Publisher's Letter

McCourt, Mark
January 2006
Security: Solutions for Enterprise Security Leaders;Jan2006, Vol. 43 Issue 1, p8
Trade Publication
The article reflects on the importance of security programs for organizations. An increased challenged must be understood by employers in the provision of security to employees, physical assets and intellectual property. It stresses that human beings not only need to be secure, but also need to feel secure. Without articulating a sound security strategy, it will become impossible to attract top talents. It suggests that it is vital to communicate and deliver the benefits of security programs.


Related Articles

  • The Shifting Sands of Secur(e/ity) Management. Brusil, Paul; Hale, John // Journal of Network & Systems Management;Sep2005, Vol. 13 Issue 3, p241 

    Focuses on issues related to security management. Opinion that the protection of both managed systems and management systems is crucial to the success and continuity of enterprises; Report that despite monumental growth in the security industry, enterprises still experience significant down...

  • Insider Threat - Who is Facilitating? Brennan, Jerry; Mattice, Lynn // Security: Solutions for Enterprise Security Leaders;Sep2014, Vol. 51 Issue 9, p40 

    The article discusses the challenges in mitigating insider threat issues involving intellectual property in an organization in the U.S. It mentions the limited support from law enforcement or the court systems in conducting investigation, the growing social trend around entitlement and the...

  • Proactive Copyright: Workplace Compliance. Butler, Rebecca P.; Parker, Preston // TechTrends: Linking Research & Practice to Improve Learning;May2009, Vol. 53 Issue 3, p9 

    The article provides information on step-by-step organizational copyright compliance procedures. According to the author, private or public organizations, business enterprises and other industries must follow some guidelines to comply copyright policies especially administration support,...

  • Moving Security Beyond Regulatory Compliance.  // Computer Economics Report;Oct2007, Vol. 29 Issue 10, p12 

    The article discusses the importance of implementing an organizational comprehensive security program that complies with a set regulations. Accordingly, a single security framework could harmonize and serve an organization to sustain efficiency in both regulatory audits and security programs....

  • mc³ and the leadership gap.  // Multichannel Merchant (Penton Media, Inc.);Nov2006, Vol. 2 Issue 11, p57 

    The article discusses the management of multichannel and customer-centric organization. The author presented the most common examples of leadership failures which include fear of the unknown, shortage of talent, unclear vision, lack of channel understanding, poor metrics and accountability, lack...

  • OPEN WIDE. Deutschman, Alan // Fast Company;Mar2007, Issue 113, p40 

    The article discusses what the author calls the democratization of business in the digital era. The article suggests that this trend makes it easier for people to come together quickly and communicate effectively without formal organization. The author argues that new communication technologies...

  • Organizational Trustworthiness: An International Perspective. Caldwell, Cam; Clapham, Stephen E. // Journal of Business Ethics;Nov2003 Part 1, Vol. 47 Issue 4, p349 

    Although trust has been widely recognized as a vital component of relationships and a critical element to the success of organizations, the literature describing trust and trustworthiness is known for its varying perspectives and its inconsistencies. Trustworthiness has been identified as a...

  • Security a Priority at Showtime.  // Home Textiles Today;12/12/2005, Vol. 27 Issue 13, p6 

    The article reports on the move of the International Textile Manufacturers Association to institute a program of increased security measures designed to further protect exhibitors' intellectual property during the Showtime Winter 2005 in the U.S. Among the new steps are: attendee badges will be...

  • How to Protect Your Organization's Intellectual Property. Schmidt, Jeff // Security: Solutions for Enterprise Security Leaders;Mar2012, Vol. 49 Issue 3, p42 

    The article focuses on six measures to protect a company's intellectual property. It suggests to familiarize with the steps and explore ways on how to implement them in security operations. Recommended steps include ensuring appropriate classification of data, enforcing effective policies which...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics