www.asisonline.org
Open in
urlscan Pro
104.25.55.15
Public Scan
Submitted URL: http://www.securitymanagement.com/
Effective URL: https://www.asisonline.org/security-management-magazine/latest-news/sm-homepage/
Submission: On October 23 via api from US — Scanned from NL
Effective URL: https://www.asisonline.org/security-management-magazine/latest-news/sm-homepage/
Submission: On October 23 via api from US — Scanned from NL
Form analysis
1 forms found in the DOM/search/
<form class="utility-search__form" action="/search/">
<label name="search" for="search" class="sr-only">
<span>Search</span>
</label>
<input class="utility-search__input" name="q" type="search">
<button class="utility-search__submit">
<i class="material-icons no-border">search</i>
</button>
</form>
Text Content
Skip to content Advancing Security Worldwide ® * language GSX * people Connects * store Store * help FAQs Search search Menu menu person_add Join person_add Create Account Login search * Today in Security * Elections * Active Assailant * Cyber * Physical * Management * Career Transitions from Public to Private Sectors * Toxic Workplaces * Finding the Right Balance of Soft Skills * Fostering New Skills, Mentoring, and Tips for New Leaders * Building a More Diverse, Inclusive, and Sustainable Culture * How to Become a Better CSO * Strategies for Better Buy-In * Mental Health for Security Personnel * Leading Through Crisis & Change * More Leadership & Management * Legal Report * Technology * Intelligence * The Robotics Issue * Sporting Event Security and Technology * Security and Artificial Intelligence * The Future is Electric * Aligning the Social Media Stars * Getting Organized * Smartphones for Strategic Security * Trailblazing Partnerships and Tech for Fire Prevention * What's Driving Executive Protection? * Supply Chain Challenges and Opportunities * Rising Resilience * Cybersecurity Incident Response * New Technology Products * Security Technology Archive * Resources * SM Archive * About SM * Podcasts * Our Authors * Download Issues * RSS Feed * Editorial Calendar * Writer's Guidelines * Advertise with Security Management * New Products * Best Practices * ASIS * ASIS Homepage * About ASIS * Membership * Certification * Professional Development * Get Involved * Webinars IS YOUR COMPANY CULTURE INHIBITING EFFECTIVE WORKPLACE SAFETY TRAINING? Organizations and workforces regularly clash over the meaning of quality training as it relates to workplace security. Employers often do not understand workplace violence prevention strategies, and that lack of understanding turns into a lack of support. Managers’ disinterest unintentionally sabotages their commitment to workplace safety training, and their lackluster commitment results in employees believing that management does not care about their safety. Continue Reading * Security Culture: Awareness, Training, & Behavior * Fast Facts: Is Your Security Training Based on Human Risk Management? * What Works? Culture-Informed Security Training Tips WHAT GROWING OUTSOURCING MEANS FOR SECURITY MANAGEMENT CERTIFICATION PROFILE: DIMITAR ATANASOV, APP IMPROVING MUSEUM SECURITY AND VISITOR EXPERIENCES CUBA GRAPPLES WITH POWER OUTAGES AND HURRICANE OSCAR WHAT WORKS? CULTURE-INFORMED SECURITY TRAINING TIPS IS YOUR COMPANY CULTURE INHIBITING EFFECTIVE WORKPLACE SAFETY TRAINING? FEATURED ARTICLES HOW INFLUENCING CULTURE IS THE DIFFERENTIATOR FOR SECURITY LEADERS The art of human connection is foundational to a holistic security program that business leaders will embrace and consider invaluable to their business success. Read More Q&A: ANALYZE, ACCEPT, AND ADAPT TO POLLING PLACE SECURITY RISKS Schools, places of worship, and other soft target facilities often pull double duty as polling places during elections. Read More HOW MALICIOUS ACTORS CARRY OUT FOREIGN INFLUENCE ATTACKS Hostile foreign influence operations targeting democratic elections leverage various tactics and techniques. Read More TRENDING NEWS 2024 U.S. ELECTIONS SPARK CONCERNS ABOUT WIDESPREAD RIOTS AND SIGNIFICANT BUSINESS DISRUPTION DEFENSE CONTRACTOR RTX AGREES TO $950 MILLION FINES TO END BRIBERY AND FRAUD ALLEGATIONS IN POLARIZED ENVIRONMENTS, ATTORNEYS AND JUDGES FACE A MULTITUDE OF THREATS HOW TO IMPROVE YOUR SITUATIONAL AWARENESS SECURITY TECHNOLOGY: THE INTELLIGENCE ISSUE The proliferation of data—and artificial intelligence tools to create or gather it—is changing how threat intelligence teams conduct their work. The October issue of Security Technology takes a look at how this transformation is unfolding and the opportunities it poses for proactive security teams. Read the Issue BEST OF SECURITY MANAGEMENT BACKGROUND CHECK COMPANY BREACH PUTS 2.9 BILLION RECORDS AT RISK SECURITY GUARDS: ARE THEY YOUR FORGOTTEN RISK MITIGATOR? 5 STEPS TO IMPROVE SITUATIONAL AWARENESS AND PUBLIC SAFETY AT LARGE EVENTS HOW TO CREATE AND MAINTAIN AN EFFECTIVE SOC CHANGING TACTICS: CARGO THIEVES ZERO IN ON INFORMATION FROM SUPPLY CHAINS BEST PRACTICES FOR MINIMIZING OT THREATS Go to previous slide. Go to next slide. SECURITY MANAGEMENT PODCAST HOW INTELLIGENCE HELPS MANAGE THE GROWING TEMPO OF TEMPESTS Are you basing your emergency preparedness plans on outdated data and models? As the pace of natural disasters and critical events speeds up, security managers will need to readjust their procedures and succession plans to succeed, says Thomas Henkey, CEM. Also in this month’s episode, sponsored by Dataminr, Paul Maguire discusses how the volume of HUMINT and OSINT available today makes corporate security intelligence challenging, especially when artificial intelligence enters the scene. Then, Felix Nater outlines how security awareness training can fail… especially when users think it’s boring. Listen Now FOCUS ON EXTREMISM AND POLITICAL INSTABILITY LEADERLESS RESISTANCE: UNDERSTANDING AND COUNTERING AN AMORPHOUS THREAT The most likely terrorist threat today comes from lone assailants and small cells operating under the principles of leaderless resistance. More On This Topic ▪ The Impact and Opportunities of the Geopolitical Climate: Try Not to Overreact ▪ Intelligence to Address Extremism: Look for What Matters Most ▪ Climate Change and the Rise of Dark Green Ideologies ▪ Preparing for Civil Unrest and War in Cultural Properties ▪ Understanding the 3 Levels of Security Glass Read the full content collection from Security Management here. ASIS CALENDAR OF WEBINARS & EVENTS As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career. Explore Events BOOK REVIEW: PRIVATE SECURITY: AN INTRODUCTION TO PRINCIPLES AND PRACTICE, 2ND EDITION Your first feeling after reading Private Security: An Introduction to Principles and Practice, 2nd Edition, should be amazement that a single author could corral so many details about private security, even if you agree that security is expanding as our lifestyles evolve. Read More CATCH UP WITH SM ON SOCIAL MEDIA Be the first to see new SM and ASIS videos on YouTube. Subscribe on YouTube Share the latest SM articles, infographics, and stories with your friends and colleagues. Follow SM on Facebook Be the first to hear about new SM articles, issues, videos, and more on Instagram. Follow SM on Instagram record_voice_over PODCASTS Hear what Security Management editors and guest speakers have to say about this month’s magazine. Listen cast_for_education WEBINARS View all of our past and upcoming educational webinars. Learn co_present MEDIA KIT Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. Learn archive ARCHIVES Access old issues of Security Management and other content. Explore cloud_download DOWNLOAD ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device. View screen_lock_portrait SECURITY TECHNOLOGY Read the latest articles from our newest publication, Security Technology. Read * * * * HEADQUARTERS ASIS International 1625 Prince Street Alexandria, Virginia 22314-2882 USA MEMBER SERVICES asis@asisonline.org +1.703.519.6200 (phone) +1.703.519.6299 (fax) ABOUT ASIS About ASIS Executive Leadership Contact Us Code of Ethics and Conduct Privacy Policy Social Media Policy Cookie Settings Frequently Asked Questions Copyright © 2024 ASIS International arrow_upward COOKIES ON THE ASIS WEBSITE We use cookies to give you the best digital experience while visiting our website. By accepting the use of cookies and using our website you consent to all cookies in accordance with ourPrivacy Policy Privacy Settings Accept Cookies PRIVACY PREFERENCE CENTER This website uses cookies to remember users and understand ways to enhance their experience. Some cookies are essential, others help us improve your experience by providing insights into how the site is used. For more information, please visit our Cookie Information on our Privacy Policy. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information Cookies Details PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Cookies Details FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Cookies Details TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookies Details SOCIAL MEDIA COOKIES Social Media Cookies These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools. Cookies Details UNCLASSIFIED Unclassified Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies. Cookies Details Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices