Skip to content
Menu
menu
Photo of Cargo Ship at Sunset in Port of Container port in Hong Kong

How to Foster Resilience When Diversifying Supply Chains

Diversification is a long-term strategy that aims to make global supply chains more resilient from geopolitical-related risks. Depending on the industry, diversification may also include friend- or near-shoring. However, as mature supply chains diversify, there are also associated risks with new geographic areas and less developed supply chain programs at these new locations. This evolving process requires a period of adaptation and the maturation of new supply chain programs, including for security compliance.

Continue Reading

Featured Articles

Photo of West Ham United's Thilo Kehrer is accidentally tackled by a security guard as pitch invaders enter the field following the UEFA Europa Conference League Final at Fortuna Arena in Prague.

Security Technology: Security Brings Its “A Game”

Negative fan behavior. Weather issues. Cyberattacks. Rogue drones. Security incidents at sporting events impact both athletes on the field and fans in the stands. In the June issue of Security Technology, learn how security directors across sport are responding.

Security Management Podcast

Illustration featuring two men standing up through cell phones. One holds a mask to otherwise identical face and figure, insinuating that he is a deepfake of the other man..

July 2024: Fakes, Frauds, and How Preparedness Pays Off

If you were publicly depicted in a compromising position—even if the depiction is fake—it can result in emotional trauma. Bruce Blythe from R3 Continuum explains how to prepare to support victims of deepfakes. Glenn Schoen from Boardroom@Crisis shares how counterfeiting and fraud affect food and beverage companies worldwide. Security can help protect brand reputation by partnering with other teams, including marketing and consumer relations. Then, Ontic CSO Chuck Randolph and SM Highlights host Brendan Howard discuss converged risk—from cyber to site security to geopolitics—and what it means for event security and close protection.

Focus on Executive Protection

When Second Homes Are a Primary Concern

Vacation homes are supposed to be sanctuaries, and the people who decamp there usually treat it as such. Two experts offer advice on how executive protection teams can help make these places of refuge rejuvenating and safe for clients.

Celebrity Protection in the Spotlight

Celebrities are constantly surrounded by cameras—from paparazzi to fans to livestreams on their own smartphones. This constant attention puts new pressure on personal protection professionals to manage public perception while mitigating escalating threats.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: Modern Management and Leadership: Best Practice Essentials with CISO/CSO Applications

In Modern Management and Leadership, Best Practice Essentials with CISO/CSO Applications, author Mark Tarallo has written a valuable guide to help a CSO be successful in their role.

Catch Up With SM on Social Media

Share the latest SM articles, infographics, and stories with your friends and colleagues.
record_voice_over

Podcasts

Hear what Security Management editors and guest speakers have to say about this month’s magazine.

cast_for_education

Webinars

View all of our past and upcoming educational webinars.

co_present

Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 

cloud_download

Download

ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.

arrow_upward