This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
How to manage technology and risks that extend from the cyber perspective all the way to corporate leadership and climate change. The guest is Steve Durbin is the Chief Executive of the Information Security Forum (ISF). The guest is Steve Durbin is the Chief Executive of the Information Security Forum (ISF).
Information security is a top concern for business organizations, as research finds that cyber-attacks are launched 2,244 times a day—that’s every 39 seconds. The role of Chief Information Security Officer (CISO) is gaining popularity to protect against information security risks. The average cost of a data breach is $3.9
Now in its fourth year, the SIA WISF Power 100 program showcases 100 women who are role models, leaders, innovators and influencers in the global security industry. The Security Industry Association (SIA) has announced the 2025 honorees for the SIA Women in Security Forum (WISF) Power 100. SILVER SPRING, Md.
Crisis Management Team, Assemble! Even with the increased awareness of crisis management best practices today, a startling number of new clients don’t have an answer when we ask who’s on their crisis team. This is a major problem. So, who makes up this critical team, and what exactly do they do?
Crisis Management Explained: A Comprehensive Guide Crisis management is a crucial aspect of running a successful organization. What is Crisis Management? The Importance of Crisis Management Even the best-managed businesses can be hit by a crisis caused by external or internal events.
Ryan Schonfeld is the co-founder and CEO of HiveWatch, a security technology company reimagining how companies keep their people and assets safe. Security teams face chronic understaffing, with turnover rates ranging from 100% to 300% annually. A perfect storm of operational inefficiencies that puts both security and budgets at risk.
A new report (44 pages) from RAND Corp for FEMA: Streamlining Emergency Management. emergency management system has met a number of increasingly difficult challenges in recent years, such as extended wildfire seasons, more intense storms, and of course an ongoing global pandemic. “The U.S.
Security leaders know that every unsecured entry point invites risk. In a recent report by Security Scorecard, 29% of breaches stemmed from unauthorized third-party entry. This fact alone highlights a critical vulnerability in how facilities are secured and managed. Most often, they do not.
Learn what security and risk management domain is all about including the core principles and benefits of a solid framework along with answers to FAQs. The post Exploring Trends in the Security and Risk Management Domain appeared first on Bryghtpath.
Among the robust lineup of conference sessions are several offerings on leadership, performance management and workforce development. Join this interactive workshop to address labor shortages in the physical security sector. At ISC West 2025, youll discover expert insights on combating labor shortages, the future of work and more.
National Security Technician Day, held annually on Jan. 23, is dedicated to recognizing the valuable work security technicians do to secure our nation. The Foundation for Advancing Security Talent (FAST) has announced the third annual National Security Technician Day , an annual commemorative day held on Jan.
Dean will receive $5,000 scholarships to use toward education and professional development in the identity management field. The Security Industry Association (SIA) has named two recipients for the 2024 Denis R. Hébert Identity Management Scholarship Awards, Mariana Lima and Samuel Silvamolina,” said Hébert.
Modeled on legislation passed in New York in 2024, California AB 976 would offer small retailers a tax credit for security improvements. Retail theft is a serious challenge for both businesses and consumers, especially for small businesses in disadvantaged communities where security costs can be a major burden, said vila Faras.
Backup Software Vulnerabilities : Exploiting security weaknesses in backup tools 4. How often patch updates are implemented and security holes are scanned. But modern cybercriminals have demonstrated their ability to bypass even the most advanced security measures. How easy it is to identify your backup storage locations.
Enter the PagerDuty Champions a small, part-time team dedicated to keeping your incident management practices sharp and your teams productive. Why Governance Matters for PagerDuty PagerDuty is designed to streamline incident management, but without proper oversight, even the best tools can fall short of their potential. Their mission?
Employees are adopting generative AI toolswith or without company policies in placemaking it critical for organizations to implement secure, monitored AI usage now. Employees are adopting generative AI toolswith or without company policies in placemaking it critical for organizations to implement secure, monitored AI usage now.
Additionally, he was appointed as the Regional Administrator for Federal Emergency Management Agency (FEMA) Region 8 of the Department of Homeland Security/Federal Emergency Management Agency in the administration of President George W. billion NASDAQ-listed professional services corporation.
There is a question that is often asked in private but ever-present as the proverbial “elephant in the room” when it comes to the relationship between an organization’s information security (InfoSec) and crisis management functions: “Why is this always so difficult?”
This podcast focuses on the depth and breadth of managing an emergency management program for a major university that has multiple campuses. Her responsibilities include coordinating with various governmental and non-governmental agencies, providing guidance to campus groups, and leading a team of emergency management specialists.
The Benefits of Automating Contract Management Last Updated: January 14, 2025 Contract management is the glue that holds organizations together. Risk managers know better than anyone how new tools can create vulnerabilities for the company. What Is Contract Management Automation?
In healthcare, third-party risk extends beyond operational concernsit’s a matter of patient trust and data security. Manual vendor management creates critical vulnerabilities through fragmented documentation and inconsistent security assessments. For GRC professionals in healthcare, the stakes have never been higher.
In this podcast I interview the Alaska Emergency Management Director. Bryan began his career in emergency management in 1995 with the Alaska Division of Emergency Services. Bryan was appointed by Governor Mike Dunleavy to serve as Director of Homeland Security and Emergency Management in April of 2021.
in Cyber Security at Quinnipiac University located in Hamden, CT. Rougeau’s career spans over 16 years in disaster recovery, IT consulting/management, and cybersecurity consulting/ management. By Patrick Rougeau CBCP, CISSP, CISA, ITIL Patrick Rougeau is currently a student completing a M.S.
Data Security in a Demanding Regulatory Environment Data security regulation is accelerating many firms data protection processes, says Karl Schimmeck, Executive Vice President and CISO of Northern Trust. The message from the top is that at the end of the day, Schimmek says, were all risk managers. Its about reducing risk.
Applications in the Security Industry The incorporation of agentic AI into safety and security frameworks offers numerous benefits. Additionally, agentic AIs ability to autonomously interact with and adapt to the physical world will significantly enhance robotic applications within the safety and security sector.
In this podcast we focus on what that looks like for businesses; how that matches up government emergency management; and then we delve a little bit into emergency management in the military due to our guest’s professional experiences while serving in the US Army.
New Security Industry Association (SIA) member Inter-Con Security is a provider of high-quality, centralized services, using an embedded support model rather than a branch model to deliver scalable, customizable and comprehensive services to clients. Department of Justice, training security forces in Latin America.
Each state emergency management agency has many commonalities and also differences. In this podcast, Brad Richy the Director of the Idaho Office of Emergency Management is interviewed. He serves as the Homeland Security Advisor and principal Emergency Management Advisor to the Governor and The Adjutant General.
Assessing Ransomware Risk with the Pure Storage Security Assessment by Pure Storage Blog Summary The Pure Storage Security Assessment is a comprehensive evaluation tool that helps organizations identify and address vulnerabilities in their storage environment and offers actionable steps to help them reduce exposure to threats.
Security is no longer just about guards and gatesits digital, physical, and constantly evolving. What do you see as the biggest security challenges organizations face today? Security threats have grown more complex, requiring organizations to protect both physical and digital assets.
In this podcast to speak with Darin Letzring, with the Idaho Office of Emergency Management. Darin just completed a masters degree in emergency management. Dynamis , a leading provider of information management software and security solutions, is a sponsor of this podcast. He is their Southeast Area Field Officer.
Change Healthcare’s 2024 Data Breach: Key Risk Management Lessons Last Updated: October 17, 2024 In 2024, Change Healthcare faced a significant data breach that rippled across the healthcare industry, highlighting how risks are interconnected and can spread beyond their point of origin.
Seven years ago, I sat before a panel in downtown Seattle, Washington, interviewing for an assistant project manager role. Joe Searle serves as projects team manager, managed services at ZBeta. These broad interactions and the sometimes uncomfortable or confrontational discussions are excellent project management preparation.
In this podcast we look at one individual county and the security measures used from a physical and cybersecurity perspective, but then also preventing voter fraud from occurring. The integrity of our election system is essential for citizens to trust the outcome of local, state and national elections.
Tips for Securing Your Data by Pure Storage Blog Summary Cyber extortion is a type of cybercrime thats surging. Data breaches wreaked havoc on businesses from data management to healthcare in 2024. Publicized breaches erode confidence, particularly in industries like finance and healthcare, where data security is paramount.
Produced by cyber-physical security experts for SIA, this in-depth resource examines principles, challenges and mission-critical outcomes related to IT, operational technology and security. Authored by cyber-physical security experts John Deskurakis and Chris Lynch and developed with support from sponsors Allegion, M.C.
Top C-suite, cybersecurity and business leaders – including keynote speaker Nasdaq’s Phil Mackintosh– will headline the security industry’s executive conference taking place Oct. At SNG 2024, the security industry will gather for top-level information sharing, networking and business analysis. 8-9 in New York City.
Many an emergency manager aspires to become a local emergency management director for a city or county. One such individual who has only recently become a local director is Kyle Bustad, Manager for the Thurston County Emergency Management.In Hear first hand expert insights from Eric on his Podcast , Blog & EricHoldeman.com.
Crisis management and crisis communications have become a critical skill, and not just for emergency managers. He has more than 30 years experience as a crisis management expert, public relations consultant, journalist, and press secretary for members of Congress and political candidates.
Cybersecurity Leadership: The Complete Guide to Building and Leading an Effective Security Team by Pure Storage Blog Summary Strong leadership in cybersecurity has never been more critical. With a solid team and a culture of security, leaders can reduce risk and protect their organizations from cyber threats.
Emergency management as a profession is constantly evolving. Prior to joining ISU, Jonathan was the Deputy Director and Chief of Staff at the Alabama Emergency Management Agency, where he managed the state's emergency management response and recovery operations for floods, hurricanes, tornadoes, and the Covid-19 pandemic.
The Convergence of Business and Cyber - Risk Management Through a Bigger Lens Where cybersecurity and operations converge as they increasingly do -- financial services firms must view cyber risks as operational risks. Risks arent tech or operational theyre both. Cyber teams can accelerate the convergence.
The emergency management workforce of today continues to evolve, as does the necessary training and experience needed to be a fully qualified emergency manager. She is currently a Faculty Member for the FEMA National Emergency Management Advanced Academy (NEMAA).
Emergency management has traditionally been dealing with natural disasters and sometimes human caused disasters like hazardous materials. The conference mentioned in the podcast is: 2023 Idaho Office of Emergency Management's Annual Preparedness and Cybersecurity Conference in Boise, ID on October 24th-26th.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content