Leadership lessons at the movies

Leadership lessons at the movies

In 2011, Dave Logan, John King and Halee Fischer-Wright introduced “tribal leadership,” in which members of an organization cluster together based on shared beliefs and outlooks. So while the security, marketing and operations departments may have their unique cultures, employees will naturally gravitate toward like-minded people beyond their division. Each tribe — which may contain 20 to 150 people — occupies a specific stage, according to this theory. Stage 1 tribes believe “Life sucks, and…

Read More

A unified approach to risk management

A unified approach to risk management

The convergence of physical security and cybersecurity: In an era where technology permeates every aspect of our lives and our daily devices and tools are connected, the convergence of physical security and cybersecurity has emerged as a critical consideration across all industries and sectors. What is rapidly arising is the universal need for an integrated approach to physical and cybersecurity. The high stakes of cyber-physical integration Cybersecurity is often perceived as a safeguard for data…

Read More

Mitigating human risk: Empowering a workforce to combat cyber threats

Mitigating human risk: Empowering a workforce to combat cyber threats

In today’s digital landscape, organizations face an ever-evolving array of cyber threats, with phishing and social engineering remaining the most prevalent. As cybercriminals gain access to increasingly sophisticated tools, they continue to target employees, regarding them as the most vulnerable element of an organization’s defense. However, this perceived vulnerability can be transformed into an organization’s greatest asset in the fight against cyber threats. The human element: Both vulnerability and strength Traditionally, the human element has…

Read More

Leading by example

Leading by example

Building a robust security culture is central creating a successful security strategy within any organization. Here, I had the opportunity to discuss with two industry leaders — Kirsten Provence, Executive Director Security Programs & Governance at Kaiser Permanente, and Kristine Raad, Chief Security Officer at General Motors, their approaches to security and creating a positive culture from the top down. “It really doesn’t matter what industry you’re in, security is everyone’s responsibility. However, you can’t…

Read More

Workplace compliance considerations for California Senate Bill 553

Workplace compliance considerations for California Senate Bill 553

The California Senate Bill 553 (CA SB 553), which went into effect on July 1, 2024, is a milestone in labor law legislation. The bill introduces new safety obligations for most businesses in California, aimed at addressing growing concerns around workplace violence. Specifically, CA SB 553 mandates the implementation of comprehensive workplace violence prevention plans (WVPPs). These plans must include procedures for identifying and addressing potential security risks, maintaining extensive and auditable records of each…

Read More

The new normal: How to embrace a cultural approach to zero trust

The new normal: How to embrace a cultural approach to zero trust

Today’s bad actors are increasingly ruthless and hostile. With the threat landscape ever evolving, combating increasingly sophisticated attacks necessitates a shift in focus from tools to culture. As social engineering schemes and AI-driven threats ramp up, it becomes increasingly evident that a modern, successful cyber defense requires a comprehensive, holistic approach — one that accounts for technology principles alongside human awareness and behavior.   Cyber resilience can no longer be achieved by implementing new security…

Read More

Safeguarding healthcare facilities

Safeguarding healthcare facilities

In the world of healthcare security, the threats are ever-evolving with hospitals and healthcare facilities facing a unique set of challenges that demand innovative solutions and dedicated leadership. From safeguarding patient privacy to defending against physical threats, the importance of a robust security strategy in a healthcare environment is paramount. One of the major challenges faced by healthcare facilities is how to maintain a balance of security while remaining open to the public. Here, security leaders discuss…

Read More

CISOs aren’t scapegoats: Fostering a security-first culture

CISOs aren’t scapegoats: Fostering a security-first culture

Ten years ago, it was the norm for security breaches to be the sole responsibility of the chief information security officer (CISO). For this reason, the CISO role traditionally had a higher turnover rate, with many experiencing extreme burnout. But now, as data breaches make regular headlines and every organization becomes a lucrative target for cybercriminals, IT security has become a business priority, causing the full C-suite to take note.  Cybersecurity is now a business…

Read More

Key elements of a comprehensive K-12 security plan

Key elements of a comprehensive K-12 security plan

Key elements of a comprehensive K-12 security plan | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Presenting the security program: Win leadership buy-in

Presenting the security program: Win leadership buy-in

Presenting the security program: Win leadership buy-in | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3