TITLE

None But The Brave

AUTHOR(S)
McCourt, Marc
PUB. DATE
November 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
An introduction to the journal is presented in which the editor discusses an article on the profiles of top security leaders including Robert Chicarello of Brigham and Women's Hospital, John Martinicky of Navistar and Paul Stone of Best Buy, another on the value of security to organizations, and one on the right attitude to achieve business goals.
ACCESSION #
44960033

 

Related Articles

  • FIPS 201 and the PIV Card for the Enterprise.  // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p58 

    The article reports on the document entitled "Federal Information Processing Standard Publication 201 (FIPS 201): Personal Identity Verification (PIV) of Federal Employees and Contractors," which provides an identity management framework for business companies in the U.S.

  • The 2" X 3 1/4" Billboard. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Aug2009, Vol. 46 Issue 8, p36 

    The article presents the author's view regarding the relevance of security metrics to businesses in the U.S. The author briefly narrates his experience with the effectiveness of security metrics and cites that there are several companies have already been using the said technology. The author...

  • Divided, we fall. Antonopoulos, Andreas // Network World;10/29/2007, Vol. 24 Issue 42, p26 

    The author comments on the effort towards computer security by businesses and industries. He assserts that the balance between company privacy and involvement of law enforcement need to address this concern. He cites several reasons why a company would choose to keep things quiet about the...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

  • Robot Obsessions: Love and Hate in the Gee Whiz Lane. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2010, Vol. 47 Issue 4, p82 

    The article offers the author's insights on robots and security technologies. The author says that the term robots came from the Czechoslovakian word robota which means servitude. He mentions that security technologies and approaches such as the security videos in unmanned aerial vehicles (UAVs)...

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • Managing Information Risk.  // CU360;3/3/2008, Vol. 34 Issue 5, p4 

    The article focuses on the need to measure the actual insider behavior for security purposes of the business in the U.S. The author stated that this will keep security aligned with the business and to lessen information risk and maximize reward. Trusted insiders worked no harm around security...

  • Security: Prepare for the possible, don't forget the probable. Kalafus, Gregory // Fairfield County Business Journal;8/22/2005, Vol. 44 Issue 34, Special section p6 

    The article focuses on how companies should prepare for security. At every level in the organization, the security philosophy must be supported, from the president to mail-room clerk. Implementation of effective policies and procedures must involve everyone. Re-education of employees about...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics