Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 45, No. 12, December

47th Annual Seminar and Exhibit. (Security Online)
This year's ASIS conference, held in San Antonio, Texas, was regarded by most who visited the Seminar and Exhibits as a successful and worthy event to attend. The conference atmosphere was properly subdued due to the recent September 11th terrorist...
A Message from Asis International
No existing security measure or policy could have protected the thousands of innocent victims of the September 11, 2001 terrorist attacks in New York City and Washington, D.C. These acts, virtually unthinkable until recently, are being thought about...
A Profusion of Products. (Exhibits)
WELCOME TO THE opening of yet another major and meaningful exhibit at this, the ASIS 47th Annual Seminar and Exhibits," ASIS President Bonnie S. Michelman, CPP, told the enormous crowd waiting to view the 1,944 booths within the cavernous exhibition...
Are Feds Doing Enough for Bioterror Defense? (News and Trends)
If government role-playing exercises such as the recent "Dark Winter" simulation of a U.S. smallpox outbreak are any indication, Americans are desperately unprepared for a biological attack. While many experts have painted a grim picture, testimony...
ASIS Announces Board Ejection Results. (Asis News)
Six candidates have been elected or reelected to the 2002 ASIS Board of Directors. Linda Florence, CPP; Edward Hallen, CPP; Daniel H. Kropp, CPP; Steven C. Millwee, CPP; Shirley Pierini, CPP; and Jeffrey M. Spivey, CPP, were sworn into office at the...
ASIS Hosts Second Annual Bank Conference. (Special Meetings)
THE BANK ADMINISTRATION INSTITUTE (BAI) joined ASIS in San Antonio again this year to present a two-day Bank Security and Security Fraud Workshop, which opened with a Saturday evening informal reception. While sampling Mexican-inspired hors d'oeuvres,...
Board Members Tapped at Monday Lunch: The ASIS 47th Annual Seminar and Exhibits
IN A CEREMONY honoring the ongoing efforts of all ASIS volunteers, Steven C. Millwee, CPP, was announced as the ASIS 2002 President at Monday's luncheon. Joining Millwee in taking oaths of office were Daniel H. Kropp, CPP, vice president; Shirley Pierini,...
Bomb Countermeasures for Security Professionals, Version 2.0. (Reviews)
Bomb Countermeasures for Security Professionals, version 2.0. By Craig S. Gundry; produced by Palladium Media Group; available from ASIS, Item #1417,703/519-6200 (phone), 703/519-6299 (fax); CD-ROM; $199 (ASIS members), $249 (non-members). After...
Cargo Carries Load of Woes. (Exhibits)
A SHIPPING COMPANY was hauling a load of cotton in 1988. The load was left in a parking lot overnight, during which an unseasonable storm flooded the lot, ruining the cotton. The owner of the cotton sued the shipping company. The court ruled that the...
Cargo Group Rolls out Contraband Plan. (News and Trends)
Among the many terrorism concerns for businesses and the country at large is the safety of cargo. As with any asset, protecting against more routine risks, such as theft, can also help to close vulnerabilities that a terrorist might exploit. A new...
CPPs Hail Tradition and Transition. (CPP Programs)
THE CERTIFIED Protection Professional program received and bestowed numerous accolades in San Antonio. Holders of the CPP designation embraced the new "Board-Certified in Security Management" campaign unveiled by the Professional Certification Board...
Cybercrime. (Australia-International)
Cybercrime. In a recent report issued by the Australian Senate's Legal and Constitutional Legislation Committee, senators questioned the recently introduced cybercrime bill. The report, drafted to address the concerns of industry and consumer groups,...
Do Fence Me In: Whether It's Terrorism or an Assault in the Parking Lot, the Response Should Be Measured and Targeted to the Risk. (Perimeter Security)
"HELLO, I'M CALLING TO GET A quote for my boss regarding some fencing, a few security guards, and some lighting. We just want to tighten things up around here a bit: You know, with all the accounts of crime in the area, the upstairs office is a little...
Forced Browsing and Other Threats. (Tech Talk)
It's been said time and time again that the most common way for viruses to be unleashed on a network is for users to open an unsolicited attachment to an e-mail message, thus executing whatever malicious code is contained inside. But according to new...
Groups Make Strategic Moves. (Special Meetings)
WHILE IN San Antonio, numerous groups of ASIS leaders met to reaffirm their commitment to the overall ASIS Strategic Plan and to set new goals based on the realities of the current day. The ASIS Board of Directors, the Professional Certification Board,...
