Key performance indicators (KPI) are an integral part of business planning and strategy, as are key risk indicators (KRI) that guide enterprise risk management.
April 20, 2012
Build tangible measures of performance with metrics as the centerpiece
John McCumber is a security and risk professional, and author of “Assessing and Managing Security Risk in IT Systems: A Structured Methodology,” from Auerbach Publications. If you have a comment or question for him, e-mail Cool_as_McCumber@cygnusb2b.com.
April 18, 2012
Experience can turn you into a wise, old bird
Shootings on the nightly news are just the tip of the iceberg when it comes to workplace violence.
April 18, 2012
Shootings on the nightly news are just the tip of the iceberg
Ste0412cover 10702236
April 18, 2012
A public-private surveillance effort with retail giant Target Corp. has led to a dramatic reduction in the city’s violent crime
Are you still basing your guard services purchases solely on the lowest cost?
April 18, 2012
Are you still basing your guard services purchases solely on the lowest cost?

More content from April 2012

Reach Kevin Beaver through his website, www.principlelogic.com, follow him on Twitter at @kevinbeaver and connect to him on LinkedIn.
April 18, 2012
How the 2012 conference underscored the challenges we face today
Graphic Courtesy of Remote Tracking Systems, Inc.
A look at how GPS works.
April 18, 2012
Global positioning systems can add to your security arsenal
When mechanical keys are lost or unreturned, locks are often not rekeyed according to desired practice. RBAC can help organizations upgrade the caliber of their access management, and maintain its integrity going forward.
How to electronically manage physical access control
Ray Bernard, PSP, CHS-III, is a leading security consultant and author, who over 26 years has led many noteworthy security projects for international airports, nuclear disarmament facilities, sports stadiums, water districts, energy utilities, hotels, manufacturing plants and multiple-tower high-rise facilities (www.go-rbcs.com). Follow him @RayBernardRBCS
Network monitoring tools are an essential part of a successful security system
If you have any comments for Steve Lasky regarding this or any other security industry-related issue, please e-mail him at steve.lasky@cygnus.com.
April 18, 2012
The metaphors came quickly as my staff and I made our way across the show floor at the recent ISC West conference in Las Vegas. Either your head was in the clouds or you were ...