Ready or Not: The Game Is Coming to You

McCourt, Mark
May 2007
Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p10
Trade Publication
The author reflects on the trends in the security solutions for enterprise security leaders. He cites the convergence of information technology (IT) and security professionals to create a new generation of security strategy and execution. He also explores the annual surveys that involve integration and enhancement of security programs for business enterprises. The author also tackles the role of top domestic security officers who widen their scope and accountabilities in performing their duties.


Related Articles

  • Want Better IT Collaboration? Be Willing to Play (and other tips). Woerner, Ron // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p52 

    The article discusses the importance for security professionals to understand the relationship between security and information technology (IT) to better protect their organization. It provides tips for security officers on how to better understand the collaboration between security and IT and...

  • Study finds security risks are often ignored.  // Work-Life Newsbrief & Trend Report;Sep2008, p3 

    The article reports on a survey of security risks of U.S., European and Canadian companies. According to the survey, few companies have adopted privacy-enhancing devices like thin-client terminals, few limit the use of peripheral devices and even fewer monitor their compliance. However, it found...

  • Convergence: uniting physical security and IT.  // Caribbean Business;7/19/2007, Vol. 35 Issue 28, p40 

    The article discusses the integration of physical security systems and Information Technology (IT) networks in the business enterprises in Puerto Rico to increase security effectiveness. The physical security is summarized into three parts such as obstacles, security alarms and security response...

  • Enterprise security - Symantec prime candidate for overall enterprise security leadership.  // MarketWatch: Global Round-up;Sep2007, Vol. 6 Issue 9, p178 

    The article reports on the reports on the effort of global business enterprises to secure all their networks and information technology (IT) security system needs. According to the reports, the effort led the companies to spend $15.8 billion in 2007 which is expected to reach by $20.9 billion in...

  • Security requirement analysis of business processes. Herrmann, Peter; Herrmann, Gaby // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p305 

    Economic globalization leads to complex decentralized company structures calling for the extensive use of distributed IT-systems. The business processes of a company have to reflect these changes of infrastructure. In particular, due to new electronic applications and the inclusion of a higher...

  • Preparing for supply meltdown. Bradley, Anusha; Ellinor, Rebecca // Supply Management;5/25/2006, Vol. 11 Issue 11, p15 

    The article focuses on the failure to account security measures in the supply chain planning of business enterprises in Great Britain. A survey reveals that 49 percent of the businesses in the country are unprepared if disaster strikes. René de Sousa, senior procurement specialist at...

  • Insider Tips On Buying A SCADA System, Part 2. Kling, Frank // Pipeline & Gas Journal;Feb2006, Vol. 233 Issue 2, p30 

    The article provides tips when evaluating different types of Supervisory Control and Data Acquisition (SCADA) system. It is important for information executives to solicit sample specifications from several SCADA vendors. Making the samples as a reference, the executive can now choose the best...

  • Mobile communications: business enabler or corporate risk? Successful, risk-free exploitation of mobile technologies requires real cooperation between IT and the business to develop the right security policies. Wiltshire, Craig // IM@T.Online;Nov2007, p10 

    The article focuses on the need for the information technology sector and business enterprises to develop appropriate security policies. The need was attributed to risks of data theft and disruption caused by mobile technologies in corporate networks. One of the potential solutions cited is the...

  • Security Morphs into Risk Management.  // CIO Insight;2006 Research, p46 

    The article reports on the importance of risk management to the improvement of security in information technology (IT). The prediction in the 2006 Top Trends issue which focused on the integration of IT security with an enterprise risk-management such as compliance, legal, and risks has been...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics