Skip to content
Menu
menu

Disease Outbreak Security Resources

Disease Outbreak Security Resources

The coronavirus (COVID-19) outbreak has had a major impact on the security and business continuity of organizations around the globe. In light of the outbreak, ASIS has curated useful resources for security professionals.

Virtualization and Empowerment

microsoft-vsoc

When disaster strikes, can you take your security operations to-go? A long-term push toward digital transformation paid off for Microsoft’s security department when COVID-19 hit, putting business continuity and security monitoring plans to the test.

ASIS Member Appreciation Month

Adapting to the Future of Utility Security

Convergence in Utility Security

In considering future trends and demands, focus on four key areas to increase adaptability enough no matter what lies beyond the horizon. In this article, Doug Powell, CPP, PSP, explains how adaptability leads to innovation in utilities security and beyond.

Book Review: Security Management for Healthcare, by Bernard Scaglione, CPP

"Working in healthcare security for 25 years, I know that approval for security budget dollars is more challenging than ever. Scaglione offers advanced techniques on how to better focus security efforts without inflating budgets," writes reviewer Scott A. Hill, CPP. 

Read the Review 

Buy the Book


member appreciation month logo.png

Throughout the month of March, ASIS International is celebrating its members by offering prizes, free content, and special savings on ASIS professional development resources. Security Management especially thanks the ASIS members who contribute articles, review books, and write new content for the security industry. 

Learn More About Member Appreciation Month

Magnificent Manager, Compelling Coach

0220_Cover.jpgFebruary 2020 | COVER STORY
   Coaching is a crucial function of managing. Every effective leader must be able to do it well. Such is the philosophy of Cherissa Newton, coauthor of the book Coaching for Results and a leadership expert at the Center for Management and Organizational Effectiveness (CMOE). It’s also the view held by many seasoned security managers like David Barton, the chief information security officer at Stellar Cyber, who previously served as director of security for AT&T and corporate security group manager for Sprint over his long management career.
   “Hopefully as a leader, you realize sooner rather than later that being a good coach to your team is part of being a good manager,” Barton says. “You can’t have one without the other.”

Security Management Magazine

July 2020 Issue

July 2020 CoverSecurity on the Witness Stand
By Claire Meyer

    Can your security program stand up to courtroom scrutiny? Everything from spelling errors in a security officer’s incident report to how witnesses present themselves can color a courtroom’s perception of the security program in question and whether it failed to meet acceptable standards of care.
    From documentation to witness statements to video surveillance, learn what lawyers and expert witnesses are watching for in negligent security court cases.


Read the Article

Food Defense and the Insider Threat

January 2020 cover.jpgJanuary 2020 | COVER STORY

It was a story of strawberries, needles, and spite, and it launched a nationwide scare. In 2018, the Queensland police arrested a former strawberry farm supervisor for spiking supermarket strawberries with sewing needles, a crime that terrified consumers and crippled Australia’s strawberry industry.

When it comes to food defense in manufacturing and processing facilities, personal grievances can trigger widespread public health impacts. Learn more in this month's cover story. 

Online, Bullying Risks Build Up

Students are under ever-increasing pressure to perform academically, to navigate complex social scenes in school and online, and to keep safe.

Pennsylvania’s new Safe 2 Say Something school threat reporting system generated more than 23,000 tips in its first six months of operation, with submissions via mobile app, website, and tip line. Most reports were not about threats of violence toward schools or other people. Instead, bullying, self-harm, and suicide were the most common concerns brought forward.

Keep Reading

Partnering with Privacy

Evolving regulations and public expectations are changing how security practitioners incorporate privacy protections into technology solutions. Recent regulatory fines, particularly for violations of the General Data Protection Regulation (GDPR), show how critical it has become for security and privacy practitioners to partner together to provide solutions for their organizations.

Check out this month's issue of Security Technology.

Sneak Peek: The March Issue

A Contagious Crisis

0220_Cover.jpgComing 1 March 2020
  New research finds that the world is not prepared to prevent or respond to a global pandemic. But lessons learned from previous outbreaks can help address vulnerability gaps.
   Learn more about security's role in pandemic and epidemic preparedness and response in the March issue of Security Management.

Focus on Active Assailant

Active Assailant, Unarmed Officer

Active shooter attacks often end when the perpetrator is apprehended or killed by law enforcement, or when the attacker commits suicide—rarely do assailants run or escape. Having security guards onsite may mitigate the chances of an attack, but this type of embedded response is no guarantee that the attacker will be deterred or stopped.

Quote Example

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Nisi scelerisque eu ultrices vitae auctor eu augue. Leo integer malesuada nunc vel risus commodo viverra maecenas. Nisi porta lorem mollis aliquam ut. Felis donec et odio pellentesque diam volutpat. At auctor urna nunc id cursus metus aliquam eleifend mi. Nisl nunc mi ipsum faucibus vitae aliquet. Id aliquet risus feugiat in ante. Tincidunt vitae semper quis lectus nulla at. Semper viverra nam libero justo laoreet sit amet. Nibh nisl condimentum id venenatis a condimentum vitae."

Breaking News

New York City Blackout Officials of Con Edison, which operates the city’s power grid, said there was “a significant electrical transmission disturbance” at 6:47 p.m. on Saturday that left 72,000 of its customers on the West Side of Manhattan without power until late into the night. But they provided scant insight into the underlying cause of the failure, which came on the 42nd anniversary of one of the most infamous blackouts in the city’s history.

Focus on Cybersecurity

Seeking SMS Authentication Alternatives

Mobile device security; banking, finance, and insurance (industry)

Multifactor authentication based on SMS-delivered codes has been successful in preventing phishing attacks in many cases. But on 17 September 2019, the FBI issued a Private Industry Notification warning cybersecurity professionals that the Bureau had seen cyber actors circumventing multifactor authentication through social engineering and technical attacks.

Thank You!

Security Management especially thanks the ASIS members who contribute articles, review books, and write new content for the security industry. 

Article: Shelter From the Storm

Although Houston hospitals anticipate rough weather during “hurricane season” every year, recent major storms that caused catastrophic flooding for the Gulf Coast area tested regional healthcare providers’ emergency preparedness and organizational resiliency. Learn more about the vital role healthcare security teams play before, during, and after massive storms in this article from Elhadji Sarr, CPP, and Keith McGlen, CPP, CHPA.
;
arrow_upward