Cloud services are the next generation of information technology that enterprises must master. In order to mitigate the risk associated with the cloud, businesses, providers and users must invest the time and resources to properly understand how to secure their assets.
“The tragic events of today cannot be remedied with words. Our hearts go out to the victims and their families. You may be certain that although no one can predict tragedy, we have invested heavily to prevent or mitigate its consequences.”
Two educational tracks at ISC West, April 5-8, 2011 in Las Vegas, will provide information on collaboration between public and private organizations and security for houses of worship.
We arose before dawn to meet our Security Detail for the ride back to the airport. Although there appeared to be more than just a few large commercial craft parked at the gates of the International terminal, including a large 747, our selected mode of travel this morning was a C-130 managed by what‘s affectionately known as “State Air”.
The number of Private Security Companies operating in Baghdad is surprising and gives way to an appreciation of the magnitude of the mission. Meeting with all of them would have proven infeasible, so we advanced the next best thing by meeting with the President of the PSCAI (Private Security Company Association of Iraq).
Of the more than 7,000 OSAC constituent representatives, a growing number are non-governmental organizations (NGOs), faith-based institutions, or members of academia.
The interaction is very cool. I love this set up.” “Searching for vendors products was very easy and quick.” “I could quickly move from booth to booth to look for new technology.”
Those are just some of the comments from past iSecurity virtual trade shows, a free online event designed to put the information you need, the people you want to network with and the solution providers you want to hear from at your fingertips.
Canaries can have a short but significant life in a coal mine. Significant because, in their traditional role, they were used to identify the dangerous and costly fumes known as methane and carbon monoxide which could cause the loss of the business of the mine, the brand of the mine owners, and the skilled human assets of their workers.
While the Security 500 report identifies the best programs, biggest investors and brightest leaders in 16 sectors, the fact remains that all of these organizations are inextricably entwined with smaller organizations across multiple supply chains.
In the October 2009 issue of Security, leadership columnist Lance Wright reminded us of several key leadership attributes that are universally sought by successful organizations in all sectors.