What are the Top 10 Trends enterprise security executives concerned with now, and what should you plan for in 2014?
November 5, 2013
Security 500 members are enabling enterprise missions through proactive risk and resilience programs built on strong customer service cultures. Transforming security into a service organization requires flexible strategy and brilliant execution in an ever turbulent and global Risk-Nado.
Ever since the days of Jesse James, banks have always been a target of those after fast cash, but now, cybercrime is becoming the new Wild West of quiet, quick theft. Find out what the enterprise can do to mitigate cyber risks to its financial assets.
In the wake of recent high-profile shootings and incidents, access control, video surveillance and armed guards have become the discussion of the day to deter future attacks. But what can enterprise security leaders do about threats that cannot be prevented? How can you plan for the golden minutes following an incident?
The speed at which political instability spreads is now inextricably linked to social media, as disaffected populations around the globe turn to this powerful outlet to drive demonstrations, according to a new Marsh Risk Management Research briefing, Social Media Heightens Political Risks in Emerging Markets.
Risk managers might be overlooking a critical threat: the impact of technology failures on supply chain general operations, according to a new report from Marsh risk Management Research, Cyber Risks Extend Beyond Data and Privacy Exposures.
Fortune 1,000 firms in the health care, technology and insurance sectors top the list of industry groups most concerned about cyber threats, according to a recent report by Willis North America, a unit of Willis Group Holdings.
The 1996 Atlanta Olympics, the 2008 Sri Lanka Marathon, and most recently, the 2013 Boston Marathon. What once might have been isolated incidents has now become a trend, as major sporting events become go-to targets for terrorist organizations.
Security guru Bruce Schneier coined the term “Security Theater” to describe phony security measures, procedures, or technologies that give the superficial appearance of providing security without actually countering malicious adversaries to any significant degree.