Safeguarding healthcare facilities

Safeguarding healthcare facilities

In the world of healthcare security, the threats are ever-evolving with hospitals and healthcare facilities facing a unique set of challenges that demand innovative solutions and dedicated leadership. From safeguarding patient privacy to defending against physical threats, the importance of a robust security strategy in a healthcare environment is paramount. One of the major challenges faced by healthcare facilities is how to maintain a balance of security while remaining open to the public. Here, security leaders discuss…

Read More

CISOs aren’t scapegoats: Fostering a security-first culture

CISOs aren’t scapegoats: Fostering a security-first culture

Ten years ago, it was the norm for security breaches to be the sole responsibility of the chief information security officer (CISO). For this reason, the CISO role traditionally had a higher turnover rate, with many experiencing extreme burnout. But now, as data breaches make regular headlines and every organization becomes a lucrative target for cybercriminals, IT security has become a business priority, causing the full C-suite to take note.  Cybersecurity is now a business…

Read More

Key elements of a comprehensive K-12 security plan

Key elements of a comprehensive K-12 security plan

Key elements of a comprehensive K-12 security plan | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Presenting the security program: Win leadership buy-in

Presenting the security program: Win leadership buy-in

Presenting the security program: Win leadership buy-in | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Strategies for developing an effective security program: Build the right solution

Strategies for developing an effective security program: Build the right solution

Strategies for developing an effective security program: Build the right solution | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Tips for crafting a comprehensive risk assessment

Tips for crafting a comprehensive risk assessment

Tips for crafting a comprehensive risk assessment | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The essential pieces for measuring security program maturity

The essential pieces for measuring security program maturity

The essential pieces for measuring security program maturity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Stronger together: How security executives build solid teams

Stronger together: How security executives build solid teams

Stronger together: How security executives build solid teams | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

AMA: Campus Safety Leader Edition — Todd Jones

AMA: Campus Safety Leader Edition — Todd Jones

AMA: Campus Safety Leader Edition — Todd Jones | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2 3