If enterprise security continues to mature as a business function, in most enterprises, senior management will ask for a set of metrics to measure performance.
January 1, 2020
What is the point of spending time, resources and money on your security program if you can't tell whether it's working or not? It's just as important to establish the right metrics for a security program as it is to have such a program in the first place.
Security professionals must understand drones, conduct security, assess limitations and implement a drone response plan to mitigate its threats and attacks.
As I travel the U.S. and the world, I am frequently asked what the proper reporting structure is for the Chief Information Security Officer (CISO). While it sounds cliché, the real answer is “it depends.”
Throughout his career, Brian Tuskan has been driven by a love of technology, a hardworking reputation and a desire to help others. However, his eye has always been on the Microsoft CSO role. Now, he’s taking his place at the head of the pioneering global security organization.
Last month we asked the question, “What is security’s role in the enterprise?” It turns out the answer isn’t that simple. I’d like to follow that up with what seems to be an easy question.
How Hendricks Regional Health's Security Team Went from 99% Paper to 95% Paperless
January 25, 2019
When Steven Wagner joined Indiana-based Hendricks Regional Health, the department was run on 99-percent paper, with no electronic method of tracking security officers’ activity or sharing information across shifts except for a sporadically updated blog without a search function.
Measuring a return on investment (ROI) for security infrastructure is challenging. Most organizations primarily view security investments as a must-have capital expenditure. They know security systems are fundamentally necessary to protect people and assets and keep operations running smoothly. So while these technologies fulfill objectives and successfully help security teams prevent incidents, organizations oftentimes will ask: How can we truly quantify the value of a breach that never occurred?