Building security bridges

Building security bridges

Farhan Sahito is no stranger to security. Beginning as a police officer in 2002, Sahito worked his way through both government and private organizations, transitioning from physical to cybersecurity over the course of his decades-long career. In this Profile in Excellence, Sahito walks through the course of his career, providing insight and advice to future security leaders. Security: Describe your career from beginning to present-day Sahito: My cybersecurity career commenced in Pakistan, where I completed…

Read More

Why women should consider cybersecurity to help close the skills gap

Why women should consider cybersecurity to help close the skills gap

Children are often asked, “What do you want to be when you grow up?” For the majority of individuals, professions such as teacher, nurse, pilot or astronaut were popular responses. However, for generation alpha, these responses have shifted to viral YouTube sensations or TikTok content creators due to today’s popularity of social media apps. So what does this mean for low visibility jobs like cybersecurity? There are countless jobs that are necessary for the safety…

Read More

Top security conferences in 2024

Top security conferences in 2024

Security conferences provide both public and private sector security leaders with an opportunity to network with colleagues, learn about new business & security strategies to develop their own physical security & risk programs. Security magazine brings you a list of the top physical security conferences to attend across the world in 2024. ASIS Europe Vienna, Austria March 20 — 22, 2024 ASIS Europe brings together aspiring and established security leaders from across the continent and…

Read More

Security leadership philosophy and LinkedIn communication style

Security leadership philosophy and LinkedIn communication style

Reading a LinkedIn post by security professional Tyler Schmoker is like reading an e.e. cummings poem. The Poetry Foundation describes cummings’ work as “spare and precise, employing a few key words eccentrically placed on the page,” grammar and punctuation sprinkled idiosyncratically. Now take that, add some emojis, generous use of the “return” key, lots of ellipses and a breadcrumb-like progression down the page, and you approximate a Schmoker original. Then there’s the subject matter, which…

Read More

Should you write a security book?

Should you write a security book?

In this era of self-publishing, ebooks, gig ghostwriters and publishing on demand, it seems there are maybe 12 people in the security profession who haven’t written a book. Actually, the vast majority of us haven’t. Are we missing an opportunity? Authorship connotes power, authority, confidence, discipline, credibility and mastery — all elements of leadership. Is it time for you to publish a book? There are many factors to consider. You will not make much money,…

Read More

Thou shalt question accepted wisdom

Thou shalt question accepted wisdom

Thou shalt question accepted wisdom | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Giving up the ghost in security job searches

Giving up the ghost in security job searches

Giving up the ghost in security job searches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top

Building a cohesive security program starts at the top | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

How to strengthen cybersecurity teams in a high-stress era

How to strengthen cybersecurity teams in a high-stress era

How to strengthen cybersecurity teams in a high-stress era | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Leveraging leadership during a career transition

Leveraging leadership during a career transition

Leveraging leadership during a career transition | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2