Skip to content
Menu
menu

Security Management: Focus on Buy-In Strategies

Is Your Pitch Convincing Enough?

If adoption for your security initiatives keeps falling flat, it might be time to reevaluate how you present your program to stakeholders—both the C-suite and the frontline. In this collection of articles from Security Management, explore how security leaders can hone their arguments and make a stronger case for security in boardrooms, hospitals, operations centers, and more.

More On This Topic
Profits from Professionalism: How Healthcare Security Teams Can Boost Revenue Potential
How to Measure Your Risk Monitoring Activities
5 Ways to Connect with Boards of Directors About Cybersecurity and Digital Transformation
Strategies for Long-Term Buy-In: Start with the ABCs
Building and Defending a Plan for Preventative Maintenance

Focus on Bomb Threats

Black and white photo of destroyed the Greenwood District of Tulsa, Oklahoma

Amid Bomb Threats, Schools Seek Support and Resources

U.S. government agencies have noted an uptick in the number of bomb threats and explosive incidents since 2015, especially targeted towards minority institutions. Here’s how support agencies are stepping up to increase awareness and training to improve response.

More On This Topic
▪An Explosive Situation: Strategies to Prevent Youth Radicalization
▪Historically Black, Historically Targeted: HBCUs Experience More Bomb Threats, Violent Rhetoric
▪Timeline: A Pattern of Violence
▪New Tech for an Age-Old Threat
▪13 Steps Organizations Can Take to Prepare for a Bomb Threat

Testing Testing

Influencers and Abusers: Keeping Online Celebrities Safe

How can security professionals respond to online threats and protect influencers

To learn more about how security practitioners can respond to online threats and protect influencers—from social media to basketball stars—Security Management interviewed a risk expert.

Test Test Test

Text text text

Focus on Career Paths and Leadership

Onboarding Beyond Zoom

Millions of people are transitioning to new, changed, or evolving roles in the post-pandemic upheaval. As onboarding shifts virtual, CSOs have an opportunity to leverage a new normal of online meetings to get up to speed and begin adding value faster and more effectively.

Twenty Years Later: Security Ramifications and Reflections on the 9/11 Attacks

The 9/11 attacks killed 2,996 people and injured approximately 25,000 others in the deadliest terror attack in U.S. history. Of those killed were 403 first responders, making it the largest loss of life of U.S. first responders in a single incident. The attacks drastically changed people’s relationship with security departments, overhauling aviation security for airports and passengers and placing new emphasis on the need to train for evacuations.

Join us as we reflect on the events of 11 September 2001 and their effect on the security profession worldwide today.

Bonus Access to Security Management

Check out the featured product showcase to get a sneak peek at some of the newest solutions in the security industry, including some that are on display at GSX in September 2021. 

In addition, the September/October 2021 edition of Security Management is widely available for a limited time. Access the full issue here

Want more Security Management? ASIS members have access to our back catalog of downloadable issues, as well as exclusive ASIS content, Standards & Guidelines, educational webinars, and more. Learn more about membership here

Security Management: Your Award-Winning Publication

Excellence in Magazine Design

Security Management won a Gold National Award from the American Society of Business Publication Editors (ASBPE) for magazine design. Congratulations to the Security Management Production & Creative Services team!

Praise for SM Online

Security Management's website design was awarded a Silver National Azbee Award. We believe excellent design and art are essential to help readers connect with and share complex content, especially online.

Legal Report

A U.S. state supreme court found that Wisconsin’s governor overstepped in issuing a month-long extension of stay-at-home orders in response to the coronavirus pandemic.

Disease Outbreak Security Resources

Disease Outbreak Security Resources

The coronavirus (COVID-19) outbreak has had a major impact on the security and business continuity of organizations around the globe. In light of the outbreak, ASIS has curated useful resources for security professionals.

How to Avoid Pandemic-Related Litigation Risks

Worries over workplace safety in the COVID-19 era, as well as concerns about the impacts of business closings, plant shutdowns and mandatory stay-at-home orders, spawned more than 2,000 lawsuits from January 2020 through March 2021.

ASIS Member Appreciation Month

How to Anticipate Mass Protest and Disruption

The world is entering a decade of rage, unrest, and shifting geopolitical sands. Security leaders need to understand the factors behind mass protests to accurately predict them and mitigate their effects. In this article, Michael Center and Dieter Arendt outline the triggers behind recent civil unrest and what security professionals can do to prepare for the future.

Book of the Year: Strategic Security: Forward Thinking for Successful Executives, by Jean Perois, CPP, PCI, PSP

The information is timely and relevant, and it provides an excellent discussion on building or being prepared to lead a successful security organization,” writes reviewer Yan Byalik, CPP.

Read the Review

Buy the Book


member appreciation month logo.png

Throughout the month of March, ASIS International is celebrating its members by offering prizes, free content, and special savings on ASIS professional development resources. Security Management especially thanks the ASIS members who contribute articles, review books, and write new content for the security industry. 

