become regular occurrences in 2020.
Much like the world we live in, the security business has changed, and the lessons gained serve as a powerful reminder that to be effective in our industry, we need to evolve as leaders to get the best out of our people.
Considering the global shift toward more service-based providers and platforms for physical security, it can be argued that the overall cost of protection is being reduced.
Employers are re-evaluating workplace diversity at their organizations, starting with being more thoughtful about recruiting from a broader range of talent. However, these efforts are not without pitfalls.
Monitoring tools can track productivity and guard against security threats, but employers should weigh the benefits against the legal risks.
Not all risk mitigation measures are made equal. When managers deploy countermeasures without first understanding and addressing the company’s own specific risk posture, they are contributing to “security theater”—a concept that refers to security measures that make people feel more secure without doing anything to actually improve their security.
Extreme challenges present opportunities to do things better. Leaders are at a major inflection point, affording the chance to reroute connections and revise how they lead industries, endeavors, and teams—which has implications for safety and security.
“The push for companies to show what they are doing for the greater good will only intensify through the lens of the pandemic; the public will want to know whether companies put people or profits first during this global crisis,” says Allison Wood, an associate director at Control Risks.
As much of the manufacturing industry in Mexico has continued operations classified as essential throughout the federally mandated quarantine, businesses are facing unique and acute challenges.
Alongside the COVID-19 pandemic, a less-publicized public health crisis is surging across the globe—domestic violence. This guide for employers can help address employee needs and workplace concerns during remote work and return-to-work settings.
Hiring assessments can be a slippery slope for employers, especially when they rule out protected employees and create disparate impact.
Terminations can be triggers for workplace violence in normal times. With COVID-19, these are not normal times, and an organization that needs to lay off staff should account for the unique stress its staff is already enduring.
A long-term push for digital transformation paid off for Microsoft’s security department when COVID-19 disrupted global operations.
As organizations reopen their facilities, they must be aware of threats that may arise from a lack of human presence during shelter-at-home orders, such as the opportunity for Legionnaires’ disease outbreaks.
Employees are an organization’s most valuable asset. Businesses that implement robust and sustainable strategies to take care of their people during the COVID-19 pandemic will fare better than those that do no not.
Laying off employees is always painful, but having to do so when they are completely remote adds a new wrinkle: What should employers do to protect the company's data on laptops and other devices when letting remote workers go?
Harding University Assistant Director of Public Safety Kevin Davis discusses how security at his school managed the pandemic-related campus closure and what they doing to prepare for what comes next.
At this time, there is tremendous value in briefly pausing to reflect on the organization’s COVID-19 journey to date and conduct an “in-flight” incident review as a means of optimizing the approach going forward.
The U.S. Equal Employment Opportunity Commission (EEOC) gave employers the green light to take employees' temperatures to try and ward off the spread of the coronavirus. But will taking temperatures really work?
For international business services company PricewaterhouseCoopers (PwC), managing business continuity and crisis response to the coronavirus pandemic has tested its international, regional and national capabilities. However, key steps—such as the early creation of a dedicated task force for information sharing—have driven a more streamlined, agile crisis response.
Security directors add value when they find data-based leading indicators that can help an organization prepare in advance for the risk factors unfolding as a result of COVID-19.
In the face of the coronavirus pandemic, many companies shut down their offices and told people to work from home. As they begin to reopen, companies will face several major hurdles in their mail centers.
With U.S. unemployment now at record levels, Allied Universal and G4S are swimming against the current by hiring tens of thousands of new security professionals.
As news proliferates yet public interest wanes, security leaders face myriad challenges to present accurate, timely, and actionable information to key decision makers. Here, two CSOs share their tips for communicating and influencing perception during the pandemic.
Using an ESRM-based approach can help organizations re-emerge after facing major, pandemic-induced disruptions.
Convention centers have played an important role in regional pandemic response. Here are some lessons learned from those put into use so far.
Effective leadership in the current crisis requires prioritizing your mental well-being alongside that of your employees.
The coronavirus pandemic could stir further global destabilization even after the virus is contained.
This short segment excerpted from a webinar describes the travel risks the pandemic exposed.
Security professionals are often considered essential personnel who must report to work during the coronavirus pandemic. Here’s what employers need to know to ensure staff is prepared to be at the job site.
ASIS, ANSI, and others open access to certain standards to help organizations in their pandemic response.
Almost one-fifth of the world is under some form of lock down. Here’s how those measures are impacting security teams protecting services and sites.
Amid floods of information, sales pitches, shifting risks, and staffing challenges, how are enterprise security leaders keeping up during the COVID-19 pandemic?
As the pandemic spreads through West Africa, a seasoned manager in Nigeria discusses the implications for security.
