Search This Blog

Friday, August 07, 2009

Security Management Monthly Web Preview for August 2009

If you experience problems viewing this email, try the web version.
Security Management

Monthly Web Preview

August 2009


HOME | THE MAGAZINE | NEWS | BEYOND PRINT | MARKETPLACE | EVENTS | FORUM | CONTACT US


Security Management cover

SUBSCRIBE
ADVERTISE
READER SERVICE CARD
MARKETPLACE
 

HEADLINE NEWS

U.K.: Government Trains Malls in Counterterrorism
Aug 07, 2009 - After numerous attempts to attack shopping malls in the United Kingdom, Britain's National Counter Terrorism Security Office (NaCTSO) trains shopping centers and other similar public venues on how to prepare for a terrorist attack, reports the Telegraph.

Stolen Contractor Laptop Compromises 131,000 Guardsmen's Identities
Aug 07, 2009 - A contractor for the National Guard whose laptop was stolen has compromised the personal data of 131,000 current and former guardsmen.

Obama's Counterterrorism Efforts Aggresive, Nuanced, Advisor Says
Aug 06, 2009 - John Brennan, assistant to the president for homeland security and counterterrorism, says the administration is aggressively pursuing terrorists with an emphasis on diplomacy and civil liberties that eluded its predecessor.

Animal Rights Extremists Step Up Attacks on Drug Maker in Europe
Aug 06, 2009 - European animal rights extremists have targeted the CEO of a Swiss pharmaceutical giant in a string of attacks to intimidate the company into cutting ties with a research laboratory that provides product testing on animals.

LAPD Chief Bratton Resigns for Plum Position in Private Sector
Aug 06, 2009 - Los Angeles Police Chief William Bratton resigned yesterday to lead a subsidiary of a security company that will provide training, consulting, and information services to police forces around the world.

 

HOT DOCUMENTS

"What Security Issues Are You Currently Facing?"
The survey conducted by the RSA Conference found that 57 percent of IT managers said the biggest security challenge they face is budgetary constraints as organizations go lean in a down economy.

FEMA Response to Formaldehyde in Trailers
The Department of Homeland Security's Office of the Inspector General dressed down the Federal Emergency Management Agency for its response to formaldehyde-contaminated trailers given by the agency to victims of hurricanes Katrina and Rita in 2005.

Department of Homeland Security: Progress in Implementing 9/11 Commission Recommendations
The Department of Homeland Security outlines how it has successfully met many of the 9-11 Commission's recommendations for protecting the country from terrorism and other hazards.

Organized Retail Crime: Assessing the Risk and Developing Effective Strategies
In a new CRISP report for the ASIS Foundation, authors Walter E. Palmer, CPP, CFI, CFE, and Chris Richardson, CPP, provide a general primer on the practice of organized retail crime (ORC) so retailers can understand why they may be more susceptible to it than other retailers and what they can do about it.

Homeland Security: Preliminary Results Show Federal Protective Service's Ability to Protect Federal Facilities Is Hampered By Weaknesses in Its Contract Security Guard Program
The Government Accountability Office reports that investigators sneaked bomb-making materials past security checkpoints at high-security federal buildings, constructed the explosive devices in bathrooms, and then walked around building hallways with the fake bomb hidden in a briefcase without being stopped by Federal Protective Service guards.

 

NEW ONLINE THIS MONTH

1. August Podcast
2. Rethinking Terrorism Strategy

FROM THE PRINT EDITION

3. School Security
4. Salary Survey
5. Private Flight Officers
6. Human Trafficking
7. Protecting Data
8. Read All About It
9. Question of the Month

1. August Podcast: Suspicious Activity Reporting, Salary Survey Results, Human Trafficking Report, Cyberextortion Advice, and Rulings on Drug Testing and National Security Letters

Join Laura Spadanuta as she talks with editors about the challenges police face in deciding who's acting suspiciously for homeland security purposes, results of the new security salary survey, a report on human trafficking in the U.K., recommendations regarding how to deal with cyber-extortion threats, and court rulings on drug testing and National Security Letters.

@ Listen in at Security Management's Podcasts page.

This is the eighth podcast since the series officially launched in January. We'd welcome some feedback, so please let us know what you find most useful and interesting or what you'd like podcasts to include in the future. E-mail your comments to the Editor-in-Chief Sherry Harowitz.


2. ONLINE EXCLUSIVE: Rethinking Terrorism Strategy

The whole point of a terror attack lies in the shock to its victims, who believed "it could never happen here." It's not important what people believe can or should happen; what's important is what potential adversaries are thinking, according to counterterrorism expert Colonel Thomas Bovet. Ignorance and arrogance are classic contributors to defeat. He says that chaos can be met successfully by analysis of extremists' past tactics and by getting into their mindset. The more inflexible the combined security policies and procedures are, the less effective they will be against determined and smart criminals.

