HOME | THE MAGAZINE | NEWS | BEYOND PRINT | MARKETPLACE | EVENTS | FORUM | CONTACT US
3. ConvergenceAlthough it seems logical to combine IT security and physical/operational security, agreeing on the goal doesn't always make it easier to get there. The two groups might not really understand each other's culture, functions, goals, or capabilities. Different organizations approach convergence from different angles and demonstrate that there are many different models that don't include one group swallowing the other one. @ For "Challenges of Coming Together," Associate Editor Ann Longmore-Etheridge spoke with three convergence visionaries who sit on the ASIS Board: Timothy L. Williams, CPP, director of global security for Caterpillar; Raymond T. O'Hara, CPP, senior vice president at Andrews International; and Dave N. Tyson, CPP, senior director of information security operations for eBay, Inc. 4. Campus WatchWhen Chicago's DePaul University had problems with vandalism, false alarm pulls, and even some incidents of arson, security decided to expand surveillance camera coverage to common areas, hallways, and dormitory entrances. The university wanted a standalone IP-camera system that was server-based and would use the university's intranet. It would have to accept the migration of existing analog cameras and handle future expansions, and its management and retrieval software had to be user-friendly. @ Find out how the university selected its new system in "Security's Way of Wisdom" by Associate Editor Ann Longmore-Etheridge. 5. Guarding ColoradoWildfires, blizzards, tornadoes, floods, the Democratic National Convention, and ecoterrorismMajor General Mason C. Whitney deals with them all as part of his job as the director of the Colorado Governor's Office of Homeland Security. As one of the architects of Colorado's homeland security program, he recommended a strategy focused on target capabilities and capabilities-based emergency planning. When the planning was complete, he was tapped by the governor to stay on as director. @ Assistant Editor Joe Straw spoke with Major General Whitney for April's "Homeland Security." Read the complete interview online. Other homeland security topics this month include private plane regulations and cybersecurity for utilities. 6. Securing Credit CardsWhen a major breach of a credit card database occurred a few months ago, the company was reportedly compliant with the credit card industry's Payment Card Industry Data Security Standard (PCI DSS), which is designed to prevent such problems. Questions were raised about whether the standard is set high enough to achieve a meaningful level of security. Some experts believe that PCI gives organizations excellent guidelines, but that its oversight process is flawed. @ Learn about the standard and its application in "Technofile" by Associate Editor John Wagley. 7. Read All About ItStreet cops love it. Crooks resisting capture hate it. Plaintiff's attorneys, Amnesty International, and the American Civil Liberties Union think it is evil, but attorneys who defend officers know jurors go easy on its use. The stun gun, or Taser, offers an alternative tool to police and security personnel, but sometimes it can be implicated when a suspect dies. Howard E. Williams takes a closer look at such deaths in the book Taser Electronic Control Devices and Sudden In-Custody Death: Separating Evidence From Conjecture. @ Dr. Steve Albrecht, CPP, PHR, a workplace violence expert and former policeman, reviews this book in the April edition of Security Management. Other reviewers examine books on travel safety, terrorism, and computer security. 8. Online Discussion Forum - Question of the MonthVisit the Forums on SM Online to share information and experiences with your peers. Here's a question recently posed by one visitor: I am trying to find any federal standards for video recording systems where the video may be used as evidence. Are there any federal standards as to content, format, and period of recordings to be retained? @ Register and participate in the Forums. It's free! Because you are a valued subscriber to Security Management magazine, we would like to welcome you to the Security Management Online Product Information Service. You can instantly request product and service information from our April 2009 issue. Select one or more categories of interest to view the advertisements and product announcements for the selected categories. Request more information about products and services using our reader service Web site. Also New Online:
Don't forget to go to www.securitymanagement.com on a daily basis to get the latest news from "Today's Headlines." Subscribe to the print edition to get even more valuable advice. This month features articles about:
Click here to subscribe. We welcome comments on content from the Web site or the print magazine, as well as suggestions regarding topics for future coverage. Send e-mail to: Sherry Harowitz Thank you for signing up to receive the SM Online E-News, an informal periodic alert to make you aware of breaking security news and upcoming monthly features that you can read by going to SM Online. (You will only receive this alert if you requested it. If you wish to leave the list, see the instructions at the end.) This mail is never sent unsolicited. You have subscribed to receive this information. To unsubscribe from this e-letter, please click here. |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, April 02, 2009
Security Management Web Highlights for April 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment