THE MAGAZINE

June 2010

CORPORATE ETHICS

Plus: Cargo Security ♦ Pretexting

COVER STORY

How to Develop an Ethical Culture

By Stephanie Berrong

Honesty really is the best policy not only because it's ethical but also because corrupt practices will land the company in court, saddle it with costly fines, and ruin its reputation. Management must, however, do more than put a code of ethics on paper; it needs to implement an anti-corruption program.

FEATURES

Plan to Prevail

By Will Gunther

By creating a crisis management plan, security managers can help ensure that employees know what to do when danger strikes. (Online Exclusive)

HOMELAND SECURITY

Web 2.0 Helps in Disaster

By Joseph Straw

In the devastation left by the recent earthquake in Haiti, a Web-based crisis-mapping program helped rescuers locate those in danger.

Urban Area Perspective - New Orleans

By Joseph Straw

Security Management interviews Lt. Col. Jerry Sneed, USMC (Ret.).

Numbers

13

The number of U.S. criminal cases in 2009 where charges were tied to jihadist terrorists, according to the RAND Corporation.

PRINT EDITION ONLY

Pretexting: What You Need to Know

By Teresa Anderson

In some cases, pretexting can be a valuable investigative tool, but companies need to carefully navigate the legal landscape.

Will Air Freight Screening Plans Fly?

By Matthew Harwood

One hundred percent screening is mandated for the air freight industry beginning August 1. With the deadline fast approaching, Security Management talks with stakeholders about preparations.

Harnessing the Power of Hotlines

By Eugene Ferraro, CPP, PCI, CFE

By establishing hotlines, companies can meet federal and state whistleblower protection laws while also preventing fraud in the workplace.

Lightening the Load for Rescue Teams

By Laura Spadanuta

One of the nation's top tactical teams needed a biometric capture application that fits on small mobile devices; the solution could benefit many agencies.

Cartels and Corruption

By Laura Spadanuta

Drug cartel influence has begun to fester inside U.S. federal law enforcement agencies and spread corruption.

Curing What Ails Hospitals

By Ann Longmore-Etheridge

To keep narcotics from being stolen by staff, one healthcare provider installed an automated dispensing system, increased auditing, and created an awareness program.

Legal Report

By Teresa Anderson

Rulings on medical testing and background screening, plus legislation on whistleblower protection, cybersecurity, and employment.

Industry News

By Ann Longmore-Etheridge

ASIS bestows the Bordes Award, the school funding competition is launched, and Per Lundkvist, CPP, PSP, PCI, is profiled.

Checking from a Distance

By Frederick G. Giles, CPP

Companies should ensure that contract employees undergo background checks, but they must not control the process as an employer would.

 

The Magazine — Past Issues

EDITOR'S NOTE

Don't Be Fooled by the Pros or the Cons

By Sherry Harowitz

Consider the source, the substance, and a few other things before you buy whatever they're selling.

CYBERSECURITY

Stronger Healthcare Consent

By John Wagley

Better consumer education about the privacy of health data and research on sharing policies could help protect patient information.

Behind the Numbers

Top enterprise security risks according to IT managers.

Numbers

26

The percentage of U.K. school children who admitted to hacking into another person’s Facebook or e-mail accounts, according to a survey by Tufin Technologies. The reason most often given for the unauthorized access was for “fun and mischief.” Seventy-eight percent of respondents, however, said they felt the hacking was “wrong.”

 

INTERNATIONAL

World Cup Security in Play

By Stephanie Berrong

While South Africa may have preparations in place, ensuring the safety of executives who attend the tournament presents unique challenges.

Lessons Learned from Chile's Earthquake

By Stephanie Berrong

While Chile fared much better than Haiti after recent earthquakes, many organizations discovered they weren't actually prepared to respond to and recover from the disaster.

BOOK REVIEWS

Introduction to Homeland Security, Third Edition: Principles of All-Hazards Response

By Jane Bullock et al; Reviewed by Kevin A. Cassidy

The third edition of Introduction to Homeland Security gives an excellent and comprehensive look at how different agencies cooperate to manage risk across the United States.

Beyond the Bodyguard: Proven Tactics and Dynamic Strategies for Protective Practices Success

By Gavriel Schneider

Despite a lack of how-to detail, Beyond the Bodyguard is comprehensive, well researched, and detailed.

The Myths of Security: What the Computer Security Industry Doesn't Want You to Know

By John Viega; Reviewed by Mayer Nudell, CSC

An IT security professional gives you the inside scoop on an industry that puts security before usability and cost.

Scrappy Information Security: The Easy Way to Keep the Cyber Wolves at Bay

By Michael Seese; Reviewed by Ronald L. Mendell, MS, CISSP

Author Michael Seese gives a straight-talking, conversational, and quick overview of IT security.

 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.