Security Executives

The SecurityInfoWatch.com Security Executives category is a collection of news, analysis and information relevant to security executives and professionals.
(New York Police Department/TNS)
A photo from the New York Police Department shows a suspect in the shooting of UnitedHealthcare CEO Brian Thompson, which occurred Dec. 4, 2024. Part of the photo was blurred by police.
Industry News

Police hold potential suspect in the murder of UnitedHealthcare CEO

Dec. 9, 2024
Luigi Mangione has been arrested in connection to the Midtown Manhattan murder outside the Hilton Hotel following a five-day manhunt.
Credit: Olivier Le Moal
Significant blemishes in U.S. history, such as the 2014 cyber infiltration of Sony Pictures and the 2016 cyberattack on the Democratic National Convention information systems, serve as stark reminders about nation-state actors’ advanced capabilities to reach out and touch even U.S. companies and infrastructure beyond the IT closets and keyboards.
Cybersecurity

Strategies Emerging to Fill in the Physical Security Gaps with Zero Trust

Dec. 9, 2024
The U.S. cyber and security industry has made great strides after a long-standing lag by the federal government toward centralized Zero Trust efforts.
Credit: roberthyrons
Designing and implementing a robust physical security program is a significant undertaking, even for a single-site organization. However, when scaling these efforts globally, security professionals in multinational corporations face a unique set of obstacles that demand meticulous planning.
Security Executives

Challenges in Starting up a Physical Security Program for a Multi-National Corporation

Dec. 9, 2024
Global security programs face challenges as rapidly growing companies expand internationally, requiring security strategies to align with business needs and operational growth...
Credit:DKosig
The CRA is the first European regulation to uphold legislation horizontally across the entire market of products with digital elements (PDEs) – securing products, components, and subcomponents in the whole supply chain instead of simply the final usage stage.
Information Security

What Does CRA Compliance Look Like in the Smart Physical Security Industry?

Dec. 9, 2024
With the implementation period commenced, OEMs in the smart physical security industry must take immediate, proactive action to ensure compliance.
Everon
Security robots are here, and their presence will continue to grow as end users face guard staffing shortfalls and the requirement to expand the activities and performance of security operations to help protect the organization from known and emerging threats.
Robotics

The Impact of Robots on Security

Dec. 9, 2024
The integration of robot technology into security functions is here to stay.
Credit:Just_Super
AI is a broad topic and requires a longer than usual column to cover the important aspects of effectively utilizing emerging AI-enabled physical security devices and system capabilities.
Artificial Intelligence

Strategies in Preparing for Advanced AI

AI is advancing rapidly, creating both opportunities and challenges. How can Physical Security leverage AI effectively?Q: Our senior executives are highly interested in AI...
Credit: patpitchaya
An IT security audit is a comprehensive undertaking that demands planning, appropriate tools, and commitment.
Cybersecurity

The Critical Role of Security Audits in Building and Sustaining a Robust Security Strategy

Dec. 9, 2024
Security is about alleviating risks. Proper security audits help organizations spot weak points in their systems, processes and controls that hackers could potentially exploit...
Credit: andrewdouglasdawson
The FBI and NYPD say all active shooter incidents are over in eight minutes, and 85% are over in less than four minutes.
Security Executives

Guns at Work: Great Idea? Or Lethal Liability Exposure?

Dec. 9, 2024
This guy works for you: “Management is thick-witted about the dangers of an active shooter in my workplace. So, I brought a gun to work. It’s in my desk drawer. I ...
Former Microsoft CSO Mike Howard is a seasoned writer of industry leadership topics and spy novels. He is a regular contributor to STE.
Security Executives

It’s the Policy, Stupid

Dec. 9, 2024
We have just completed an intense and partisan election cycle. What else is new? Well, plenty. We are in unprecedented times when a former President, Donald Trump, ran again after...
John McCumber is a former cybersecurity executive and now is a retired consultant writing for STE.
Security Executives

When Are We Done?

Dec. 9, 2024
Many years ago, I was deeply involved in consulting with a client who had just experienced a major security breach. This high-profile organization with very sensitive data and...
Credit: BeeBright
Every company needs to follow defined planning cadences to set a rhythm for the business, such as the fiscal year, financial audits, board meetings, and other activities that may trigger related planning activities.
Security Executives

How to plan for strategic cyber risk management

Dec. 6, 2024
CISOs can optimize their cybersecurity programs and budgets by quantifying cyber risks in monetary terms and prioritizing risk mitigation based on impact and ROI.