Every year, Security magazine honors top security executives and leaders who positively impact the security industry, their organization, their colleagues and peers, as well as the national and global security landscape. They have been nominated by their colleagues and associates, and were chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have had upon their shareholders, organizations, colleagues and the general public.
In North Carolina, High Point University is in its tenth year of a transition into a private, boutique university, and the security department is not exempt from the changes impacting the school. When Jeff Karpovich, CPP, CHPA, joined High Point University as its chief of Security, there were just 12 employees in the division and 62 surveillance cameras. Now, seven years later, he is responsible for 120 employees across three departments, managing 82 uniformed security officers for the school and working with approximately 900 surveillance cameras.
In the wake of massive data breaches such as those at the U.S. government’s Office of Personnel Management, health insurer Anthem and retailer Target, an enterprise’s initial reaction might be to tighten the security around networks and data. However, you may be forgetting one critical component: the insider threat.
It’s about time that our nation begins to focus more solidly on the security and safety of our schools. We’ve enjoyed a relatively safe existence in our schools for decades and decades. We have had some very high-profile tragedies in our schools recently, from weather to shooters to fires, but for the most part, our schools remain the safest place to be for our kids. But they are not forever going to be that way. It's time for our nation to address school safety in a more proactive way. We are noticing trends and events that are preventable in this day and age.”
For a long time now, people (employees, users) have been touted as ‘the weakest link’ because of the tendency to make mistakes or try to bypass cumbersome processes, with no malicious or criminal intent in mind,” says Anthony Lim, Senior Cybersecurity Advisor, Asia Pacific, for Frost & Sullivan and Vice-Chair for (ISC)2 Application Security Advisor Council.