Security Management February 2010: Emergency Response
February 2010


Plus: Pandemic Lessons ♦ Workplace Violence ♦ Biometrics


From Research to Reality

By Joseph Straw

The Department of Homeland Security's Science and Technology Directorate funds traditional research and innovation as well as research into technologies ready for transition and commercialization. Its multipronged approach appears to be paying off.


How to Handle Poison Pen Letters

By Mark Brenzinger, Timothy Flora, and Henry Rush

Companies should take seriously the need to have a policy for responding to threatening communications directed at corporate executives or other employees.

Enterprise Security Risk Management: How Great Risks Lead to Great Deeds

By The CSO Roundtable

This CSO Roundtable white paper serves as a snapshot of how well security professionals understand ESRM, what the challenges of its implementation across an entire organization are, and precisely what the rewards are. ONLINE EXCLUSIVE

Counterterror, Technology, and Reaction

By Bob Raffel

COMMENT: The United States must learn to stop and think—rather than react—after an attack if it wants to defeat jihadist terrorists. (Web Only)


Pandemic Lessons Learned

By Joseph Straw

The government delivered a unified message on the severity of the H1N1 virus, but it later faltered in vaccine delivery and disease tracking.

Urban Area Perspective - Philadelphia

By Joseph Straw

Security Management interviews MaryAnn Tierney, deputy managing director for emergency management in the city of Philadelphia.


Biometrics Put to the Test

By Stephanie Berrong

Trends in biometrics' use in the EU and a look at how one company navigated privacy laws while testing a biometric application.

Improving Witness Identification

By Laura Spadanuta

A computer program designed to reduce influence on witnesses may lead to more accurate identification during lineups.

Environmental and Security Groups Align

By Laura Spadanuta

Security industry groups have joined forces with a surprising partner to change a law that affects security manufacturers.

Being Forewarned

By Teresa Anderson

A service that provides alerts before disaster strikes is a critical part of the business plan at an international manufacturing company.

Legal Report

By Teresa Anderson

Rulings on computer policies, cybersecurity, and discrimination; and legislation on data protection, FEMA, bioterrorism, and food safety.

Industry News

By Ann Longmore-Etheridge

ASIS standards are accepted by government agencies and the private sector, and Douglas Kohlsdorf, CPP, is profiled.

When Employees Vent

By Teresa Anderson

Companies need to understand the legal constraints they face regarding negative comments about them that employees may post online.


The Magazine — Past Issues


Puzzling Over Intelligence Without 20/20 Hindsight

By Sherry Harowitz

How hindsight bias leads us to make the wrong assessments after a terrorist incident.


New Bugging Threats

By John Wagley

Surreptitious surveillance devices are cheap, plentiful, and easy to use, putting companies with valuable intellectual property at risk.

Reining in Web 2.0

By John Wagley

More and more companies allow employees to use Web 2.0 tools like social networking, but the practice carries myriad risks.

A Site to See: xB Browser

By John Wagley

This month's Site to See helps people browse the Web anonymously.



The percentage of organizations planning to increase spending on information security risk management in 2010. More companies plan to boost spending in this area of information security than in any other, according to an Ernst & Young survey. 

Behind the Numbers

By Ernst & Young

Ernst & Young catalogues data security technologies employed by organizations.


Strategic Theater Yields Lessons

By Stephanie Berrong

A new database gives researchers details about maritime conflicts in the Indian Ocean, helping to teach lessons for future incidents.

Testing Company Aces Data Privacy and Security

By Stephanie Berrong

The organization that owns the GMAT standardized exam shows how even small organizations can give customers data privacy protections.



The number of ports worldwide at which radiation detection systems have been installed for the purpose of scanning cargo. The goal is to have the systems in 100 seaports by 2015.


Intelligent Network Video: Understanding Modern Surveillance Systems

By Fredrik Nilsson; Reviewed by Susan Gallagher

Get an exceptional understanding of modern video surveillance from Intelligent Network Video.

Kidnap for Ransom: Resolving the Unthinkable

By Richard P. Wright; Reviewed by Paul H Aubé, CPP, CAS

Kidnap for Ransom is a book for the real protection manager facing real abduction threats.

Security Monitoring

By Chris Fry and Martin Nystrom; Reviewed by Ben Rothke, CISSP, PCI QSA

The book stresses employers need to adopt the mindset of 24-hour, 7-days-a-week security monitoring to protect their networks and the precious data within.

Cloud Application Architectures: Building Applications and Infrastructure in the Cloud

By George Reese; Reviewed by Ben Rothke, CISSP

A very good overview of the next big thing: cloud computing.

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility

By Andrew Jones and Craig Valli; Reviewed by K.J. Kuchta, CPP

Those looking to establish a digital forensics laboratory, should look elsewhere.

Beyond Terror and Martyrdom: The Future of the Middle East

By Gilles Kepel; Reviewed by Mario A. Possamai, CPP, CFE, CAMS

Beyond Terror and Martyrdom is a good book overtaken by the rush of history.

The War on Terrorism: A Collision of Values, Strategies, and Societies

By Thomas A. Johnson; Reviewed by Mayer Nudell, CSC

An overpriced volume that argues terrorism is a product of jihadism's rejection of globalism.


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.