TITLE

It Starts with a Profile

PUB. DATE
June 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Jun2009, Vol. 46 Issue 6, p64
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the identification of risk profile in an organization. It highlights the need of chief security officers, security directors, and consultants to identify risk profile for executive protection in the business. It explores several factors to be considered in identify the risk which include the engagement of the executive work of an employer in controversial work, high media profile, and involvement in profile-raising community.
ACCESSION #
41522246

 

Related Articles

  • Bring managers together to avoid security threats. Hale, Greg // Plant Engineering;Oct2015, Vol. 69 Issue 8, p18 

    The article discusses aspects of implementing and promoting security in middle managers. Topics include the need to be aware in the performance objectives for chief information security officer (CISO), risk understanding for company and facility and essential of business performance and not...

  • Predictive Analysis Applied to Risk & Threat. Butchko, Benjamin M. // Security: Solutions for Enterprise Security Leaders;Sep2015, Vol. 52 Issue 9, p64 

    The article discusses the use of predictive risk analysis in strategic security planning in many organizations. It states that security leaders should have in-depth understanding of the risks facing their organizations from strategic planning to crisis management. It also discusses the benefits...

  • EXAMINING THE ROLE OF THE CHIEF INFORMATION SECURITY OFFICER (CISO) & SECURITY PLAN. Dawson, Maurice; Burrell, Darrell Norman; Rahim, Emad; Brewster, Stephen // Journal of Information Systems Technology & Planning;Dec2010, Vol. 3 Issue 6, p1 

    The Chief Information Security Officer (CISO) is an emerging role in many organizations as cyber security continues to be on the minds of many executives. As the number of vulnerabilities and attacks on large enterprise systems continue to rise there must be an identified key leader with full...

  • Making Information Actionable. Dunkel, Dan // SDM: Security Distributing & Marketing;Jul2011, Vol. 41 Issue 7, p66 

    The article reports on the approach to improve security management in business. It explains that additional capabilities to an existing physical security information management (PSIM) system can be provided through the integration of new information sets in order to improve overall security....

  • What Your CEO Thinks: As Recession Recedes, Security Execs Feel C-Suite Spotlight. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;May2010, Vol. 47 Issue 5, p20 

    The article focuses on the opinion of various executives regarding the importance of security measures in an organization. It highlights the challenges of corporate security officers (CSO) in managing security operations particularly during tough economic when budgets are down. It cites the...

  • Beyond Guards Guns and Dogs. Budman, Matthew; Cavanagh, Thomas E. // Conference Board Review;May/Jun2007, Vol. 45 Issue 3, p58 

    The article discusses the problems faced by corporate security officers in keeping up with the security issues in absence of proper cooperation and support from the top management. The finance related issues attract the attention of management most readily but issues like usual theft and...

  • Crisis Management at the Speed of Internet. Kotwica, Kathleen // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p34 

    The article discusses the important role of a crisis management team in managing threats posed by Web 2.0 applications. It highlights the report released by the Security Executive Council which explores the risks brought by Web 2.0 applications and outlines guidelines for security teams to help...

  • Planning for Change. Blades, Marleah // Security: Solutions for Enterprise Security Leaders;Sep2011, Vol. 48 Issue 9, p60 

    The article offers information on strategic planning of security professionals. It mentions that a security strategic plan must align with the organization's strategic plan to ensure alignment of plans during business changes. It says that Security Executive Council faculty member Mark Lex has...

  • 2013 Security 500 Methodology.  // Security: Solutions for Enterprise Security Leaders;Nov2013, Vol. 50 Issue 11, p48 

    The article focuses on the methodology of the 2013 Benchmarking Survey from Security 500, the leading executive conference in the security industry which tracks vertical markets and collects unique data from several sources. It states that the Security 500's purpose is to create a reliable...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics