Security Technology Executive

FEB-MAR 2018

Issue link:

Contents of this Issue


Page 5 of 61

4 SECURIT Y TECHNOLOGY E XECUTIVE • Februar y/March 2018 • www. TABLE OF CONTENTS Februar y/March 2018 • Volume 28 , Number 1 Five Steps to a Risk- Free M&A By Steve Lasky COLUMNS 6 My Point of View Steve Lasky Meet the Board 8 Convergence Q&A Ray Bernard How to Manage High-Camera-Count Deployments 10 Tech Trends Ray Coulombe Hearing is Believing 12 CyberTech Update Stephanie Domas Top 6 Challenges in Tackling Cybersecurity of Medical Devices in Hospitals 59 Cool as McCumber John McCumber What is Wrong with This Job, Anyway? DEPARTMENTS 54 ISC WEST New Products Showcase 58 Advertisers' Index FOCUS ON HEALTHCARE SECURIT Y 20 Emerging Threats in Healthcare & the Adaptation of Protection Models By Raymond Gerwitz 24 Mitigating Workplace Violence Threats By Bryan Warren 28 How to Handle an Active Shooter Situation By John Arendes TECHNOLOGY FEATURES Video Surveillance 32 How Storage Variables Bring Control to Surveillance Implementation's Bottom Line By Wayne Arvidson Access Control 36 Access Control Evolution Spotlights High-tech and Cybersecurity Advancement By Joel Griffin Biometrics 42 Facial Recognition Crosses both Security, Consumer Applications By Steve Lasky CYBERSECURIT Y Ransomware 46 The Growing Ransomware Threats and Trends By Clyde Hewitt Risk Mitigation 50 Proactive Security Programs: Staying Left of the Boom By Scott Stewart 20 24 28 36 16 COVER STORY

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - FEB-MAR 2018