Communicating the value of a proposed security solution requires an understanding of culture, decision-makers’ priorities, and how to develop a direct and adaptable presentation. But to create a truly impactful proposal, security leaders must customize and target it to fit the unique dynamics and goals of the project or organization.
Featured Articles

Speaking the C-Suite Language: A Strategic Approach to Security Budgeting

Q&A: A Psychologist's View of School Security Highlights the Value of Collaboration

Beyond Greenwashing: How to Identify Sustainable Security Vendors and Gain a Competitive Edge
Corporate decision-makers committed to achieving sustainability goals must distinguish between vendors who genuinely practice sustainability and those that engage in greenwashing.

Security Technology: Business Travel is Back
Employee travel is making a comeback five years after the COVID-19 pandemic disrupted most work-related trips. But the threat landscape for business travelers is drastically different than it was in 2019, and security practitioners are increasingly taking advantage of technology to proactively protect staff while traveling.
Best of Security Management
Security Management Podcast

Safer Travels: Wrongful Detention, Active Assailants, and Duty of Care
Business travel is back, and travel risk is back right with it. In this episode of the SM Highlights podcast, Robert Dodge outlines the growing threat of wrongful detention during business travel, his own experiences being detained abroad, and how to educate travelers about risk. Gene Petrino shares proactive strategies for preventing workplace violence incidents, including threat assessments and early intervention. Then, Dale Buckner explains how duty of care is changing in the face of escalating and overlapping crises, from hurricanes to pandemics and more.
Focus on Career Transitions

Adjust Your Expectations: Tough Truths About Cross-Sector Career Transfers
While there are many commonalities between public and private security, the transition can still be challenging.
More On This Topic
▪ Your Two-Year Map for Public to Private Career Transitions
▪ 3 Steps to Prepare for A New Position in Security Management
▪ How to Cope with Cross-Sector Culture Differences
▪ A Strategic Approach to Transitioning from Police Work to the Business World
▪ Fast Facts: How to Develop an Effective Private Sector Résumé
Read the full content collection from Security Management here.
ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.
Book Review: Private Security: An Introduction to Principles and Practice, 2nd Edition

Your first feeling after reading Private Security: An Introduction to Principles and Practice, 2nd Edition, should be amazement that a single author could corral so many details about private security, even if you agree that security is expanding as our lifestyles evolve.
Catch Up With SM on Social Media



Podcasts
Hear what Security Management editors and guest speakers have to say about this month’s magazine.
Webinars
View all of our past and upcoming educational webinars.
Media Kit
Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes.
Archives
Access old issues of Security Management and other content.
Download
ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.
Security Technology
Read the latest articles from our newest publication, Security Technology.