FEB-MARCH 2022

AI Cover story, Healthcare security Focus
Mike Howard currently is President of Howard Consulting Services, LLC, a security consulting and mentoring firm based out of Las Vegas Nevada. Howard is the former Chief Security Officer (CSO) for Microsoft Corporation.
March 7, 2022
In my book, “The Art or Ronin Leadership,” one of the themes I talk about is how leaders need to be “selfless” in their approach to leadership in dealing with their teams. Selflessness...
Steve Lasky, editorial director
March 7, 2022
I recently had a conversation with the head of security for a major healthcare organization in the Southwest U.S. as our staff prepped for the magazine’s current issue. We had...
Tim Grelling is the Director of Innovation, Security at Core BTS.
March 7, 2022
As the recent breach of 50 million T-Mobile users’ data made clear, today’s organizations are more vulnerable than ever to data breaches. During the pandemic, cyberattacks with...
Ray Bernard
Although some companies, mostly large global and national businesses, have their act together when it comes to assessing the state of the company they are buying or merging with...
John McCumber
March 7, 2022
We’ve all seen the profiles on LinkedIn, on resumes, and on a speaker’s title slide. It looks something like this: John McCumber, [CERT], BS, MBA, [CERT], [CERT], [CERT], [CERT...

More content from FEB-MARCH 2022

Courtesy of Getty Images -- Credit: designer491
The endgame of this holistic approach to security is to provide a continuous level of protection.
March 7, 2022
An integrated and holistic strategy for physical security is more than a buzzword
Courtesy of Robotic Assistance Devices
“Autonomous Remote Services,” or ARS, is a new paradigm that’s available and ready for implementation by guarding companies and end-users today.
March 7, 2022
Organizations are considering the concept of Autonomous Remote Services for guard needs
Courtesy of Getty Images -- Credit: metamorworks
Data and analytics are driving access control and physical security technology advancement.
March 7, 2022
How to traverse the new crossroads of AI-driven technologies, security and IT convergence and systems integration
Courtesy of Getty Images -- Credit: gorodenkoff
March 7, 2022
Formulating a cyber-physical security plan begins by defining what assets need to be protected
Courtesy of Getty Images -- Credit: olm26250
The detail required to make informed decisions is not something we can quickly accomplish.
The process requires a thoughtful, detailed,and involved strategy, and is not something achieved using a checklist
Courtesy of Getty Images -- Credit: bobmadbob
An insider threat occurs when a trusted individual leverages their position within a company to gain proprietary information/intellectual property that they take, sell or misuse.
March 7, 2022
Preventing insider threats require an awareness of the risks and mitigating them appropriately
Courtesy of Getty Images -- Credit: AJ_Watt
Violence committed against healthcare workers is not just pervasive, it’s on the rise.
In times of crisis healthcare, security leaders must seek innovative solutions to address workplace violence
Courtesy of Getty Images -- Credit: NanoStockk
Healthcare workers today also face a host of new challenges given COVID, which has added to existing threats.
March 7, 2022
Facilities have to be more security-conscientious than ever before and need to know how to best invest in a security plan
Courtesy of Getty Images -- Credit: ipopba
If AI can be described as a science, Deep Learning and Neural Networks (NN) use mathematical concepts and rapid estimations to approach independent reasoning.
March 7, 2022
End-users struggle to understand where to apply AI technologies and how to integrate them with human interaction