Though we deal with risk everyday, there is one risk that rarely makes it into our risk management plans – a change in organizational leadership. Whether the result of an internal structural shift, an external hiring decision or a merger/acquisition, a change in leadership and reporting can signal a challenging time for security.
Let’s start with the basics: the reason we take off our shoes at the airport is because the shoe bomber tried to get a bomb on a plane. The reason we can only carry on 3-ounce bottles? Someone tried to get a liquid bomb on a plane. Body scanners? Underwear bomber. But what if we took a look at suspicious behavior of the people attempting these acts of terrorism instead of relying primarily on machines to do our dirty work?
Get caught up on the latest stories from Security Magazine this weekend, such as why your healthcare records are the holy grail to hackers; why a flight attendant tried to bring a gun to an airport; and who causes the most data breaches in an organization.
A new report emphasizes that the need for determined and adept risk leaders to build risk management capabilities at every level of an organization has become an essential component to organizational success.
Bart Szafnicki follows the news every day. Mainly, it’s because his colleagues will be racing towards the action to break or report on a story. Szafnicki is Vice President Corporate Security for Turner Broadcasting System, Inc. (TBS, Inc.), which has brands and businesses all over the world, including CNN.
Imagine for a moment that you have a briefcase containing hundreds of thousands of dollars in cash belonging to your organization. How would you treat this briefcase? Would you leave it unattended in an unlocked area for significant periods of time? Maybe on the front seat of your vehicle while you went shopping, or perhaps on the table at the cafeteria while you go for a drink refill? Sounds absurd, right? Unfortunately, this is exactly what people continue to do every day with their organization’s critical data and information, whether it’s stored on mobile electronic devices or other portable media.
Gordon Graham breaks down how to regard levels of risk by levels of frequency, as well as how high-risk, low-frequency event disasters can be avoided and risks mitigated through training.
Big Data Is…. Big! It also poses big risks and big opportunities.
As you know, there has been a lot written lately about cloud computing, and due to the platform’s design, cloud computing security. Securing the cloud is the work of technical experts at places like Google, Amazon, NSA and the DOD. And that cloud is being secured more each minute through both better procurement policy and technology.
Problem identified and communicated, plan created, funds provided, problem resolved. This is the lifecycle senior business leaders often expect – and prefer – organizational challenges to have. It’s the way decisions are made and issues addressed for many functions of the business.