From April 10 to 13, 2018, a cross-section of the entire security industry will collect in Las Vegas for one of the biggest annual security tradeshows in the U.S. – ISC West.
Insurance has long existed as a mechanism for the transferal of risk to a third party, particularly for those risks that fall outside of an organization’s direct control. However, as the threats we face evolve so must the insurance products that we purchase. Recently, the most significant dangers that have come to light and threatened to destroy a company overnight have emerged within the cybersecurity sphere. This has fueled the growing interest and appetite for cyber liability insurance.
In an era defined by instantaneous social sharing, unprecedented transparency and 24/7 news coverage, Chief Security Officers (CSOs) find themselves with a new job: communications.
Today’s security teams have much less time to control the narrative. CSOs are expected to know key details immediately and prepare responses more rapidly. And responses often include talking points, which means coordinating with corporate communications, PR, marketing and others.
For organizations choosing to implement or expand an IP video surveillance system, the ability to efficiently manage video streams and storage is crucial to ensure the best use of the network and reduce costs associated with deploying and operating the system.
By now, we’ve all heard how the citizens of Hawaii were awoken on Saturday, January 13th with a (thankfully erroneous) alert telling residents to take shelter because of an incoming ballistic missile.
While the investigations and government hearings will continue, now that we’re a couple of weeks removed from the event, it’s important to take a step back and use this opportunity to crystallize several mass notification best practices.
It’s a scenario that isn’t hard for security professionals to imagine: Someone spots a drone hovering inside your secure facility’s perimeter, over your event, or during your emergency response operation. The drone’s presence is at best a nuisance, and at worst, might damage people or property, or interfere with your principle mission. What options do you have?
Here are some of the “front of mind” issues that senior security executives and the vendor ecosystem (consultants, integrators and technology providers) are wrestling with.
With estimates hovering around the $1 trillion mark for security products and services spending in the next five years, according to Cybersecurity Ventures’ Cybersecurity Market Report, it’s no wonder security executives are on the lookout for best practices for global integration. The best approach is for security systems integrators to invest in and embed with their global customers to provide consistency and serve as their single point of contact for all their systems integration needs.