The Physical Security industry is at an inflection point. Digital transformation and Security Convergence have accelerated, hastened by the persistent pandemic. Physical Security, HR and IT departments have been forced to work together quickly in designing back-to-work strategies, realizing that separate silos of operations just won’t cut it any longer.
Workplaces are going to need to adapt and adopt training and risk assessment protocols to keep employees healthy and safe. Below are five, foundational steps to take when developing a workforce risk management plan.
In order to get the future right, the reopening process must balance COVID-19's numerous implications—health, safety, rights, and freedoms. We don’t need to dismiss privacy to gain value from the health data involved. But before we discuss how to find that balance, we need to understand the role data plays in the decision-making process and why that is even more important now.
To help you and your organization plan and implement an improved cyber hygiene program, we now present a framework for full IoT device defensibility in real world deployments at scale. This framework represents current state-of-the-art best practices for protecting IoT devices, and can form the backbone of your assessment, evaluation, and improvement plans. Follow the steps below to strengthen your network defenses.
Cybercriminals love a crisis. As most of the workforce continues operating remotely, how can you stop cybercriminals from exploiting your business? Here are four secure ways to manage a distributed workforce.
Now more than ever, government policy makers need to focus resources; allowing law enforcement to focus on the core duties and responsibilities of law enforcement officers. And industries like ours, need to be creative in developing solutions to support them in this effort. The physical security industry supports law enforcement and when private security works in partnership with law enforcement, police officers have more time to focus on preventing and solving crimes.
Digital banking provides faster processing of financial transactions, more convenience, and a model that allows for the continuation of a financial industry even in the face of a pandemic. However, digital banking makes banks vulnerable to cyberattacks. Banks are now facing fresh security challenges that were brought on or affected by COVID-19. Here is what you need to know about them and how to protect yourself.
We spoke to John Scimone, Dell’s Chief Security Officer, who runs a converged organization, combining physical and cybersecurity, about how he has personally navigated a culture of convergence and digital transformation at Dell.
No matter how much the economic situation changes, prompt detection and response to cyber threats must remain a core priority for your organization. The ability to spot and address incidents in their early stages will help you avoid data breaches and their unpleasant consequences, including business downtime, lost revenue, costly security investigations and fines from regulatory bodies. As a result, you can save your budget for mission-critical tasks that will bring your organization value in the long run.
Why are CISOs constrained from delivering metrics at scale and why is producing good security metrics so difficult? Here, find out what the five stages of security metrics maturity are, and how you can achieve a mature security metrics program.