Security Management

Security Management is a magazine covering loss prevention and security. Since it was founded in 1957, it is published monthly. The magazine is published by ASIS International.Subjects for Security Management include building management and maintenance. The editor-in-chief is Sherry Harowitz.

Articles from Vol. 49, No. 4, April

ASIS Chapters and Leaders Honored
At January's Volunteer Leadership Conference in Arlington, Virginia, the I. B. Hale Chapter of the Year and other ASIS International yearly awards of achievement and merit were presented by Chairman of the ASIS Board of Directors Shirley Pierini, CPP....
ASIS International
ASIS INTERNATIONAL regularly provides the status of guideline projects so that members and others can access completed guidelines, review draft guidelines and provide comments, or learn the status of guidelines. Listed below are the guideline projects...
CCTV Lowers the Stakes
Patrolling the grounds of a newly constructed golf course at Turning Stone Casino and Resorts in Upstate New York, a security guard noticed an unlocked door on one of the secured buildings. Unable to quickly determine the cause for the unlocked door...
Core Way, PSP
After a decade in the security industry, Corey Way, PSP, knows the value of his Physical Security Professional certification. "If you are responsible [for security], you should know what you are doing or where to get the information you need," Way...
Crate Expectations for Cargo Security Strategy
In a draft national cargo security strategy, the Department of Homeland Security sets a "zero-tolerance policy" toward the arrival of weapons of mass destruction at U.S. borders. The goal is to inspect 100 percent of "designated high-risk" cargo. ...
CRS Contemplates Port, Water Threats
As the investigative arm of Congress, the Government Accountability Office audits government efforts. As the public-policy research arm of Congress, the Congressional Research Service (CRS) provides objective analysis and data. Both have been exploring...
Drug Testing
Drug testing. A federal court of appeals has ruled that an employee's arrest for the possession of drug paraphernalia, an abuse of sick leave policy, and his refusal to submit to a drug test are sufficient grounds for requiring the employee to undergo...
Exhibitor Listing: As of February 1, 2005
More than 850 of the leading security organizations will be in Orlando at the world's largest show floor dedicated to security 360 Surveillance, Inc. 3SI Security Systems A4Vision ABATIX Abloy Door Security Abloy Security, Inc. ...
From Security's Leading Association ... the Industry's Most Influential Event
You're on the front lines of security. You understand how critical it is to keep up with the latest industry developments and innovations. And you know how important it is to attend the premier security event of the year--ASIS 2005. In a world of...
Getting a Handle on Incidents: Learn Why You Need an Incident-Handling Program and How to Set One Up
Anyone who has spent time defending a computer network from intruders and attackers knows that no matter how good the defenses, successful attacks on IT infrastructure are inevitable. Consequently, a company must have an incident-response program that...
Home on the Page @ WWW.Securitymanagement.Com
Continually on the lookout for more value for our readers, the editors of Security Management recently rolled out SM Daily and SM Weekly, summaries of and links to the security articles most pertinent to protection professionals. SM Online picks up...
Mission to Mitigate: The Loss Prevention Manager Is a Retail Company's Employee in the Trenches, Assessing and Mitigating Risk
The retail industry is estimated to lose $30 billion annually to a wide spectrum of threats. Retail operations must develop loss prevention strategies to identify, quantify, prioritize, and mitigate the potential causes of these losses at the local...
Prescription for Data Protection: This Month, HIPAA Security Provisions Take Effect. Here's What You Need to Know
This month, security provisions implementing the Health Insurance Portability and Accountability Act (HIPAA) take effect. They are only the latest in a series of implementing provisions, all of which raise complicated legal issues that companies must...
Secret Service Does Its Share
Everyone's heard complaints about industry and government not sharing information with each other. So it's refreshing when word arises of effective communication between the public and private sectors. At January's inauguration of President Bush for...
Security Consulting, Third Edition
Security Consulting, Third Edition. By Charles A. Sennewald; published by Elsevier Butter-worth-Heinemann; available from ASIS International, Item #1584, 703/519-6200 (phone), www.asisonline.org (Web); 195 pages; $40 (ASIS members), $44 (nonmembers)....
Staging Security in a Theater of War: Personnel Sent to Rebuild Iraq's Infrastructure Should Be Trained Thoroughly on the Physical and Mental Challenges They Will Face
Iraq is a country of extreme beauty, but it also presents extreme challenges, both natural and manmade. Thus, arriving in Baghdad can be a physical and psychological shock and personnel should be prepared. It starts with how the plane lands. As a defensive...
Strike One for Trilogy
If you're planning to roll out a large-scale IT project, you might want to pay heed to some lessons learned from the FBI's troubled Virtual Case File (VCF) software project. Part of a technology-modernization project known as Trilogy, VCF was intended...
The Security Consultant
Q: I'm responsible for protecting a high-risk facility. How can I stop nighttime intruders at the perimeter, before they get a chance to do damage? A: For high-risk facilities, deterrence and prevention are not enough. You need to detect and respond...
The Time for Urgency Is now[SM]
War, terrorism, workplace violence, sabotage, theft ... the list of security-related worries preoccupying today's executive seems to grow each year. Who can predict what looms on the horizon? It's easy to pretend that corporations cannot shield themselves...
The Very Model of a Modern CSO: Security Professionals Are Forging a New Path to Ensure That They Can Be Effective Stewards of Their Companies' Assets
When J. David Quilter first headed a security department, he was the outsourced director of security. "I was like the third cousin once removed," he remembers. "You sat at your desk. You got a call when all the horses were gone and the barn was burned."...
What's the Value of Training Time? Many Cities Are Considering Bills That Would Mandate Minimum Training Hours for Security Officers. Quality Is Not Discussed, and That's a Mistake
I think everyone would agree that the caliber of service provided by any contract security firm is directly related to the quality of training its security officers receive. But can the same be said for the quantity of training they receive? Do more...
Where Crimes Converge Investigations Merge: Insurance Companies Must Worry Both about Fraudulent Claims and Employee Fraud-When the Two Intersect, a Coordinated Investigation Is Best
Fraud is an issue for every company, but insurance companies must be concerned not only with typical types of employee fraud but also with fraudulent claims filed by customers who hold their policies. Sometimes the two roads to fraud intersect. In...
Workers' Compensation
Workers' compensation. The Supreme Court of Montana has ruled that an employer must pay workers' compensation benefits for an intoxicated employer who fell from a balcony during a conference. Overturning a lower court's ruling, the state supreme court...
Worth a Look
The art of phishing has become not only widespread but increasingly sophisticated as well. These scams can bring unwary surfers to identical versions of their online banks that at a casual glance are impossible to tell from the real thing. But a...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.