Reinventing Security

Berg, Chris
July 2009
Security: Solutions for Enterprise Security Leaders;Jul2009, Vol. 46 Issue 7, p30
Trade Publication
The article discusses the reinvention of the security function on companies in the U.S. It defines the reinvention of security as working through extreme organization alteration or functional flaws to generate a new function that meets the business' needs. It offers four common occurrences which call for reinvention of the function including a shift of focus in an existing function, merger or acquisition, and broken functions.


Related Articles

  • Corporate security: Forewarned is forearmed. Bosco, Pearl // Buildings;Mar1994, Vol. 88 Issue 3, p42 

    States that proactive companies make security of their corporate assets part of their business plans. Assurance of a reasonable level of security to avoid legal liability; Ranges of corporate assets; Recommendation of checking the contractor's financial background and strength to complete a...

  • Making Sensible Investments in Security. Gossels, Jonathan // Financial Executive;Dec2003, Vol. 19 Issue 9, p46 

    This article presents an examination on the importance of implementing a security program to protect pertinent business information which are stored in computer networks. The author discusses the principles needed in implementing a security program, noting that an organization needs to first...

  • Black Hat, DEF CON and the Evolving Battlefield in Cyberspace. Mylrea, Michael // Counter Terrorist;Oct/Nov2010, Vol. 3 Issue 5, p72 

    Information about the union of hackers, cyber security experts, and digital specialists in Las Vegas for a week of training, conference, parties, and hacking competition which were sponsored by Black Hat and DEF CON. It discusses cyber security systems and the evolving technology as well as the...

  • Sandra Jones and Co. Offers New Service.  // SDM: Security Distributing & Marketing;Sep2009, Vol. 39 Issue 9, p42 

    The article focuses on the addition of event management services at Chardon, Ohio-based Sandra Jones and Co. It cites that Sandra Jones has experience in producing Securing New Ground, user groups and the New Products Showcase of the Security Industry Association. According to the article,...

  • See Your Company Through the Eyes of a Hacker. Fick, Nathaniel C. // Harvard Business Review Digital Articles;3/24/2015, p2 

    The article discusses how most company security systems look from the perspective of hackers and how companies can defend themselves from hackers, such as taking inventory of and monitoring assets, understanding focused threat intelligence, and making security part of the mission of the company.

  • Kelly Services puts corporate & personal security on alert.  // Caribbean Business;11/4/2010, Vol. 38 Issue 43, p52 

    The article focuses on Kelly Services Inc., they conduct seminars on corporate and personal security (SCOPS) in Puerto Rico's several corporations. Previously, corporate security centered only on site protection and loss prevention, hence SCOPS changes the approach, focusing more on strategic...

  • Access in a Protected Space. Wicks, Sean // Security: Solutions for Enterprise Security Leaders;Dec2003, Vol. 40 Issue 11, p47 

    The article discusses the components needed to make up an effective security system to be used by corporations in the U.S. Utilizations of the system's parts; Features of the control panel used by the system; Advantages in the use of keypads for the control of user access to a protected space.

  • 4 Tips for a Corporate Security Plan. Morton, Jennie // Buildings;Oct2011, Vol. 105 Issue 10, p31 

    The article provides tips when working on a corporate security plan. It notes that a corporate security plan provides security guidance to each building which covers several processes ranging from pre-employment screening to security lighting. Mike Coleman of AlliedBarton stresses the importance...

  • Tracking Lost Corporate Cell Phones.  // Security: Solutions for Enterprise Security Leaders;Oct2007, Vol. 44 Issue 10, p66 

    The article offers information on how to track lost or stolen corporate cellular telephones. It is stated that technology exists to trace missing handsets. An example is presented which discourses how a corporate or an employee cellular telephone can be stolen or lost. This includes a membership...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics