TITLE

2010: The Time for Proactive Security

AUTHOR(S)
Dubin, Cindy H.
PUB. DATE
March 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p88
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the proactive security management (PSM) plan that could be used by chief security officers (CSOs) to effectively design a plan to deal with worse-case settings relative to security threats. It mentions that CSOs were motivated to reconstitute the security policies of their companies like Caterpillar Inc. so that focused security policies could be attained. It discusses the efforts of companies for security management so that their employees and assets could be protected.
ACCESSION #
50800597

 

Related Articles

  • Managing Information Risk.  // CU360;3/3/2008, Vol. 34 Issue 5, p4 

    The article focuses on the need to measure the actual insider behavior for security purposes of the business in the U.S. The author stated that this will keep security aligned with the business and to lessen information risk and maximize reward. Trusted insiders worked no harm around security...

  • Minimize Risk, Maximize Your Protection. Clark, Shawn C. // Security: Solutions for Enterprise Security Leaders;Feb2013, Vol. 50 Issue 2, p28 

    The article focuses on how to minimize the risk in conducting corporate security investigations in business. It says that the employees must understand that the goal of minimizing risk is to investigate them and they should be informed on roles of corporate security. It adds that investigative...

  • Thrust and Counterthrust. Rappleye Jr., Willard C. // Conference Board Review;Jan/Feb2008, Vol. 45 Issue 1, p60 

    The article focuses on the range and variety of approaches implemented in the U.S. corporate sector to manage the threats of terror and technology. It mentions the concept of enterprise risk management and corporate continuity which proves to be effective in Deloitte & Touche LLP. It also...

  • Risk & policy management. Stephenson, Peter; Lipinski, Michael // SC Magazine: For IT Security Professionals (15476693);Jun2013, Vol. 24 Issue 6, p26 

    The article discusses the importance of risk and policy management tools for managing an enterprise's security properly. Risk management tools are presented to ensure to continuous performance of the enterprise risk management cycle from identification of risks to their treatment. Policy...

  • Mitigating Risk in Open Environments. Ludwig, Sarah E. // Security: Solutions for Enterprise Security Leaders;Nov2015, Vol. 52 Issue 11, p69 

    The article discusses the focus of Anthem Inc. staff vice president of corporate security Greg Wurm on providing protection and securing environment for the employees of the health care company. Topics discussed include the priority given by Wurm on enterprise risk, the alignment of the steps...

  • Firms must rethink travel safety policy. Hale, Louise // Travel Trade Gazette UK & Ireland;9/29/2006, Issue 2736, p26 

    The article focuses on the importance of ensuring the health and safety policies of companies in Great Britain. Such view was advocated by a travel management company executive to assure the safety of staff who will be traveling on business. It has been stressed that companies should update...

  • Ensuring the Secure Enterprise. Sokol, Marc // People & Strategy;Winter2016, Vol. 39 Issue 1, p6 

    An introduction to a series of commentaries given in the special section of the issue is presented on topics including the human factor in enterprise security, the impact of habit and response to a secure enterprise, and the role of human resource (HR) in building a risk management culture.

  • FIPS 201 and the PIV Card for the Enterprise.  // Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p58 

    The article reports on the document entitled "Federal Information Processing Standard Publication 201 (FIPS 201): Personal Identity Verification (PIV) of Federal Employees and Contractors," which provides an identity management framework for business companies in the U.S.

  • None But The Brave. McCourt, Marc // Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p12 

    An introduction to the journal is presented in which the editor discusses an article on the profiles of top security leaders including Robert Chicarello of Brigham and Women's Hospital, John Martinicky of Navistar and Paul Stone of Best Buy, another on the value of security to organizations, and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics