Given the impact of ISIL and their ideology, it is clear there is an increasing risk that organizations face when employees radicalise and become a potential terrorist threat.
There are many examples that highlight this risk. Where vetting is still seen as an important safeguard to avoid recruiting potential terrorists, it is a wholly different story when employees radicalise.
How to detect this, how to assess the risk, how to respond? When to report to the authorities? This is likely one of the bigger challenges of the coming decade.
Werner Cooreman, CPP, PSP, Vice President, Security Express Europe – DHL, Germany
The employment lifecycle is a human resources model that identifies stages in employees’ careers to help guide their management and performance. Since security is implicit in our day-to-day activities it must therefore be a continuing influence during the employment lifecycle of each and every individual.
For an organisation to have effective security it needs documented policies and instructions to govern the actions of all those within its circle of trust. The vast majority of breaches and security events occur at the most basic levels of our defences.
Most attacks succeed by directly targeting our people. Human error and ignorance amongst our workforces presents a huge gap in our defences but many organisations have still to fully integrate security into the employment lifecycle.
Martin Smith, Chairman and Founder, The Security Company, UK
Psychopaths is well known term from the movies, but often not recognised properly in the corporate arena. We will define the characteristics of psychopaths and look at what recent studies have discovered.
Defined as “Snakes in suits”, they are a major risk for any organisation that employs them, yet some highly functioning psychopaths manage to climb up the corporate ladder through superficial charm, grandiose sense of self worth, lies and deceit, manipulation and shear boldness. This is a crash course for any security professional on how to mitigate the risk created by psychopaths.
Totti Karpela Director, Peace of Mind Threat Management, Hong Kong
Plus: Cybersecurity, Business Value of Security, Terrorism Outlook, Internet of Things and Technology & Solutions
Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.
To submit an article, or for sponsorship opportunities, please contact our team below.
Paul Barker an associate trainer at PerpetuityARC Training, part of Linx International Group, has been made a life member of ASIS International and life CPP
Boon Edam Inc have been specifically targeted by ASIS International in order to be their Official Turnstile Sponsor for the 2017 ASIS show in Dallas, Texas
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.