July 2010


Plus: Disaster Planning ♦ Resilience Standards ♦ Infrastructure Protection


Roadmap to a Safe Stay

By Matthew Harwood

When employees travel, they face a range of risks, and companies have a duty to help mitigate those risks.


Energy Insecurities: The Downside of Being Too Smart

By John Bumgarner

The energy sector's cybervulnerabilities have become more challenging with the rise of smart technologies, but government and industry have not taken the necessary steps to address these exposures and secure America's energy infrastructure. (Online Exclusive)


Partnering for a Healthy Response

By Joseph Straw

Healthcare facilities in regions around the country are forming regional coalitions to better prepare for emergencies.

Urban Area Perspective - Atlanta

By Joseph Straw

Security Management interviews Tony Carper, director of the Atlanta-Fulton County Emergency Management Agency.


Is "Observe and Report" Good Policy?

By Laura Spadanuta

After a high-profile incident in the Seattle area, should the security guard industry reevaluate its policy of "observe and report"?

Hotel Makes Room for Resilience

By Stephanie Berrong

In anticipation of the 2010 Federation Internale de Football Association (FIFA) World Cup in South Africa, Tsogo Sun Group implemented ASIS International's organizational resilience standard to provide a comprehensive approach to security, crisis preparedness, and continuity management for its hotel properties.

Bouncing Back After a Disruption

By Joseph Straw

Critical infrastructure—which includes everything from bridges to banks—can't always be protected, so it must also be resilient, meaning that it must be able to recover quickly after a natural or man-made event.

What the Nose Knows

By Laura Spadanuta

The nose may someday be used as a biometric identifier, but more research is needed to determine whether the capture technology is reliable and cost effective.

Security's Sweet Spot

By Ann Longmore-Etheridge

When it bought and renovated a former candy factory, Novartis built layered security measures into plans.

Legal Report

By Teresa Anderson

Rulings on employment issues and privacy, plus legislation on first responders and fire safety.

Industry News

By Ann Longmore-Etheridge

The Society sponsors the Wounded Veterans Phone Program for the third year; CSOs hold conferences on three continents; and Don Knox, CPP, is profiled.

Changing of the Guards

By Teresa Anderson

Discover how a security guard company implemented a program that increased profits, improved customer satisfaction, and earned some employees a raise in the process.


The Magazine — Past Issues


When Words Carry Multiple Meanings

By Sherry Harowitz

Word play can have serious consequences.


Companies Push for Digital Privacy

By John Wagley

Consumer advocates and businesses urge the government to strengthen electronic privacy laws and limit law enforcement access to remotely stored data.

Medical Fraud's Rising Cost

By John Wagley

Although still a relatively small percentage of identity theft cases, medical identity fraud is particulary expensive. Worse, it's the only kind of ID theft that could kill.


By John Wagley


The percentage of IT professionals who say the risks of cloud computing outweigh the benefits, according to a study by ISACA, a nonprofit IT governance organization.

Behind the Numbers

By Ponemon Institute

Chart: Information that IT deems too risky for cloud computing.


Protecting Personal Data in the EU

By Stephanie Berrong

Organizations should assess the enforcement risks in the countries in which they are operating and focus resources, experts say.

Counterfeiting and Piracy: At What Cost?

By Stephanie Berrong

Two different studies try to grapple with calculating the cost of counterfeiting and piracy.


At War With the Weather: Managing Large-Scale Risk in a New Era of Catastrophes

By Howard C. Kunreuther and Erwann O. Michel-Kerjan; Reviewed by Brian Strong, CPP, CBCP

At War with the Weather represents a tour de force in the analysis of how natural disasters—specifically hurricanes—are mitigated, insured against, and recovered from financially in the United States.

Terror and Iraq: How We Can Better Combat Islamic Terrorism

By Shimshon Issaki; Reviewed by Frederick D. "Rick" Arons, CPP, CRT

A retired Israeli intelligence professional offers alternative ways to fight al Qaeda and jihadism in general.

WMD Proliferation: Reforming the Security Sector to Meet the Threat

By Fred Schreier; Reviewed by Stephen Sloan

An overview of weapons of mass destruction, author Fred Schreier finds biological weapons the most threatening.

Best Damn Cybercrime and Digital Forensics Book Period

By Jack Wiles and Anthony Reyes, eds.; Reviewed by Ben Rothke, CISSP

Despite the bragging title, this multi-author volume is a valuable introduction to cybercrime and digital forensics.


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.