The Intersection of Risk Management and Security

View in a browser

The Intersection of Risk Management and Security

Sponsored Content:

 
Alternate text

Webinar: The Case for Security Convergence: A Fireside Chat with Christopher Krebs

 

September 22nd at 11am EDT / 4pm BST.

 

In an era where information is among your most valuable assets, keeping your finger on the pulse of the dynamic cyber-physical threat landscape and understanding the impact on your organization are critical.  


Join our special guest speaker Chris Krebs, former Director of the Cybersecurity and Infrastructure Security Agency (CISA), for a fireside chat as we discuss emerging national security events, from the rise of ransomware, defending elections, major cyber attacks, and the growing challenges of disinformation.  

Learn more

.

Leveraging Public Data to Mitigate Threats


Insider attacks generally take the form of theft, fraud, sabotage, or violence by individuals with access to the critical resources of an organization. Unsurprisingly, worrisome indicators often exist prior to these malicious acts. There are three main reasons organizations should consider using publicly available information to safeguard their people, property, and profit: insiders tend to not act impulsively but move slowly toward action; they leave clues in their progression along the insider kill chain in the form of changes in attitude and behavior; and these clues are increasingly found in public data.


Read More

 
Alternate text

Case Study: Global Awareness Critical for NFL  


The NFL's global security operations center (GSOC) is responsible for protecting the NFL’s people and assets, including stadiums, training facilities, players, and coaches—both domestically and globally. Learn how the NFL GSOC team used real-time data to identify potential risk and make split-second decisions, and how alerts have become crucial for their security operations.


Learn more

.

Executive Risks Intensified Throughout Pandemic, Study Finds


According to a recent study, 24 percent of physical security and IT leaders said that since the beginning of 2021 their CEO or family members received threats or were harmed when working from their private residence or while traveling as a result of intelligence failures. Equally alarming is that 15 percent of respondents said their company had also received executive kidnapping threats since the beginning of 2021. These statistics are not anomalies but trends that should not be ignored.


Read More

 
Alternate text

Video: The New State of Risk in Retail: The Intersection of Physical and Cyberthreats featuring Big Lots

 

One thing that risk and security leaders can agree on is that protecting your people and assets has become more and more challenging. The traditional challenges of budgets, time and resources remain for many; however, security professionals now find themselves at the intersection of multiple threat streams – physical risk, cyber security, asset misappropriation and brand protection. Hear Ryan Mason, Corporate Investigator with Big Lots and Binu Jacob, Product Marketing Manager at Dataminr discuss the modern risk landscape and the convergence of physical and cyber threats in the retail industry.


Learn more

.

Employee Activism as a Risk Management Opportunity


As more people become locked inside their own echo chambers, political perspectives often deteriorate into partisanship, and conflict can arise when engaging with those of differing views.  The combination of increased activism and elevated divisiveness presents a heightened threat for conflict entering the workplace, particularly for corporations whose employees are returning to the office after working remotely.

 

Read More

Facebook LinkedIn Twitter Instagram YouTube

ASIS International

Unsubscribe

If you have questions, please contact Member Services at asis@asisonline.org or +1.703.519.6200 (Monday - Friday 9:00 am - 5:00 pm ET) or via 1625 Prince Street, Alexandria, VA 22314 USA.

ASIS International values the privacy and integrity of our members, partners, attendees, exhibitors, and sponsors, and we do not sell, nor do we provide it to third-party vendors for distribution. View privacy Policy.