TITLE

From Good to Great

AUTHOR(S)
Dean, Ray
PUB. DATE
July 2008
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p66
SOURCE TYPE
Trade Publication
DOC. TYPE
Editorial
ABSTRACT
The author reflects on the performance of several security directors in the U.S. He says that most security directors do good deeds and are able to perform their job well. He believes that a great security director is one whom other security directors ask for guidance. Moreover, he adds that these security directors always push the limits of system integrator and force them to be the best that they can be. INSET: Training Videos Now Available in SEC Store.
ACCESSION #
33303735

 

Related Articles

  • Show Me the Money. Martinicky, John // Security: Solutions for Enterprise Security Leaders;Nov2009, Vol. 46 Issue 11, p64 

    The article profiles John Martinicky, director of global security for Navistar Inc. It notes that Martinicky and his team actively work to eliminate threats because Navistar's brand and brand product risk is high. He has innovatively enforced security to business during his career and the value...

  • Behind-the-Scenes Security Techniques. Smith, Jack // Buildings;Apr2008, Vol. 102 Issue 4, p42 

    The article offers information about the Physical Security Information Management (PSIM) market. PSIM is undergoing powerful changes, largely driven by technology innovation, and includes software solutions that comprise the industry. These software solutions solve the problems that chief...

  • Security Profession's Premier Event Celebrates its Success and Looks to the Future.  // Government Security;Dec2006, Vol. 5 Issue 8, p22 

    The article discusses the ASIS International Seminar and Exhibits 2007, which will be held in Las Vegas, Nevada, on September 24-27, 2007. The events, which is the premier convention for security management professionals worldwide, will build upon the successful 2006 showing, which had...

  • Enterprise Risk Management as a Foundation. Brennan, Jerry; Mattice, Lynn // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p22 

    The article discusses the importance for business organization to utilize the principles of the enterprise risk management (ERM) as the foundation of their security programs. It explores the concept of the ERM and the significance of using its standards and methodologies as the foundation of a...

  • Making Access Complete, One Way or the Other. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p48 

    The article discusses tips for security professionals on how to implement effective integrated access control solutions in their business organization in the U.S. It provides insights from several security officers regarding their initiative of developing security solutions, integrated with...

  • Want Better IT Collaboration? Be Willing to Play (and other tips). Woerner, Ron // Security: Solutions for Enterprise Security Leaders;Mar2013, Vol. 50 Issue 3, p52 

    The article discusses the importance for security professionals to understand the relationship between security and information technology (IT) to better protect their organization. It provides tips for security officers on how to better understand the collaboration between security and IT and...

  • The State of The Security Officer: 2008. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Feb2008, Vol. 45 Issue 2, p10 

    The author reflects the roles of the security officer for 2008 in the U.S. He said that visibility of security officers is increasing and important. He adds that although technology endow guards to be more productive, the physical presence of guards are important to make certain of the safety of...

  • Turnstiles: Brawn, Brains or Both.  // Security: Solutions for Enterprise Security Leaders;Sep2007, Vol. 44 Issue 9, p67 

    The article focuses on the advantages of using turnstiles as part of security measures for firms. According to the article, using turnstiles to monitor pedestrian flow enables security personnel to devote their attention to suspicious behavior or packages that require closer inspection without...

  • Games to Play. Cunningham, Gary; Wallace, Mike // Security: Solutions for Enterprise Security Leaders;Aug2006, Vol. 43 Issue 8, p62 

    The article reports on training and education for security executives, supervisors and officers. The first step in the process is the mental evaluation, and preparing a summary of the security events experienced in the area. The next consideration is the evaluation of the things that can happen,...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics