Each year, Security magazine honors top security executives who positively affect the security industry, their organization, their colleagues and their peers. They change the security landscape for the better. They are nominated by their colleagues and associates, and they are chosen based upon their leadership qualities and the overall positive impact that their security projects, programs or departments have on their shareholders, organizations, colleagues and the general public.
Next month, ASIS International will hold its 57th Annual Seminar and Exhibits. The event, September 19-22 in Orlando, will include keynotes from Jeb Bush and Vicente Fox, in addition to education tracks about workplace violence, security leadership and more.
When it comes to security video, memory lane started with a videocassette. Today, tried and true storage comes in myriad shapes and sizes. Choice, however, comes with challenges. As an enterprise security leader, what do you need to store today, how can storage scale up when needed, what’s the total cost of ownership, how can storage handle video streaming from higher resolution cameras and the needs of retrieval for forensics and business uses? Then there is the question of security of the stored video, especially when it comes to hosted storage, regulations, requirements and privacy issues.
When Katy Perry takes the stage to sing to her screaming fans next month in Louisville, Alicia Dunlap knows that, thanks to her team’s planning, hard work and technology, the event will be a safe and secure experience.
This September will mark the 10th anniversary of 9/11 and some security pros fear that the worst could be yet to come. “Our view is that the goal of terrorists is to beat the devastation they caused on September 11, 2001, and one way to do that is to go after our children,” says Alan J. Robinson, director, Protection and Security Services/CSO, Atlantic Health, Morristown, NJ. “Topping the events of 9/11 is difficult to replicate; unfortunately, in order to exceed or even match the shock and awe of 9/11, terrorists must target a population so vulnerable it restores their reputation as a terrorist organization.”
Matt Marcon of MGM Communications in Glendale, Ariz., found that his customers needed a better intercom system. Marcon is a dealer who sells and installs communication systems for self-storage facilities, and he says the old-fashioned intercom systems – press a button and hope someone was there to respond – were hurting, not helping, his customers’ businesses.
There is no shortage of news stories dealing with cybercrime and data breaches. From Citigroup admitting that computer hackers breached the bank’s network and accessed the data of about 200,000 bank card holders in North America, to the huge data breach at Sony and its Playstation Network, it’s all over the news.
During the recent federal government budget debates, the “peace dividend” of the 1990s was mentioned a few times. Does the U.S. get a “war dividend” in the risk/reward decision of business location and expansion?
Last month we talked about the knowledge transfer gap that exists in the security profession. We posited that the best of the best of security practitioners don’t have the time to teach their successors how to become future-oriented, business-aligned organizational influencers, and that the business-focused training programs available for security professionals do a great job of talking business, but they fail to marry business processes with the job of risk mitigation.
This issue of Security magazine features the most influential people in security. An annual spotlight, the list boasts the best and brightest. But anyone can be influential, one way or another. Think twice before you speak, because your words and influence will plant the seed of either success or failure in the mind of another, said Napoleon Hill, the author of many success books. A Time magazine poll of the most influential people recently found Filipino boxer Manny Pacquiao on top. If you know him from the boxing ring, his influence spread wider last year when he won a seat in his country’s Congress — and won it by a landslide.
The world of physical security is full of people searching high and low for the next killer application. From manufacturers, to Wall Street, to end users, the excitement of finding a killer application to propel technology adoption and enhance physical security is considered a worthwhile endeavor. Killer applications have proven that the power of new applications can transform markets. The term “Killer App” originated with the release of Lotus 1-2-3 when it drove dramatic increases in sales of IBM PCs. For the physical security video industry, the killer application has been hard to find in recent years.
The biggest skill set gaps in the security industry are business acumen, strategic capabilities and an entrepreneurial mindset, according to Kathy Lavinder, owner of Security & Investigative Placement Consultants and a well-known recruiter in the security industry.