Hamas’ terror attack in Israel on 7 October 2023 represented a major security breach as militants were able to gain access deep into the country. While the conflict unfolded in the physical arena, it was also being fought in the digital realm with a rise in inflammatory and hateful content being shared online, according to analysis by the Anti-Defamation League (ADL).
The potential for Chinese platforms to contribute to reshaping business, power, and influence globally could be far reaching. Their prospects for doing so look good, with growth enabled by four key drivers.
Is it possible to eliminate the risks posed by social media entirely? Probably not, but there can be a happy medium by implementing best practices for social media governance.
Security Technology: Aligning the Social Media Stars
Best of Security Management
An employment separation done with dignity not only reduces the risk of such harm, but it also brings the benefits of a better future relationship with the organization.
▪ Preventing Workplace Violence: A Company’s Duty in Challenging Times
▪ How to Fire Employees Lawfully in the UK
▪ Fast Facts: What is the Pathway to Violence?
▪ 4 Key Types of Terminations
National security policy researcher Peter Raymond shares how China’s global technology influence—especially on social media—is changing risk equations for private organizations and governments worldwide. Also in this month’s SM Highlights podcast, Bud Miller, CPP, explains how coupon fraud has gotten more sophisticated and what that means for retailers, especially in the holiday shopping season. Then, Tim Sutton, CPP, PCI, PSP, introduces listeners to an upcoming ASIS Standard about cannabis security.
Senior advisor for threat mitigation and global operations, Center for Personal Protection Safety (CPPS)
“The reality is that it does not have to be a high-profile, highly politically charged episode. You don't have to do anything wrong to run afoul of this. I think it’s important to talk about what are some of the pitfalls, specifically, for where you go in the world. Each region is a little different; each country is different.”
A.M. Bobby Brumfield
Managing partner, Leonum Advisors
“The only way you can find out how the organization communicates is to bring people to the table, let them know what the overall goal is, and then get their input on how we make that happen.”
Erik Antons, CPP, PSP
Chief Security Officer, Whirlpool Corp.
“Technical security standardization can provide significant economic advantages as well. By selecting one or a limited range of products for your enterprise, you can become masters of support rather than generalists with a wider range of products.”
Chief operations officer, CyberPeace Institute
“(Nonprofits) collect, process, transfer, and house a lot of sensitive data about their activities and the vulnerable communities they protect—think of migrants, political activists, dissidents—and they raise funds.”
Founding member, Idaho Office of School Safety and Security
“Most security practices and convenience are polar opposites. As applied to a school environment, remember that educators are already overtasked. Any process or procedure perceived to make a teacher’s mission more difficult will engender substantial opposition.”
Crisis and security practitioner
“While catastrophic natural disasters have direct and overt impacts, such events often trigger a cascade of second or third order impacts which manifest in ways that are hard to predict.”
As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.
In Modern Management and Leadership, Best Practice Essentials with CISO/CSO Applications, author Mark Tarallo has written a valuable guide to help a CSO be successful in their role.
Hear what Security Management editors and guest speakers have to say about this month’s magazine.
View all of our past and upcoming educational webinars.
Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes.
Access old issues of Security Management and other content.
ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.
Read the latest articles from our newest publication, Security Technology.