In North Carolina, High Point University is in its tenth year of a transition into a private, boutique university, and the security department is not exempt from the changes impacting the school. When Jeff Karpovich, CPP, CHPA, joined High Point University as its chief of Security, there were just 12 employees in the division and 62 surveillance cameras. Now, seven years later, he is responsible for 120 employees across three departments, managing 82 uniformed security officers for the school and working with approximately 900 surveillance cameras.
During the first nine months of FY 2015, the U.S. government brought 5,173 white collar crime prosecutions. If the year’s pace continues until the end of FY 2015 in September, the total will only be 6,897 – down by 36.8 percent from levels seen two decades ago, despite the rise in population and economic activity during this period, according to a report from Syracuse University’s Transactional Records Access Clearinghouse (TRAC).
Cybersecurity continues to climb the list of concerns for business leaders, along with executives’ concerns over medical cost inflation, legal liability, attracting and retaining talent, compliance and apprehension over economic uncertainty.
In the last decade, security has become a multi-platform, multi-channel concern for businesses. Gone are the days when the only threats to a bank could be warded off by an armed guard standing in front of a bank vault to intimidate and dissuade potential robbers.
The University of Phoenix® College of Security and Criminal Justice and ASIS International announced the launch of the Enterprise Security Competency Model.
Your resume is a marketing document. Too much information presented as a career biography may not achieve the results you are hoping for. A recruiter or hiring manager, who has never met you, will judge you by its content and appearance alone, and decide whether you deserve further consideration for the role in which you have expressed interest. A brief, clear, attractive resume will recommend you more highly to a recruiter than a long-winded, poorly designed one will – even if the content is the same. The time investment is significant, even if produced with the assistance of a professional writer.
With cyberattacks making headlines almost on a daily basis, the role of the chief risk officer (CRO) is important now more than ever before. In addition to analyzing, monitoring, predicting, mitigating and evaluating many types of risks and conditions, chief risk officers (CRO) are held responsible for ensuring compliance to rapidly evolving industry regulations and analyzing IT operations to prevent data leakage.
For educational institutions, it may seem like there are never enough resources to cover all of the risks, incidents or areas of a campus. However, by partnering with police and other first responders, school security leaders can gain additional expertise, local risk updates and even force multipliers.