This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
With the growing conversation around school safety, building security solutions within higher education requires detailed planning and routine assessments.
The survey gathers information about security budgets, numbers of security personnel, main concerns and responsibilities, and security missions and goals.
If you could choose three things that would enhance your security program, which three would you choose? In a new poll, the Security Executive Council (SEC) wanted to find out what elements would add the most value to security leaders and their teams.
Becoming a new CISO brings new exciting opportunities and responsibilities but also new challenges and pressure. In the past few years, the role of the CISO has become increasingly complex as it evolves from a predominately technical role to a more strategic, advisory capacity.
This series is focused on a step-by-step approach for security leaders to design, implement and measure a physical security program that supports organizational priorities and operates with buy-in from organization’s leadership team. Here, we'll explore the steps necessary for developing a risk mitigation strategy.
Join this collection of security practitioners and become part of the next generation of business continuity and crisis management program development. Read More
How are you measuring the effectiveness of your security program? Whether you’re a security leader conducting routine internal reviews or an external stakeholder conducting an assessment of a program, it is important to always keep in mind that the scope and functions of a program are largely dependent on the priorities and needs of the business it is supporting.