Skip to content

The Physical Ramifications of Cyber Response

Human beings need to sleep. Adults, specifically, need seven to nine hours of sleep to feel recharged and to prevent serious health problems. When people don’t get enough sleep, there are ramifications. They are less alert, their memory doesn’t function as well, their relationships might feel stressed, and they’re also much more likely to be in a vehicle crash.

Yet, when a security incident occurs, many incident responders feel the need to work extreme hours to help their organization mitigate the damage and move forward in the recovery process.

“I’ve seen horrendous instances of people not sleeping for three days,” says Laurance Dine, global lead of incident response for IBM Security X-Force. “It’s very simple to say that after the first 24 hours without sleep, you’re useless. You’re not helping anybody.”

Read the Article

Related: Under Pressure Managing Team Wellness

Recommended: How to Keep High-Performance Security Teams Motivated

Featured Articles

‘Pen-Tested’ by a Hacker: What to Believe

Some criminals are posing as penetration testers, offering corporate security reports in exchange for ransom payments. Here’s how to spot the difference between who’s legitimate and who’s a con, and measures to take to protect your networks.

Close up photo of a typewriting with the phrase "Are you Ready" typed on a piece of paper. There is an light blue overlay with circuit imagery over the image. How to recover after a cybersecurity hack.

Security Technology: Strengthening Your Cybersecurity Posture

In 2021, there were several high-profile incidents of security technology being compromised due to poor cybersecurity hygiene, increasingly aggressive nation-state actors, and a growing attack surface with the adoption of IoT and OT. These trends have only continued in 2022, suggesting a new normal for the threat landscape. The October issue of Security Technology will look at how the security industry is incorporating cybersecurity risk into the technology and systems it relies on.

Security Management Podcast

October 2022: ESG—A Board Priority and a Matter of Life and Death; Plus BEC Scams and Defenses

Security and environmental, social, and governance (ESG) priorities may seem like strange bedfellows, says Lindsay Whyte, but where boardrooms are concerned, security can enable advancement in ESG efforts and ESG can be a matter of life and death—especially in isolated locations with high-value resources. In this episode of SM Highlights, hosted by Chuck Harold, learn more about ESG as a crisis management tool.

Also, learn from Tonia Dudley from Cofense about how business email compromise (BEC) fraud is evolving to take advantage of business processes and routines and what it means for security professionals.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms

The CISO’s Next Frontier: AI, Post-Quantum Cryptography

Featured in the September/October Issue

When it comes to computer security, the times are constantly changing. That is one of the most challenging aspects of security—by the time you finally secure something, numerous new threats have arrived.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.


The guarding industry faced a perfect storm of personnel challenges during the COVID-19 pandemic, and it’s still recovering from the labor shortfall, says Leon Beresford, CPP, PCI, PSP, from the ASIS Security Services Community. So, how can guarding firms and in-house security teams stay competitive and attractive to qualified candidates? It’s time to expand your employee satisfaction and recruitment toolkit.

ASIS members can continue the conversation by joining the Security Services Community here.

Security Management News Feeds



Hear what Security Management editors and guest speakers have to say about this month’s magazine.



View all of our past and upcoming educational webinars.



ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.