TITLE

Games to Play

AUTHOR(S)
Cunningham, Gary; Wallace, Mike
PUB. DATE
August 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p62
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on training and education for security executives, supervisors and officers. The first step in the process is the mental evaluation, and preparing a summary of the security events experienced in the area. The next consideration is the evaluation of the things that can happen, and the rehearsal for the outcomes of the possibilities.
ACCESSION #
21973124

 

Related Articles

  • Recruiter: What It Takes. Snyder, Jeff // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p70 

    The article offers information on the required credentials for security professionals to attain higher level managerial positions in security offices in the U.S. Security professionals must have a bachelor degree as well as a master's degree. They should obtain industry certifications including...

  • Critical Decisions, Critical Actions. Badzmierowski, William F. // Security: Solutions for Enterprise Security Leaders;Jun2007, Vol. 44 Issue 6, p66 

    The article outlines several elements in building protocols which are necessary for security personnel who respond to emergency scenarios. They include staying calm and making a plan, attending any immediate safety concerns and designating a team leader. The role of a team leader will include...

  • Heightened Security Concerns Push Double-digit Salary Growth. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p66 

    The article reports on the salary growth of the executives in charge of security, for global companies. A compensation survey conducted by a compensation consulting and research firm shows that security executives are paid more than 293,000 dollars annually. The survey shows the recognition of...

  • New Executive, New Perspective. Meyer, Claire // Security: Solutions for Enterprise Security Leaders;Dec2016, Vol. 53 Issue 12, p26 

    The article offers suggestions on improving the role and responsibilities of a chief security officer (CSO) of an organization. Recommendations include reaching out with law enforcement officers for partnerships, familiarizing one's internal security team and developing a strategic security...

  • Money in a Glass Box. Kurrasch, Peter // Journal of Physical Security;2014, Vol. 7 Issue 1, p25 

    The article challenges existing ideas of security and presents unconventional ideas to provoke thought and discussion. The author proposes putting money in a glass box in the middle of a street and cite an imaginary article about it. He suggests that there are some factors involved in...

  • Mark Your Calendars.  // Security: Solutions for Enterprise Security Leaders;May2006, Vol. 43 Issue 5, p12 

    The article presents a calendar of events related to security systems. A seminar titled "Successful Security Consulting," will be held during May 6-7, 2006 in Carefree, Arizona. Another conference named IAPSC Annual Conference is scheduled to be held during May 7-10, 2006. These events are being...

  • CREATING A CORPORATE SHIELD. Stewart, Graeme // Business Mexico;Oct2005, Vol. 15 Issue 10, p18 

    The article focuses on the corporate security strategies used for the chief executives officers of Mexico. The strategies are proactive in a new, innovative way, which include plans designed by security advisers and special training, with courses in topics as security awareness and evasive...

  • TOP RANKS: SECURITY & ALARM COMPANIES.  // Business Journal (Central New York);2005 Book of Lists, p59 

    Presents a chart depicting the top security and alarm companies ranked according to the number of employees in Central New York. Sales in the region in 2003; Alarm types available; Services available.

  • MOVING FORWARD. SCOTT, CORY // Information Security;Oct2009, Vol. 11 Issue 9, p32 

    The article offers suggestions to avoid unnecessary accidents and improve application security. Application and security teams are said to be partners in identifying the damage, implementing a quick fix to prevent further losses, and performing an analysis to determine the reason for the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics