The National Capital Security Partners' Forum (NCSPF) provides quality speakers and educational programming to a wider audience of security professionals and their collaborative partners in the intelligence and defense.
Don’t be afraid. This is all about habits. And it is a twin spin from an MIT lab and a self-help professor at Utah State University, a seemingly deadly combination, but which may hold the key to how to sell security to the boss and employees, how to balance values and principals professionally and personally as well as how to sell Febreze at Walmart, if you want.
Just today, a stranger came to my door claiming he was here to unclog a bathroom drain. I let him into my house without verifying his identity, and not only did he repair the drain, he also took off his shoes so he wouldn’t track mud on my floors. When he was done, I gave him a piece of paper that asked my bank to give him some money. He accepted it without a second glance.
If security continues to mature as a business function, senior management will likely ask for a set of metrics to measure performance. Security leaders should prepare meaningful metrics that inform management and improve security effectiveness.
Security leaders don’t have time. The best ones find time, or make time, for critical or strategic tasks that have a long-range payoff, but they often struggle to fit more into a workday that already stretches from dawn to dark.
In my last column I wrote about the “Human Factor” of access control and identification. I now recall several negative incidents that I experienced as a security director involving security staffs screening persons entering the lobbies of hospitals.
If you do, submit a nomination by May 1, 2012, and your pick might be profiled in Security Magazineââ¬â¢s Most Influential People in Security feature in August.
Like it or not, we’re all connected, all the time. From cellphones to smart phones, tablets, iPads, “i-everything” – we are all mobile to one extent or another. Whether bound to a desk or constantly on the road, it’s convenient to use mobile devices to do work, while at work.
Duty of Care is a shared responsibility, especially in today’s global economy. As employees cross borders and increasingly work in hostile environments, increased risk is brought to an organization’s most valuable assets: its employees.
In today’s business marketplace, with the need for virtual “anywhere, anytime” access to information, most companies are mindful of the inherent security issues – threats of attacks, individual devices connecting to the corporate network, data leakage and other forms of malicious mal-intent.