Skip to content

Disease Outbreak Security Resources

Disease Outbreak Security Resources

The coronavirus (COVID-19) outbreak has had a major impact on the security and business continuity of organizations around the globe. In light of the outbreak, ASIS has curated useful resources for security professionals.

Crisis Communications: Skills for Security Professionals

Crisis response hinges on two factors: what the organization does and what the organization says. When these halves align, it results in trust and a more positively received and effective response. When they conflict, organizations struggle to recover. 

ASIS Member Appreciation Month

Adapting to the Future of Utility Security

Convergence in Utility Security

In considering future trends and demands, focus on four key areas to increase adaptability enough no matter what lies beyond the horizon. In this article, Doug Powell, CPP, PSP, explains how adaptability leads to innovation in utilities security and beyond.

Book Review: Security Management for Healthcare, by Bernard Scaglione, CPP

"Working in healthcare security for 25 years, I know that approval for security budget dollars is more challenging than ever. Scaglione offers advanced techniques on how to better focus security efforts without inflating budgets," writes reviewer Scott A. Hill, CPP. 

Read the Review 

Buy the Book

member appreciation month logo.png

Throughout the month of March, ASIS International is celebrating its members by offering prizes, free content, and special savings on ASIS professional development resources. Security Management especially thanks the ASIS members who contribute articles, review books, and write new content for the security industry. 

Learn More About Member Appreciation Month

Magnificent Manager, Compelling Coach

0220_Cover.jpgFebruary 2020 | COVER STORY
   Coaching is a crucial function of managing. Every effective leader must be able to do it well. Such is the philosophy of Cherissa Newton, coauthor of the book Coaching for Results and a leadership expert at the Center for Management and Organizational Effectiveness (CMOE). It’s also the view held by many seasoned security managers like David Barton, the chief information security officer at Stellar Cyber, who previously served as director of security for AT&T and corporate security group manager for Sprint over his long management career.
   “Hopefully as a leader, you realize sooner rather than later that being a good coach to your team is part of being a good manager,” Barton says. “You can’t have one without the other.”

Security Management Magazine

April 2020 Issue

February 2020 CoverHow to Create a Culture to Prevent Harassment
By Megan Gates

    While organizations need to have procedures to report and investigate claims of sexual harassment in the workplace, they can also take steps to proactively prevent the behavior in the first place.
     U.S. Equal Employment Opportunity Commission research found that to effectively do this, organizations need to have commitment from leadership to create a diverse, inclusive, and respectful workplace. Not only is this the right thing to do, but it is also financially beneficial to the organization.

Read the Article

Food Defense and the Insider Threat

January 2020 cover.jpgJanuary 2020 | COVER STORY

It was a story of strawberries, needles, and spite, and it launched a nationwide scare. In 2018, the Queensland police arrested a former strawberry farm supervisor for spiking supermarket strawberries with sewing needles, a crime that terrified consumers and crippled Australia’s strawberry industry.

When it comes to food defense in manufacturing and processing facilities, personal grievances can trigger widespread public health impacts. Learn more in this month's cover story. 

Online, Bullying Risks Build Up

Students are under ever-increasing pressure to perform academically, to navigate complex social scenes in school and online, and to keep safe.

Pennsylvania’s new Safe 2 Say Something school threat reporting system generated more than 23,000 tips in its first six months of operation, with submissions via mobile app, website, and tip line. Most reports were not about threats of violence toward schools or other people. Instead, bullying, self-harm, and suicide were the most common concerns brought forward.

Keep Reading

Future Proof

Today, methods of authentication are sophisticated but tend to rely on three factors—something we know, something we have, or something we are—to gain access. But these authentication methods rely heavily on what some see is an outdated, and insecure, tool: passwords.

Check out this month's issue of Security Technology.

Sneak Peek: The March Issue

A Contagious Crisis

0220_Cover.jpgComing 1 March 2020
  New research finds that the world is not prepared to prevent or respond to a global pandemic. But lessons learned from previous outbreaks can help address vulnerability gaps.
   Learn more about security's role in pandemic and epidemic preparedness and response in the March issue of Security Management.

Focus on Active Assailant

Active Assailant, Unarmed Officer

Active shooter attacks often end when the perpetrator is apprehended or killed by law enforcement, or when the attacker commits suicide—rarely do assailants run or escape. Having security guards onsite may mitigate the chances of an attack, but this type of embedded response is no guarantee that the attacker will be deterred or stopped.

Quote Example

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Nisi scelerisque eu ultrices vitae auctor eu augue. Leo integer malesuada nunc vel risus commodo viverra maecenas. Nisi porta lorem mollis aliquam ut. Felis donec et odio pellentesque diam volutpat. At auctor urna nunc id cursus metus aliquam eleifend mi. Nisl nunc mi ipsum faucibus vitae aliquet. Id aliquet risus feugiat in ante. Tincidunt vitae semper quis lectus nulla at. Semper viverra nam libero justo laoreet sit amet. Nibh nisl condimentum id venenatis a condimentum vitae."

Breaking News

New York City Blackout Officials of Con Edison, which operates the city’s power grid, said there was “a significant electrical transmission disturbance” at 6:47 p.m. on Saturday that left 72,000 of its customers on the West Side of Manhattan without power until late into the night. But they provided scant insight into the underlying cause of the failure, which came on the 42nd anniversary of one of the most infamous blackouts in the city’s history.

Focus on Cybersecurity

Seeking SMS Authentication Alternatives

Mobile device security; banking, finance, and insurance (industry)

Multifactor authentication based on SMS-delivered codes has been successful in preventing phishing attacks in many cases. But on 17 September 2019, the FBI issued a Private Industry Notification warning cybersecurity professionals that the Bureau had seen cyber actors circumventing multifactor authentication through social engineering and technical attacks.

Thank You!

Security Management especially thanks the ASIS members who contribute articles, review books, and write new content for the security industry. 

Article: Shelter From the Storm

Although Houston hospitals anticipate rough weather during “hurricane season” every year, recent major storms that caused catastrophic flooding for the Gulf Coast area tested regional healthcare providers’ emergency preparedness and organizational resiliency. Learn more about the vital role healthcare security teams play before, during, and after massive storms in this article from Elhadji Sarr, CPP, and Keith McGlen, CPP, CHPA.