TITLE

At the Start of Private Security, Evolution is Evident

AUTHOR(S)
Zalud, Bill
PUB. DATE
July 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p70
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article explores how security at industrial and manufacturing facilities has evolved in the U.S. According to Terry Vannarsdale of Coca-Cola Enterprises Inc., the security mission in organizations is one of protection, deterrence and investigation of policy violations. In today's environment, Vannarsdale has observed that security mission goes beyond the physical security arena because there are also concerns focusing on information and data security. INSETS: Officer Tools on Industrial Tours;U.S Manufacturers Now Depand on Exports.
ACCESSION #
33303737

 

Related Articles

  • Defending the data. Cooper, John // CMA Management;Oct2004, Vol. 78 Issue 6, p49 

    Focuses on the initiative of the Canadian government in collaboration with an Edmonton-based technology firm and key project investors for secure management technologies related to data. Encouragement of research and development through private-public partnerships; Creation of the world's first...

  • VPN-1 Edge X industrial model.  // Database & Network Journal;Jun2006, Vol. 36 Issue 3, p22 

    The article reports on the launch of the VPN-1 Edge X industrial model, the first unified threat management appliance developed specifically to protect factory floors in Great Britain from cyber attack. The appliance features high levels of security through unified threat management appliances,...

  • Decision-Making by Effective Information Security Managers. Pettigrew, James; Ryan, Julie; Salous, Kyle; Mazzuchi, Thomas // Proceedings of the International Conference on Information Warfa;2010, p465 

    A pilot study was conducted in the last half of 2009 exploring how responsible managers make decisions with regards to information security in the enterprise. This pilot study is part of a larger research effort focused on exploring this topic. This is an interesting problem to study because...

  • Tools of the Master Planning Trade. Collins, Kurt W. // Security: Solutions for Enterprise Security Leaders;Dec2007, Vol. 44 Issue 12, p36 

    The article discusses why organizations need a master security plan and how to go about assembling and implementing the plan. Creating a security master plan calls for a lot of homework including the need to know the existing and future needs of the business enterprise. The baselining of current...

  • LAGE- UND ANALYSEZENTRUM BEI EINEM INTERNATIONALEN UNTERNEHMEN. János, Pataki; Péter, Sulányi // Hadmérnök;sze2011, Vol. 6 Issue 3, p161 

    The publication aims to show the possibility of technical protection of companies. The certain aspects of protection (operations center, the central control unit, the various sub-tasks and functions in the periphery) ensure that the company's security situation is still appropriate and in line...

  • The Shifting Sands of Secur(e/ity) Management. Brusil, Paul; Hale, John // Journal of Network & Systems Management;Sep2005, Vol. 13 Issue 3, p241 

    Focuses on issues related to security management. Opinion that the protection of both managed systems and management systems is crucial to the success and continuity of enterprises; Report that despite monumental growth in the security industry, enterprises still experience significant down...

  • Not investing in training. Snyder, Joel // Network World;8/28/2006, Vol. 23 Issue 33, p54 

    The article focuses on the problems faced by companies on training in security principles and policies in the U.S. Many security product vendors require training to use their product, by providing miserable, misleading documentation and delivering user interfaces designed by programmers utterly...

  • The challenge in selling security. Messmer, Ellen // Network World;7/31/2006, Vol. 23 Issue 29, p1 

    The article discusses the challenges faced by chief security officers (CSO) or chief information security officers (CISOs) in network security-related issues that affects the firm in the computer industry in the U.S. CSOs are facing challenges in getting their ideas on security matters accepted...

  • How Administrative Managers can use technology to protect their organisations. Stinchcombe, Neil // Manager: British Journal of Administrative Management;Apr/May2006, Issue 52, p18 

    The article offers information about how administrators can use the technology in keeping the safety of the identity of the administrators and the organizations. Most of the violations that occur in an organization are also caused by people from that organization because of acts being done in...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics