Skip to content
Menu
menu

High-profile individuals face a range of threats from stalkers to online harassers to physical attacks. What type of methods are used to mitigate these threats?

Building a Methodology for Proactive Close Protection

Great Britain had a very tumultuous and toxic 2016, with reported crimes up nearly 80 percent during that year at one point. It was also Jo Cox’s second year as an MP in the House of Commons, and by then she was a recognizable politician and member of the Labour Party. In June 2016, she was attacked and killed at a campaign event.

A subsequent police investigation would discover that her attacker held extreme right-wing views and had collected a dossier on Cox—seemingly becoming fixated on her and the causes she championed, which were in opposition to his own. Cox was not protected by a security detail when she was killed, and the British government created a separate task force to review security protections for MPs.

Read the Article

Related: Digital Threats to High Value Targets Pose Physical Security Risks

Recommended: Celebrity Protection in the Spotlight

Featured Articles

How new technology is making cities smarter and connecting infrastructure

Security Technology: Make Way for the Metropolis

More than 4.2 billion people live in cities today, with another 2.5 billion expected to move into them by 2050. To keep up with the demands of this population growth, many cities are incorporating technology through the smart city movement to become more livable, sustainable, and safer. The June 2022 issue of Security Technology takes a look at how these investments are playing out around the world, and the security opportunities and risks they pose.

Spotlight on Healthcare Security

Security Management Podcast

July 2022: Building Credibility and Preparedness in Local Operations; Plus Managing Digital Nomads

How can a global enterprise build security and business continuity capacity in their local branches? Develop credibility through listening and patience, says RC Miles with the AIDS Healthcare Foundation. That capacity paid off when conflict arose, he tells SM Highlights host Chuck Harold in this episode, sponsored by RaySecur. Also in this episode, Todd Sowinski from West Pharmaceutical explains how the organization has built out procedures and guidance to keep digital nomad workers safe and accounted for.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: Code Black: 50 Lessons in Crisis Management for Effective Leadership

Book review: Code Black

Featured in the July/August Issue

Code Black discusses fundamentals of crisis management, security management, risk management, and how businesses and government agencies deal with conflict in today’s turbulent times.

Security-Snapshots-Logo.jpg

Cannabis products can be a life-saving treatment for many people, and people should be able to access that treatment securely—and employees producing those products should be kept safe and secure as well, says Carrie Goetz, PSP, principal and CTO of StrategITcom and steering committee chair of the new ASIS Cannabis Security Community. Goetz and other ASIS members are working on producing a new standard for cannabis security to help guide operators make risk management decisions amid a variety of compliance requirements.

ASIS members can join the Cannabis Security Community here: Cannabis Security Community - ASIS Connects (asisonline.org)

Security Management News Feeds

;
record_voice_over

Podcasts

Hear what Security Management editors and guest speakers have to say about this month’s magazine.

cast_for_education

Webinars

View all of our past and upcoming educational webinars.

cloud_download

Download

ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.

arrow_upward