High Wireless Act: The Risks of Mobile Communication. (Telecommunications)
THE CONVENIENCE of wireless communications has led many companies to deploy wireless solutions for a variety of devices, from digital cellular telephones to corporate enterprise networks. Unfortunately, in the rush to use these wireless communications,...
How to Avoid an Identity Crisis: Businesses Can Win the Esteem of Their Employees and Improve the Bottom Line by Helping Staff Prevent or Deal with Identity Theft. (Identity Theft)
Michelle Brown would probably be called a good role model. Lacking the money to study beyond high school, at age 15 she took after-school jobs to finance a college education. After graduation, she got a job in international banking, proving a steady,...
Insights Shared on Terrorism Threat. (Terrorism Forum)
NO ONE EXPECTED the seminar and exhibits would be business as usual just weeks after the September 11th terrorist attacks, and many speakers already on the program tailored their remarks to address events making headlines. To help meet the immediate...
Investigations. (Judicial Decisions)
Investigations. Maine's highest court has ruled that records pertaining to an internal investigation are part of an employee's personnel file and must be disclosed to that individual upon request. Nancy Harding was terminated from her employment...
IT Risk Is Also Legal Liability. (Tech Talk)
A corporate officer's responsibilities include protecting corporate assets, A recent paper focuses attention on the virtual side of company assets. The report, "Out of the NOC and Into the Boardroom: Director and Officer Responsibility for Information...
Judicial Decisions. (Legal Reporter)
Workplace violence. In a recent appellate decision, a court ruled that a college workplace violence policy that prohibits "violent overtones" is unconstitutional. In the case, the college had determined that a professor's written disapproval of school...
Letters
Need for Standards My comments relate to the statements standards made by Norman D. Bates in his "Viewpoint" entitled "Who Should Chart Security's Course?" (February). British Standard 7799 and ISO Standard 17799, both of which pertain to information...
Mail Rooms on Guard. (News and Trends)
After letters laced with anthrax were discovered in Sen. Tom Daschle's offices, NBC headquarters, and elsewhere, corporate and government mail rooms across the United States went on high alert for biological agents. But organizations have to cut through...
Natural Gas Well Protected. (Working Wise)
Tourists to Wyoming may be enamored of the endless space, pristine national parks, and low population density. But for the operators of Wyoming's natural gas fields, the wide-open spaces mean more than big sky; they make it difficult to effectively...
Network Security Remains Weak. (Tech Talk)
In the aftermath of the terrorist attacks on the United States, Congress took a close look at federal cybersecurity and found it wanting. The title of the report presented by Joel Willemssen, managing director, information technology issues at the...
Only Guardsmark[R] Offers Health Insurance to 100% of Its Security Officers
As one of the largest private security services firms in the world, we employ over 17,000 security officers in more than 135 offices serving 400 cities across North America, with revenues of $400,000,000. We protect shareholder assets and company employees...
Parasites on the Web: A Potential Hack Attack Technique Called Parasitic Computing May Be Coming to a PC near You. (Tech Talk)
If you want to join the fight against cancer, discover how DNA works, or help astronomers search the skies for signs of alien life, you can--without lifting a finger. Distributed computing networks turn home users' computers into part of a virtual...
San Antonio Rose to the Occasion. (Special Events)
AN IMPORTANT PART OP EVERY ASIS Annual Seminar and Exhibits is the opportunity for attendees to once again meet with likeminded colleagues who share the unique pressures and opportunities that face security professionals every day. Although the recent...
Sessions Enlighten the Masses. (Sessions)
FOR ATTENDEES AT THE ASIS 47TH Annual Seminar and Exhibits, the educational sessions offered an unparalleled opportunity to learn from experts, peers, and product developers. Attendees could tailor their selections to both their experience level and...
Will the New Threat Result in Real Change?: Real Security Is Achievable, but It Is Expensive and Inconvenient. It Is Not Yet Clear Whether Society Is Willing to Pay the Price. (Viewpoint)
Security professionals who have been in the industry a long time, as I have, view the September terrorist attack on the World Trade Center against the backdrop of the past. We know that after 1993, when the trade center was bombed, much was said about...
Working toward a Secure Tomorrow. (Getting Started)
AFTER THE SHOCKING EVENTS of September 11, 2001, people around the world gathered in government offices, military corridors, corporate boardrooms, and family living rooms to discuss security. But during the first week of October, nearly 14,000 security...