The preparation involved in enterprise security risk management (ESRM) enables organizations to act decisively and confidently in times of crisis.
More organizations are shifting to allow employees to work remotely. Now is the time for enterprise risk managers to strengthen programs against new vulnerabilities unique to telework.
Japan Prime Minister Shinzo Abe declared a monthlong state of emergency yesterday in response to the coronavirus pandemic.
Crisis response hinges on two factors: what the organization does and what the organization says. When these halves align, it results in trust and a more positively received and effective response.
The pandemic has increased demand for security among many, and officers are being challenged with new duties and tasks.
The decisions you make today to mitigate the threat of the coronavirus pandemic will have significant impact on your operations in the future.
Brian Ishikawa, senior vice president and director of corporate security for the Bank of Hawaii Corporation, shares how the coronavirus has impacted the bank's business continuity.
Most organizations have activated incident management teams; fewer had practiced for an emergency situation in the previous 12 months.
Scott Stewart from Stratfor explains how security professionals can leverage their creative problem-solving skills and preparedness to diffuse panic and secure operations and assets during the coronavirus pandemic.
Whether employees are working at home or on-site, employers should be aware of various workplace and employment issues raised by COVID-19 mitigation efforts.
The chief information security officer for Fullerton Health, based in Singapore, discusses his organization's experiences dealing with the pandemic.
In light of potential shortages and rising value of personal protective equipment (PPE), healthcare security professionals can take additional steps to protect these newly high-value items and shore up supply chain vulnerabilities.
How are casinos maintaining the softness required for guest services while simultaneously keeping up a tough front against an increasing number of public attacks?
The world has changed since the 2003 SARS outbreak. Has your pandemic preparedness plan changed with it?
Whether de-escalating potentially violent scenarios, managing crowd control, or simply acting as a visual deterrent, highly trained K9 security teams are playing an important role at U.S. hospitals and medical centers.
The use of stolen customer information to purchase goods is becoming an even larger threat to online retailers.
A rash of large insurance claims in the United States has been reshaping the security insurance market, especially regarding security guards and guarding firms.
Every three years, millions of youth from around the globe make a pilgrimage to see the Pope. This poses unique security challenges.
At GSX 2019, Marine Corps General John Kelly (Ret.) sat down with Security Management to talk about how the United States is grappling with issues that the country faces today and will continue to deal with in the future.
Stakeholders can work hand in hand to protect against insider and external threats and reduce the risk of data loss while simultaneously improving data protection and streamlining processes.
How do you protect a soft target—a restaurant, a museum, a park, or a city street—without taking away from its beauty, cultural value, or intended use?
In the aftermath of the Notre Dame fire, security professionals should assess similar risks to their institutions.
En el condado rural de Grant, Washington, el personal de servicios públicos no sólo protege las subestaciones remotas: también ayuda a responder a los llamados de emergencia de la comunidad.
An open office environment and a barricaded exit made it impossible for Capital Gazette employees to flee an active shooter.
Along with a recent renovation, Charleston International Airport invested in a new state of the art IT system to support operational efficiencies, including for its security, surveillance, and access control systems.
The Internet of Things is best understood less as a revolution in and of itself—and more as a transition toward an even greater revolution that we call the Artificial Intelligence of Things, or AIoT.
Para las agencias de seguridad y policiales, el desafío es llevar a cabo las labores del primer respondiente al mismo tiempo que se identifican amenazas de grandes consecuencias para las operaciones de aviación.
In recent years, the cloud has transformed how physical security systems are controlled and managed.
Employees trying to escape a bullying boss may be surprised to learn that their workplace nemesis is providing negative job references.
One critical success factor to advancing asset protection in large corporations is what I call the "technology" of organizing to secure a company's people, critical information, and business strategy.
Healthcare and nursing home facilities have special requirements for access control.
The ability of the shooter to gain access to YouTube's office courtyard via the parking garage raises questions about the building's physical security.
This year, more employers hope to make progress in building inclusive workplaces through diversity recruiting efforts and will continue to experiment with new interviewing and selection techniques.
When building a master security plan, start at the end.
Whether hosted at a sports arena, outdoors, a convention center, or elsewhere, security practitioners are frequently called upon to provide support to large-scale events with sizeable crowds.
Florida Governor Rick Scott announced a major school security plan in the wake of a high school shooting that left 17 dead.
Five steps businesses can take to mitigate the security risk posed by a remote workforce.
Olymbec turned to Hanwha Techwin for upgrading surveillance cameras on its industrial properties.
A distribution partnership for an AI-based solutions provider means it can reach potential customers looking for ways to improve workplace safety.
The Gaylord Opryland Resort and Convention Center in Nashville, Tennessee, upgraded after it found its video surveillance system lacking.
New Orleans is keeping an eye out for illegal dumping, curbing the practice through vigilance from Genetec’s Security Center.
Round1 Entertainment selected Hanwha Techwin cameras and video security solutions to help mitigate an increasing trend of false injury claims at its facilities.
A Texas school district implemented a multiphase project to add wireless, keyless access control. Learn more about this installation, plus mergers, moves, and deals.
The related subjects of workplace violence, school violence, domestic violence in the workplace, violence at religious facilities, healthcare violence, and highly publicized mass attacks that injure, kill, and terrorize our employees and citizens have become standard concerns for security practitioners.
The second edition of Active Shooter Response Training: Lone Wolf to Coordinated Attack takes all of the information provided in its first release and provides expanded information about training for active shooter response.
Learn about the latest projects, installations, mergers, acquisitions, and announcements from the security industry.
No one knows who fired the first shot, but when local miners, their pro-union town leaders, and a gang of private detectives met on 19 May 1920 in Matewan, West Virginia, a shootout formed the catalyst for a period of mine worker unrest and violence—later known as the West Virginia Mine Wars.
Learn about the latest projects, installations, mergers, acquisitions, and announcements from the security industry
Insider threats are among the most damaging risks to organizations, yet too many institutions have been simply oblivious to them—including the FBI.
A good spy story filled with impossibilities, The Liberation of Marguerite Harrison: America’s First Female Foreign Intelligence Agent, unpacks Harrison’s life and accomplishments.
The sixth edition of Handbook of Loss Prevention and Crime Prevention draws on the expertise of more than 25 contributors to survey the security field.
Hunting Whitey documents the FBI’s 16-year hunt for a Boston crime boss.
At age 98, Professor Justus Rosenberg published a memoir—his part of the story of Nazi Germany’s bid for world domination that ended in defeat. Gracefully written and exceptionally edited, Rosenberg gives us a chronicle of heroes and survival, valor, honor, and courage.
Crisis in the Red Zone describes the Ebola outbreak of 2014 and the lessons learned from it.
A U.K.-based security risk consultant shares a collection of risk mitigations gleaned from the COVID-19 pandemic that security managers can include in future planning.
In an effort to connect security professionals worldwide with the most relevant guidance and statistics, ASIS has compiled this list of resources, broken out by region.
U.S. Federal Emergency Management Agency (FEMA) guidance to assist organizations in developing a Pandemic Influenza Continuity of Operations Plan.
Meticulously researched, The Birth of the FBI: Teddy Roosevelt, The Secret Service, and the Fight Over America’s Premier Law Enforcement Agency is also a fast-paced, engaging narrative that describes the origins of U.S federal law enforcement.
A 1787 rebellion over taxation led to the development of stronger national law enforcement and judiciary systems in the United States.
On 11 January 1794, U.S. Marshal Robert Forsyth was the first federal law enforcement officer killed during an adversarial action.
Readers join Special Agent Tom White as he uncovers a conspiracy—a culture of killing—that exploited an outdated guardianship system prohibiting Native Americans from administering their own wealth.
In 1923, Osage leaders requested U.S. federal government assistance investigating murders of tribal members in the Oklahoma oil fields. The BOI assigned one special agent.
The Pinks: The First Women Detectives, Operatives, and Spies with the Pinkerton National Detective Agency is loaded with undiscovered history and told in an easily read, engaging style.
In 1862, mixed race detective Hattie Lawton was recruited to join a secret Union intelligence agency.
In 1856, Allan Pinkerton hired Kate Warne—the first female detective to join the Pinkerton Agency.
Security Management magazine is partnering with Pivot3 to conduct research on current trends and practices in video surveillance
Crises that organizations face come in many forms, from workplace violence to weather catastrophes.
Security Management magazine, with partner MSAB, has commissioned a survey to examine current trends and challenges in deploying mobile forensics technology.
Everbridge, in conjunction with Security Management magazine, is conducting research to uncover trends in active shooter incident preparation.
Participate in a survey on executive protection trends and challenges.
Biodefense strategies remain a critical priority issue both in the United States and internationally.
Studying the past and looking ahead at the challenges of the future will help current and future practitioners to prepare and confront those who wish to do harm.
With support from ASIS Europe, SSR conducted a salary survey of European security professionals.
Former U.S. National Security Advisor Michael T. Flynn pleads guilty to lying to the FBI.
Security Management spoke to Jeffrey A. Slotnick about the deadly shootings in Las Vegas and the event's significance for active shooter preparedness and physical security.
Think of soft targets like a bullseye with rings around it. Picture an airport where security needs to start prior to the secure area. If the airport is the bullseye, security needs to start in the parking lot, baggage delivery, at ticket counters.