Phil Hopkins, Vice President Global Security for Western Union, has a successful background in the public and private sectors. To what does he attribute his success, and what are the qualities that make him successful, including his relationship with his CEO?
Utilizing the principles, standards and methodologies of ERM and/or ISO 31000 as the foundation of security programs is vital in order to transform your security program to holistically address the full scope of the risk, threat and hazard landscape that your organization faces today and into the future. Going forward, we will provide some insight into the concepts of ERM and why it is so important to utilize ERM as the foundation of your security program.
When Security magazine approached us to write a monthly column, we took some time to ponder how to best serve the current and emerging security leaders which are this column’s target audience. We are delighted to have this opportunity to explore a broad range of topics in today’s complex environment of risk, threats and hazards.
From point A to point B and in between: securing the supply chain is becoming an increasingly high-profile issue among enterprises, and it is growing in complexity. How do we protect our nation’s borders against terrorism and drug threats while still facilitating trade and the free flow of goods?
At the New Year we find ourselves reflecting on who we are as an industry, what we’re doing and where we hope to be. Our ongoing research of security-related issues has shed light on some remarkable changes in the security industry in the last ten years, many of which are driven by technology advances and shifts in the business environment.
As business changes, so does – or so should – security. The direction of business can have significant consequences for security, both internally – in terms of influence, funding and organizational structure – and externally – in new threats, new risk, new mitigation requirements.
Are you watching business trends and thinking about how they should impact security and your strategies to mitigate risk?
Businesses are putting their corporate security at risk, with one in three organizations (33 percent) allowing their staff unrestricted access to corporate resources from their personal smartphones, according to a survey.