@ Read more from this seasoned counterterrorism pro in "The Lost Principles of Security." Find the article only at www.securitymanagement.com.



FROM THE PRINT EDITION

3. COVER FEATURE: School Security

When considering how to protect faculty, staff, and students, school administrators must address a range of concerns from gang violence to loss prevention—and even public health issues. Using a combination of access control and other technologies is a good first step, but the human factor is at least as important. Faculty, staff, and students—even community members—must be educated about security issues, including everything from threat assessment to response.

@ Associate Editor Laura Spadanuta interviewed experts around the country to create a picture of today's best practices in "Schools Learn Security Lessons."


4. Salary Survey

What factors lead to higher salaries in the security industry? Results from the 2009 ASIS International U.S. Security Salary Survey highlight several: level of responsibility, company size, education, certifications, experience, and type of organization among them. The survey was completed by nearly 1,200 ASIS members and compared their compensation for two consecutive years.

@ Read about the details of the survey in "You Earned It" by Special Projects Editor Mike Moran, who conducts and analyzes the annual survey.


5. Private Flight Officers

Special general aviation rules apply at Ronald Reagan Washington National Airport, which is less than a mile from the Pentagon and within three miles of the White House. The Transportation Security Administration ensures the security of private flights at DCA (the airport's identifier code), through its DCA Access Standard Security Program. Those flights require advance notice to the TSA, and passengers are subject to a criminal background check. The flights also carry an armed security officer, who is a private security specialist.

@ In "Homeland Security," Assistant Editor Joseph Straw explains the requirements for the job and the role of these officers.


6. Human Trafficking

A recent study concluded that the United Kingdom is experiencing an increase in human trafficking with about 5,000 victims in that country alone, although the estimate for the European Union ranges between 100,000 and 800,000 each year. Figures are sketchy, because victims of human trafficking do not speak out for fear of retaliation and because of physical, cultural, or language barriers.

@ Associate Editor Stephanie Berrong reports on the problem and how authorities are responding in this month's "International." She also covers the Mexican government's approach to fighting drug cartels and shifting public opinion in the Arab world.


7. Securing Credit Cards

Repelling hackers does not necessarily require major investments in advanced encryption, appliances, and applications. The Verizon Business 2009 Data Breach Investigations Report found that nearly nine out of ten of 2008's data breaches could have been avoided if companies had followed basic security measures, such as lightweight security scans. Even in sophisticated hacks, the finesse typically wasn't applied until attackers had gained entry via uncomplicated pathways, including taking advantage of unpatched applications and default passwords.

@ In this month's "Technofile," Associate Editor John Wagley reports on simple ways to avoid data loss. Other topics in August include dealing with cyber extortion and fighting malware with antivirus programs.


8. Read All About It

The unfortunate reality is that houses of worship are no longer immune from violent crime, and day-to-day security issues can also overwhelm a layperson tasked with protecting a church. Author Ron Aguiar, who is director of safety and security at a church that draws 18,000 worshippers each week, has written a basic security manual for such people. Keeping Your Church Safe is short and simple. Though security professionals know this information already, it will be eye-opening for the leaders of many houses of worship who manage security on their own.

@ Consultant Jack F. Dowling, CPP, PSP, reviews this book in the August edition of Security Management. Other reviewers examine books on retail security, terrorism, hacking, and the Constitution.


9. Online Discussion Forum: Question of the Month

Visit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor:

Is there any methodology to assure the alignment of the physical security services with the enterprise objectives that shows metrics related to those objectives graphically? How is the Physical Security Information Management developing in relation with this alignment information?

Leave an answer/comment about this post.

@ Register and participate in the Forums. It's free!


Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our June 2009 issue.

Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site.

Product Info


Also New Online:


Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines."


Subscribe to the print edition for additional, valuable information about important issues. This month, for example, includes the following:

  • Advances in explosives detection
  • A preview of the ASIS Seminar and Exhibits
  • Assessing germs aboard planes
  • Decreasing shrink in a warehouse

Subscribe here.


We welcome comments on content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to:

Sherry Harowitz
Editor
Security Management
sharowitz@asisonline.org


Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.)

This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here.


 

 

 

 

 

 

 

 

 

3 comments:

Anonymous said...

Can anyone recommend the well-priced Remote Management tool for a small IT service company like mine? Does anyone use Kaseya.com or GFI.com? How do they compare to these guys I found recently: N-able N-central network security
? What is your best take in cost vs performance among those three? I need a good advice please... Thanks in advance!

Anonymous said...

Hello everyone, it's my first pay a visit at this web page, and post is really fruitful in favor of me, keep up posting such content.

Also visit my blog ... roofing Okc

Anonymous said...

Hello еverуone, it's my first pay a visit at this web page, and post is really fruitful in favor of me, keep up posting such content.

Review my web-site ... roofing Okc
Also see my webpage: roofing company oklahoma city