ASIS International’s Certified Protection Professional (CPP) certification is highly beneficial for security professionals seeking leadership roles. It has its flaws but, anecdotally, I have seen it mentioned in job ads more often than any other designation. When I passed the requisite exam in early February and promised to offer my thoughts, the reaction from future test-takers was welcoming. So here they are. To paraphrase the Law & Order TV franchise, “this is my story. DUN DUN.”
Some 200 individuals have been charged with federal offenses connected to the siege at the U.S. Capitol on January 6, 2021. Among them are at least 15 examples of family affiliated extremism. These instances include: five sets of husbands and wives; two cases of fathers and sons, mothers and sons, brothers, and cousins; and an instance of father/daughter and brother/sister participation. Although of a different strain and less serious offenses—none specifically terrorism nor involving murder —such kin-connected radicalism is neither a new phenomenon nor one unique to the United States or elsewhere.
International SOS recently released its Risk Outlook report, unveiling the top security risks for the international workforce in 2021. Here, we talk to Jeremy Prout, Director of Security at International SOS, to discuss how to protect the workforce against the top risks found within the report.
Jon Litt, Senior Manager, Government Solutions (US) at Christie shares his five key considerations to ensuring an impactful, efficient professional video collaboration solution.
Having a secure and efficient video collaboration system has evolved from a ‘useful to have’ technology to an indispensable capability in 2020, allowing teams to feel more connected to remote locations and distributed team members. With travel restrictions and social distancing limiting in-person meetings, remote face-to-face video communication is more imperative than ever in security environments. Systems integrators around the globe have been upgrading technologies to support the mission of operators. Before you work with an integrator to either upgrade an existing video collaboration system or invest in a new one, there are a host of considerations. Below are the key ones that will help you with your conversations with the systems integrator.
Security ratings or cybersecurity ratings are a data-driven, objective, and dynamic measurement of an organization's security posture and cybersecurity performance. To learn more about the benefits of security ratings, we speak to Christos Kalantzis, Chief Technology Officer at SecurityScorecard.
Fraudsters are taking advantage of the pandemic and increasing the threat landscape for governments and enterprises around the world in a wide-reaching fashion.
Fraudsters are taking advantage of the pandemic and increasing the threat landscape for governments and enterprises around the world. Where are the threats coming from and can security leaders expect to see an elevated threat landscape into the future?
My experience in the public safety sector has taught me that the only thing you can expect every day on the job is the unexpected. From civil unrest to natural disasters, unexpected events occur daily with little or no warning. When unforeseen or unpredictable emergencies occur, security departments are often called upon to help mitigate the situation. This can cause a sudden and massive surge in demand for additional manpower. So how can a security operation rapidly fulfill excessive labor requirements while synchronously managing the crisis at hand?
Emergency communications are changing. At the City of Stamford, Conn., Joe Gaudett, Director of Emergency Communications says that his biggest focuses right now are keeping his staff safe and secure; having enough resources; and using technology to continue to function and respond safely and efficiently to serve its citizens. Learn how Gaudett and the city of Stamford have responded to COVID-19 and implemented new technologies to help ensure operational efficiency and increase safety and security.
While many organizations understand the need for a security executive, organizations that have taken a holistic approach, have added the chief risk officer (CRO) position to evaluate all organizational risk. So, what is a chief risk officer, who makes a good candidate, where does the CRO stand organizationally within an enterprise, and what value does one add? Here are all your CRO questions answered.
Energy giant Baker Hughes built its Global Intelligence & Travel Security Operations Center from the ground up, proving its value and relevancy to the greater enterprise amidst a global pandemic.
Supporting a goal of empowering regional teams to make the most informed decisions is Baker Hughes’s Global Intelligence & Travel Security Operations Center (GITSOC). When Baker Hughes separated from GE’s oil and gas division in 2019, the event presented a unique opportunity for the Security team to create its own operating model and processes from the ground up to support the organization independently, providing the catalyst for the creation of the GITSOC. Learn about energy giant Baker Hughes’ GITSOC, as well as its value and relevancy to the greater enterprise.