May 2013

Developing a Prevention Policy

By Teresa Anderson

Find out how one company drafted a workplace violence policy that conforms to best practices laid out by the ASIS standard.


What’s Wrong with Border Security?

By Sherry Harowitz

Efforts to secure the border need more than an influx of cash; they require clear definitions and reliable metrics.


Industry News

By Ann Longmore-Etheridge

Steve Wozniak is slated to speak at the ASIS Intenational 59th Annual Seminar and Exhibits in Chicago, and Shaun Fynes, CPP, PCI, PSP, is profiled.

Big Picture Risk Management

By John Wagley

How companies are using governance, risk, and compliance solutions to improve efficiency, meet regulatory requirements, and centralize risk management.

CFATS Progress Report

By Steve Roberts

A look at how the regulators are implementing chemical facilities’ security regulations and the lessons that can be learned from the process.

Case Study

By Teresa Anderson

Roanoke Regional Airport found a locking system that has the ease of mechanical locks with the features of an electronic access control system.

Legal Report

By Teresa Anderson

California appeals court rules that an employee may be legally fired for failing to cooperate with an internal investigation. Lawmakers consider bills on embassy security and chemical facilities.


By Laura Spadanuta

A look at the challenge of avoiding vigilance fatigue for those facing long-term security threats, and how the FBI uses television shows to help solve crime.


The Magazine — Past Issues


Cybersecurity Framework Draft Efforts Underway

By Sherry Harowitz

Find out what’s happening with the cybersecurity framework.


Monitoring Social Media Use

By Holly Gilbert

More businesses are using social media to promote their brands, and that raises issues about when and how they should monitor what employees do with it.

Behind the Numbers

By Federal Trade Commission

Top 5 Consumer Complaints to FTC in 2012.


High Stakes on the High Seas

By Carlton Purvis

Experts contend that governments currently patrolling off the coast of Somalia will withdraw, leaving merchants to fend for themselves.


Investigations in the Workplace, Second Edition

By By Eugene F. Ferraro, CPP, PCI; Reviewed by David P. Sayer

Experienced author and security professional, Eugene F. Ferraro, CPP, PCI, has successfully updated his previous work on the subject.

DoD Security Clearance and Contracts Guidebook: What Defense Contractors Need to Know About Their Need to Know

By Jeffrey W. Bennett; Reviewed by G. Ernest Govea, CPP

This book describes certain elements of the National Industrial Security Program, which is the government program for the protection of classified information.

The (Honest) Truth About Dishonesty: Why We Lie to Everyone, Especially Ourselves

By Dan Ariely; Reviewed by Lydia Wilson, CPP and Michael D. Moberly

Easy-to-read and often humorous, Dan Ariely’s The (Honest) Truth About Dishonesty is highly relevant for security managers, notwithstanding its breezy style. Readers will come away with an understanding of the drivers of dishonesty and how to restructure the environment for better security.

Cybersecurity: Public Sector Threats and Responses

By Kim Andreasson; Reviewed by Ben Rothke, CISSP

Author Kim Andreasson provides an over­view of how government agencies and other public-sector groups can use the Internet without introducing unnecessary risks to their constituents.

Eternal Battle Against Evil

By Paul R. Chabot; Reviewed by Olle Fjordgren

Author Paul Chabot takes a bold and sweeping look at all the bad things in the world—terrorists, drugs, gangs, even Somali pirates.


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.