TITLE

Four Strategies to Fill the Resource Gap

AUTHOR(S)
Brekke, Brad
PUB. DATE
March 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the four factors such as talent, technology, information, and partnerships that can help alleviate the resource gap in security program for security professionals. It states that digital video is an effective tool in fighting theft and fraud as well as helps manage crowds. It mentions the importance of information in making quick critical business decisions with stronger impact. It adds the significance of community engagement in keeping safe and secure environment.
ACCESSION #
50800586

 

Related Articles

  • Cyber Security Strategy. Bennett, Louise // ITNOW;Mar2012, Vol. 54 Issue 1, p10 

    Following the publication of the government's UK Cyber Security Strategy in November 2011, Louise Bennett FBCS CITP gives her thoughts on it and what it means for the industry and the nation.

  • Digital Security: An Opportunity. Dunkel, Dan // SDM: Security Distributing & Marketing;Sep2010, Vol. 40 Issue 9, p46 

    The article focuses on the evolution of security systems through technology adoption, new security policies to address new threats, and financial justification. According to the author, people must realize that cyber security protections play a major role in securing both the corporate brand and...

  • Business Is Slow to Invest in Big Data Tools. McCafferty, Dennis // Baseline;1/15/2014, p1 

    The article discusses the increasing need of information technology (IT) enabled analytical tools, used for transforming big data into information which can be easily processed. It mentions that business organizations are reluctant in investing in Big Data tools and presents the findings of a...

  • Deliberating Converging Technologies - An International Comparative Perspective on Public Engagement with Emerging Technologies. Scholl, Gerd; Petschow, Ulrich; Ferdinand, Jan-Peter // International Journal of Emerging Technologies & Society;2012, Vol. 10 Issue 1, p1 

    The preface begins by providing a background to this special edition. It then summarises each of the six featured articles. The papers display a wide range of participation cultures and institutional settings of engagement. They elaborate on the performance of deliberative dialogues,...

  • KNOWLEDGE POOLING AND SHARING UNITY IN DIVERSITY FOR DEFENCE AGAINST TERRORISM DISCIPLINE. TOPOR, Sorin // eLearning & Software for Education;2013, Issue 2, p368 

    Application of principle of unity in diversity in university education, the principle promoted in the European Union, strengthens the Romanian school education ideal of creating a higher education oriented on values, knowledge, creativity, competitiveness and skills of directly benefit, in...

  • Contemplating Cyber Risk. Burkett, Paul A. // Resources Magazine;Winter2010, p4 

    The article discusses the significance of implementing a comprehensive cyber risk management system for business enterprises that will enhance the company's software, application, data and information security. It relays that cyber risks management has developed into a process that requires the...

  • Delivering Security Value Greater than the Sum of its Parts. Liscouski, Robert; Collins, Mike // Security: Solutions for Enterprise Security Leaders;Oct2014, Vol. 51 Issue 10, p30 

    The article focuses on the use of the security countermeasures, such as surveillance, for the prevention of cyber threats and increase of business value. Topics include the strategies in achieving the security value, the importance of surveillance video in guarding against physical breaches or...

  • A Blended Solution for a New Threat. Dunkel, Dan // SDM: Security Distributing & Marketing;Mar2009, Vol. 39 Issue 3, p50 

    The article discusses the importance of integrated solutions in managing the global increase of crimes in physical and cyber attacks. The author states that innovative physical security integrators will hire cyber expertise to manage the computer room to broaden the account opportunity for both...

  • Assessment of Community Participation in Ecotourism and Conservation at Hhuhuwe-Umfolozi Park, South Africa. Adeleke, Bola Olusola; Nzama, Thandi // Journal of Environment & Earth Science;2013, Vol. 3 Issue 3, p27 

    Community involvement emerges as a key element of both sustainable tourism and ecotourism and is generally agreed to include public participation in decision-making and residents' receipt of benefits from tourism. HUP communities have suffered a great neglect economically in the past and it's...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics