Goodbye Handshake; Hello Contract

Zalud, Bill
April 2008
Security: Solutions for Enterprise Security Leaders;Apr2008, Vol. 45 Issue 4, p26
Trade Publication
The article reports that security officers and their system integrators will work closely as technology becomes more complex and involves communications and computer technology beyond traditional security gear. Tom Collins of Houston, Texas, Police Chief Willie Perez of West Palm Beach and Lehman Brothers Inc.'s Jesse Fecteau share their experiences on the importance of building close relationships with business partners.


Related Articles

  • Economics And Technology. Krapf, Eric // Business Communications Review;Apr2007, Vol. 37 Issue 4, p4 

    The author reflects on the relationship between computer security services and economics. He argues that the technical means of computer security can only be effective if they're used in service of ends crafted at the business level. He also believes that the most important part of a computer...

  • ICT SECURITY RISK MANAGEMENT. Bliznakovska, Biljana // Proceedings of the International Conference on Information Techn;2011, p139 

    Having in mind that the ICT security risk management process is a crucial and integral part of each company's business operational process, this paper summarizes the main steps and criteria how efficient ICT security risk management can be defined and implemented in each company. It is based on...

  • THE RISK ASSESSMENT AND TREATMENT APPROACH IN ORDER TO PROVIDE LAN SECURITY BASED ON ISMS STANDARD. Toosarvandani, Marzieh Sameni; Modiri, Nasser; Afzali, Mahdi // International Journal in Foundations of Computer Science & Techn;Nov2012, Vol. 2 Issue 6, p15 

    Local Area Networks(LAN) at present become an important instrument for organizing of process and information communication in an organization. They provides important purposes such as association of large amount of data, hardware and software resources and expanding of optimum communications....

  • Security for Next-Generation Voice and Video: Know Your Network. Boone, Adam // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p38 

    The article offers the author's insights on unified communications (UC) in information technology (IT) security. He says that the distribution of UC includes the replacement communication networks such as closed circuit video systems. He cites advantages of the UC such as the reduced costly...

  • An Empirical Assessment of Factors Impeding Effective Password Management. Kruger, Hennie; Steyn, Tjaart; Medlin, B. Dawn; Drevin, Lynette // Journal of Information Privacy & Security (Ivy League Publishing;2008, Vol. 4 Issue 4, p45 

    Since passwords are one of the main mechanisms used to protect data and information, it is important to ensure that passwords are managed correctly and that those factors which will have a significant impact on password management are identified and prioritized. Therefore, in order for an...

  • Security in a J.A.R. Gates, Robert D. // Security: Solutions for Enterprise Security Leaders;Mar2009, Vol. 46 Issue 3, p30 

    In this article the author discusses the importance of systems security in a just about right (JAR) manner. He focuses on the need to ensure the risk tolerance capability of the business, measuring all security proposals, purchases and processes against it. He also condemns the goal of striving...

  • INFORMATION SECURITY MANAGEMENT SYSTEM. Mirela, Gheorghe; Maria, Boldeanu Dana // Annals of the University of Oradea, Economic Science Series;2008, Vol. 17 Issue 4, p1358 

    Information Security Management System plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk Management and Risk Assessment are important components of Information Security Management System Risk management is the...

  • Security and Risk Management: The Never-Ending Game of Chess. Piccoli, Gabriele // Cutter Benchmark Review;Dec2005, Vol. 5 Issue 12, p3 

    The article discusses the report related to computer security management published within the issue.

  • Save the Date: iSecurity 2012 is March 8.  // Security: Solutions for Enterprise Security Leaders;Jan2012, Vol. 49 Issue 1, p13 

    The article offers information on the event highlighting iSecurity 2012 which tackles on security management on March 8, 2012 in the U.S.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics