Every ESRM program requires continuous monitoring, awareness and adjustment to keep moving forward.
Over the past few years, I’ve been writing about approaching security programs from a risk-based perspective. This past year focused on Enterprise Security Risk Management (ESRM) and the benefits this framework and philosophy can bring to your organization.
One of the tasks we must master as we enter into an Enterprise Security Risk Management (ESRM) program is the idea that we will now “manage” risks.
We learn from our mistakes. In our personal lives, we have made (and will make) mistakes. But we can learn and grow from these life lessons, take this newfound knowledge, and use it to our advantage.
During 2017, I watched as our profession and ASIS International began down the Enterprise Security Risk Management (ESRM) path. We declared ESRM as one of our cornerstone objectives, touted its return at our Annual Seminar and Exhibits with sessions and workshops, and structured an ASIS Board Initiative to begin inserting ESRM into the DNA of our society.
Over the past 10 months, we’ve had a chance to explore the concepts of Enterprise Security Risk Management (ESRM) in this column, and at the annual ASIS Seminar held in Dallas this year. It’s been an interesting journey, and we’ve learned so much, but we’ve also seen how far we have to go.
It is official: recreational marijuana is legal in Canada with effect from October 17. With that comes a patchwork of jurisdictional laws establishing where and how marijuana products will be sold and used by consumers.
As we look back on 2015 and reflect on recent media headlines, we can appreciate the level of uncertainty that is affecting our society, along with the unpredictability of the threats we are facing, from weather hazards to terrorist attacks.
Value creation is at the heart of everything we do, whether we’re self-employed or working for a private company or public agency. Corporate objectives, as a general rule, seek to continuously improve that value creation potential.
The unfortunate deaths of spectators at the Pemberton Music Festival in British Columbia and the Veld Festival in Toronto in recent months have raised serious concerns about the effectiveness of current security measures.
In a recent Ontario case, the Court saw a video of an accused setting on fire his neighbour’s (i.e. the victim’s) truck.
The Internet and social media are hugely popular. Every day, hundreds of millions of digital images and videos are uploaded to, and downloaded from, various social networking websites (Facebook, MySpace, LinkedIn), information communities (YouTube, Pinterest, Google+), blogs/microblogs (Twitter, Tumblr), and photo sharing/management sites (Flickr, Instagram).
A few issues ago, I wrote about the R. v. Manley case in which a police search of Manley’s cell phone, after his arrest for a series of break-ins, was deemed lawful.
In April 2013, the world was shocked by terrorist bombings near the finish line of the Boston Marathon. Hundreds of video images were recorded by security (surveillance) cameras, television news cameras, and cell phone cameras. These images showed not only the explosions and resulting damage, but also the two brothers who allegedly planted the bombs. Video images of the suspects, travelling to and from the scenes of the two bombings, were widely shown and helped identify them.
Ever wish that your car was equipped with a video camera to record the licence plate of the car that cut you off, or did some other equally unsafe manoeuvre? Thanks to modern technology, you can now mount a camera on your car’s dashboard and record whatever is on the road.
Forensic investigators now have a new tool to use to document crime, accident, and fire scenes — the 3D laser scanner.
For IT professionals, cybersecurity has always been a central focus, but it may have moved higher up on the priority list.
The adoption of connected devices for home use has skyrocketed and is not likely to slow down.
I’ve worked in the technology industry for over 20 years, and in that time, I’ve lent my expertise in strategizing and implementing business-focused IT to everyone from small businesses to global corporations. As my company is a purveyor of comprehensive private and public cloud environments, we’re primarily concerned with giving organizations every IT component they need to power their business in a cohesive and streamlined way. This not only includes elements like virtual servers, desktops, email, and Microsoft Office, it also entails ensuring that cybersecurity measures are built into the fabric of the IT infrastructure.
When I look back at the most significant changes in the security industry over the past several decades, two trends stand out: the rise in public and corporate awareness of security as a retail service to be consumed, and the growing sophistication of some institutional consumers of security services.
A direct relationship exists between how quickly a business can identify and contain a security incident and the financial consequences. On average, the time to identify and the time to contain a threat are 229 and 82 days, respectively — alarmingly lengthy spans of time.
Canadian Security is celebrating its 40th anniversary in 2018. We asked several security professionals to submit their thoughts on the industry and reflect on 40 years of change. In each issue of Canadian Security magazine, we will feature a new columnist. Second is Roger Miller, president of Northeastern Protection Service.
Cloud technology has made possible opportunities that can be truly transformative for businesses.
Stadiums, concert halls and other large popular venues have experienced their own share of security events.
In 1990, during the first Bush administration, the Naval War College’s Terry Kelley published a paper titled “Global Climate Change, Implications for the U.S. Navy.”
Moving people on roads and rail and delivering goods such as food, machinery and parts is big business in North America.
Let’s continue our quest to understand organizational security management, resilience and our own models for decision making.
After the first Persian Gulf war ended and the no fly zone was in effect, the U.S. Air Force was tasked with controlling the skies over Iraq.
Critical Infrastructure as defined by Public Safety Canada “refers to processes, systems, facilities, technologies, networks, assets and services essential to the health, safety, security or economic well-being of Canadians and the effective functioning of government.”
I’ve been reviewing books for Canadian Security for a dozen years or so — more than a quarter of its existence — so I’m either experienced or old.
When I first saw James Hoggan’s book, “I’m Right and You’re an Idiot,” I sadly thought, Well, there goes my autobiography title.
Bruce Tulgan’s new volume is the revised, updated version of his similarly titled “Not Everyone Gets A Trophy – How to Manage Generation Y” I reviewed almost nine years ago.
Three is a very significant number.
Heather Mac Donald once wrote a book titled “Are Cops Racist?” Just looking at that title shows it’s an unfair question. Just about any answer can be a correct one. Her latest book is “The War On Cops — How The New Attack on Law and Order Makes Everyone Less Safe.” The title is more reasoned, but still seems to leave nuance out.
There’s a saying, “A lie travels around the globe while the truth is putting on its shoes,” that many attribute to Mark Twain.
Most Popular Stories
4th Annual Mission 500 Hockey Classic
February 21, 2019
Security Career Expo
March 7, 2019
Canadian Technical Security Conference
April 2-4, 2019
April 10-12, 2019
26th Annual ASIS Toronto Best Practices Seminar
April 17, 2019
Security Canada East
April 24, 2019