Learn More About Member Appreciation Month

Magnificent Manager, Compelling Coach

0220_Cover.jpgFebruary 2020 | COVER STORY
   Coaching is a crucial function of managing. Every effective leader must be able to do it well. Such is the philosophy of Cherissa Newton, coauthor of the book Coaching for Results and a leadership expert at the Center for Management and Organizational Effectiveness (CMOE). It’s also the view held by many seasoned security managers like David Barton, the chief information security officer at Stellar Cyber, who previously served as director of security for AT&T and corporate security group manager for Sprint over his long management career.
   “Hopefully as a leader, you realize sooner rather than later that being a good coach to your team is part of being a good manager,” Barton says. “You can’t have one without the other.”

Security Management Magazine

November/December 2022 Issue

1122-Cover.jpgTranslating Your Threat Assessment Approach
By Cornelis van Putten and Bram B. Van der Meer

Threat assessment and management (TAM) procedures are not universally effective. What is considered common sense in the United States is often received in Europe with skepticism, resistance, and, in some situations, even disdain. A U.S. company’s workplace violence training programs and approaches can fail to find fertile soil in its European branches. Developing and setting up a threat management program to work internationally needs restructuring and reframing to make it more acceptable for different teams.

Read the Article

Food Defense and the Insider Threat

January 2020 cover.jpgJanuary 2020 | COVER STORY

It was a story of strawberries, needles, and spite, and it launched a nationwide scare. In 2018, the Queensland police arrested a former strawberry farm supervisor for spiking supermarket strawberries with sewing needles, a crime that terrified consumers and crippled Australia’s strawberry industry.

When it comes to food defense in manufacturing and processing facilities, personal grievances can trigger widespread public health impacts. Learn more in this month's cover story. 

Online, Bullying Risks Build Up

Students are under ever-increasing pressure to perform academically, to navigate complex social scenes in school and online, and to keep safe.

Pennsylvania’s new Safe 2 Say Something school threat reporting system generated more than 23,000 tips in its first six months of operation, with submissions via mobile app, website, and tip line. Most reports were not about threats of violence toward schools or other people. Instead, bullying, self-harm, and suicide were the most common concerns brought forward.

Keep Reading

Security Technology: Will Security Meet the AI Moment?

Artificial intelligence (AI) is beginning to change the security industry. Read the April issue of Security Technology to explore new AI uses, emerging threats, and developing regulations impacting the security profession.

Sneak Peek: The March Issue

A Contagious Crisis

0220_Cover.jpgComing 1 March 2020
  New research finds that the world is not prepared to prevent or respond to a global pandemic. But lessons learned from previous outbreaks can help address vulnerability gaps.
   Learn more about security's role in pandemic and epidemic preparedness and response in the March issue of Security Management.

Focus on Active Assailant

Active Assailant, Unarmed Officer

Active shooter attacks often end when the perpetrator is apprehended or killed by law enforcement, or when the attacker commits suicide—rarely do assailants run or escape. Having security guards onsite may mitigate the chances of an attack, but this type of embedded response is no guarantee that the attacker will be deterred or stopped.

Quote Example

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Nisi scelerisque eu ultrices vitae auctor eu augue. Leo integer malesuada nunc vel risus commodo viverra maecenas. Nisi porta lorem mollis aliquam ut. Felis donec et odio pellentesque diam volutpat. At auctor urna nunc id cursus metus aliquam eleifend mi. Nisl nunc mi ipsum faucibus vitae aliquet. Id aliquet risus feugiat in ante. Tincidunt vitae semper quis lectus nulla at. Semper viverra nam libero justo laoreet sit amet. Nibh nisl condimentum id venenatis a condimentum vitae."

Breaking News

New York City Blackout Officials of Con Edison, which operates the city’s power grid, said there was “a significant electrical transmission disturbance” at 6:47 p.m. on Saturday that left 72,000 of its customers on the West Side of Manhattan without power until late into the night. But they provided scant insight into the underlying cause of the failure, which came on the 42nd anniversary of one of the most infamous blackouts in the city’s history.

Focus on Cybersecurity

Seeking SMS Authentication Alternatives

Mobile device security; banking, finance, and insurance (industry)

Multifactor authentication based on SMS-delivered codes has been successful in preventing phishing attacks in many cases. But on 17 September 2019, the FBI issued a Private Industry Notification warning cybersecurity professionals that the Bureau had seen cyber actors circumventing multifactor authentication through social engineering and technical attacks.

Thank You!

Security Management especially thanks the ASIS members who contribute articles, review books, and write new content for the security industry. 

The Milestones in the Marathon

“Fail to plan, plan to fail” is how the saying goes, and it applies to more than emergency preparedness. When you do not know where you are going, it is easy to feel like you never get ahead. Mapping your journey can help as security managers track their progress, advance organizational change, and boost department morale.

Leveraging Tactical Training as a Leadership Advantage

Every security company is only one bad video or viral social media post away from a public relations disaster. There are many issues to unpack with respect to use-of-force performance. One of the most significant—and ironically one of the least talked about—is the fact that industry standard training and qualification methods do a poor job of preparing people to use tactical skills in the real world.

arrow_upward