The economic horizon was showing signs of new life and your business-improving Orders were up, but you have concerns that you have stretched the length of your supply chain
The economic horizon was showing signs of new life and your business-improving Orders were up, but you have concerns that you have stretched the length of your supply chain
Members of a House panel threatened to privatize more airport screening unless the Transportation Security Administration improves its treatment of travelers.
The Chief Information Security Officer (CISO) not only protects IT systems with special hardware, software and secure business processes, but he or she also creates, implements and communicates the organization’s digital information security policies and procedures.
Technology has become ingrained in enterprise security operations.
December 1, 2013
Like most other segments of the business world, technology has become ingrained in enterprise security operations. With that increased use of technology comes a new set of risks.
I used to write stories like this on a typewriter back in the day. My articles turned out to be a mass of White-Outs to counter typing mistakes. It all made me dizzy. Today’s computer technology even auto-corrects my words, which sometimes is not a good thing.
Establishing and maintaining a culture across the enterprise that is based on unwavering ethical practices from the boardroom to the lowest level employee is also a key element of effective governance programs.
One of the most important topics currently on boardroom agendas focuses on governance. Ensuring that the enterprise understands and complies with laws, regulations, policies and procedures is no longer simply enough.
What are the Top 10 Trends enterprise security executives concerned with now, and what should you plan for in 2014?
November 5, 2013
Security 500 members are enabling enterprise missions through proactive risk and resilience programs built on strong customer service cultures. Transforming security into a service organization requires flexible strategy and brilliant execution in an ever turbulent and global Risk-Nado.
Use Sector-Specific Benchmarking to Compare Your Enterprise’s Focuses to Those of Your Peers
November 5, 2013
What are security’s top critical issues? What department does security report to? How are budgets changing? What responsibilities do security leaders shoulder within their organization? Compare your enterprise’s focuses to those of your peers in the Security 500’s sector-specific analysis.
Compare Security 500 Company Rankings Sector-by-Sector in this Benchmarking Tool.
November 5, 2013
Where does your enterprise stand? Compare security rankings sector-by-sector in this benchmarking tool to determine who the frontrunners and thought-leaders are in your enterprise’s field.
“Leaders get recognized for their ability to mitigate problems and choose effective strategies. The same is true for security… The status quo or yesterday’s success is never good enough.”
November 5, 2013
“Security is about enabling a mission. Business leaders are able to take our tools and apply them to a variety of settings to create success. Our job is to create an environment of success for the enterprise. It is not what we do, rather, it is how we enable the enterprise to achieve its goals,” shares Frank Taylor, Vice President and Chief Security Officer for The General Electric Company. It is important to note that as you read this, one of America’s (not just security’s) greatest leaders and thinkers will have retired, again.