- Somalia-based al-Shabaab terrorist group targeted Daallo Airlines in an aviation bombing.
- The security sector faces increasing complex threats and needs leaders who can learn from the past, prepare for the future, understand current performance, and develop better leadership.
- There is a lack of leadership ("poverty of leadership") in the security industry where staff are undervalued, managers lack leadership skills, and organizational leaders don't evaluate their own leadership or inspire their people. Developing leadership could help anticipate threats and shape the industry.
The UAE Security Forum, under the title “Bridging the Cybersecurity Talent Gap,” sought to explore best practices and make recommendations about how to tackle these challenges by bringing together government officials, educators, and industry executives in a number of interactive sessions during the day-long event. This report, summarizing the discussion and recommendations, is aimed to help enhance cybersecurity by building capacity across the board, and in particular contributing to the development of an Emirati workforce that can meet urgent challenges. - See more at: http://www.agsiw.org/uae-security-forum-bridging-the-cybersecurity-talent-gap/#sthash.sIGWDTM0.dpuf
International Association of Risk and Compliance Professionals (IARCP)
http://www.risk-compliance-association.com
Every Monday
Top 10 risk and compliance management related news stories and world events
Do you want to receive (at not cost) every Monday the Top 10 risk and compliance management related news stories and world events that (for better or for worse) shaped the week's agenda, and what is next?
You can register at:
http://www.risk-compliance-association.com/Top_10_Risk_Compliance_Management_Stories_Events.html
Receive the New Member Orientation Newsletters
You will have the opportunity to learn (at not cost) what members registered before you have already learned. Understand better risk and compliance management, projects, careers, challenges and opportunities.
You can register at:
http://www.risk-compliance-association.com/New_Member_Orientation_Newsletters.html
Las bananas y sus beneficios, Salud del Corazon en las Mujeres, La Vista Reducida aisla a las Personas Mayores, La Gripe es mas que un Estornudo, Glaucoma : Ladron Silencioso de La Vision, El Cafe es mas Benefico que Perjudicial, Las Mascotas como Cuidadores, Acido Folico y Cuidado Prenatal, Genes y Terapia Genetica, Cuidado de Los Codos, Salud del Cuello Uterino, Los Niños deben comer mas frutas y Verduras.
There are a number of miniature points that make significant increases in web traffic and sales. take a look at such points for the healthcare industry.
The UAE Security Forum, under the title “Bridging the Cybersecurity Talent Gap,” sought to explore best practices and make recommendations about how to tackle these challenges by bringing together government officials, educators, and industry executives in a number of interactive sessions during the day-long event. This report, summarizing the discussion and recommendations, is aimed to help enhance cybersecurity by building capacity across the board, and in particular contributing to the development of an Emirati workforce that can meet urgent challenges. - See more at: http://www.agsiw.org/uae-security-forum-bridging-the-cybersecurity-talent-gap/#sthash.sIGWDTM0.dpuf
International Association of Risk and Compliance Professionals (IARCP)
http://www.risk-compliance-association.com
Every Monday
Top 10 risk and compliance management related news stories and world events
Do you want to receive (at not cost) every Monday the Top 10 risk and compliance management related news stories and world events that (for better or for worse) shaped the week's agenda, and what is next?
You can register at:
http://www.risk-compliance-association.com/Top_10_Risk_Compliance_Management_Stories_Events.html
Receive the New Member Orientation Newsletters
You will have the opportunity to learn (at not cost) what members registered before you have already learned. Understand better risk and compliance management, projects, careers, challenges and opportunities.
You can register at:
http://www.risk-compliance-association.com/New_Member_Orientation_Newsletters.html
Las bananas y sus beneficios, Salud del Corazon en las Mujeres, La Vista Reducida aisla a las Personas Mayores, La Gripe es mas que un Estornudo, Glaucoma : Ladron Silencioso de La Vision, El Cafe es mas Benefico que Perjudicial, Las Mascotas como Cuidadores, Acido Folico y Cuidado Prenatal, Genes y Terapia Genetica, Cuidado de Los Codos, Salud del Cuello Uterino, Los Niños deben comer mas frutas y Verduras.
There are a number of miniature points that make significant increases in web traffic and sales. take a look at such points for the healthcare industry.
Marketing management case analysis of 'NIKE'. This PPT contains Nike's Acquisitions, Pros & cons and risk faced by NIKE and spokes persons of the NIKE. SWOT analysis of ADIDAS. Purely focused on Marketing Mix and SWOT analysis of NIKE and ADIDAS.
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStéphane Nappo
"One of the main Cyber risks is to think they don't exist. The other is to try to treat all risks".
Key cybersecurity quotes, key methodologies, and advanced risk management approches. Seeking for simplicity and efficiency in the complex realm... Do read.
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Group
Cybersecurity is a business critical risk not just an IT issue. The reputational damage of a cyber breach is often less than the technical damage inflicted, the money lost, or the regulatory fines. With new threats proliferating at startling speed how companies respond to an attack can be more important than the attack itself. The good news is that companies can seize this challenge to differentiate themselves from the competition and earn a greater level of trust from stakeholders.
Learn more about the four steps companies can take to build their reputational resilience to cyber attack.
In the Forefront Exemplary Leaders of the Business World.pdfCIO Look Magazine
This edition features a handful of The Exemplary Leaders of the Business World to Watch that are leading us to a better future
Read More: https://ciolook.com/in-the-forefront-exemplary-leaders-of-the-business-world-november2023/
Own Your Future!
“It is time for us all to stand and cheer for the doer, the achiever - the one who recognizes the challenges and does something about it.” Vince Lombardi
ONLY talents! NO ranking here!
With the global skills shortage, it is crucial to encourage talents who dedicate their life and career to cybersecurity.
This special edition spotlights remarkable cybersecurity and industry 4.0 professionals. Top Cyber News Magazine is pleased to unveil a constellation of young and devoted men and women: amabasadors, erudites, and influencers.
All, part and inspiring force behind the global Cybersecurity Awareness movement. These talented experts and brilliant people coming from nineteen countries and five continents.
I invite you to discover these wonderful people. Speak about them. See the light in others and you will be stunned how this light comes back to you! Enjoy reading! Share! Learn!
40 under 40! Move to the Front Lines!
Editorial by Steve KING
Managing Director at CyberTheory
As the gap expands between supply and demand in cybersecurity skills, we now see over 70 online eLearning courses available that focus across a wide range of upskilling opportunities from data privacy to compliance to risk and vulnerability assessment and audit. As we celebrate our newest class of 40 under 40, we are optimistic that this generation of cybersecurity enthusiasts are interested in the actual battle zones upon which our current war is being fought and not on preparation for the administrative roles which are also necessary in battle, yet not feeling the pressure from the current skills gap.
In our work with our own eLearning platform, CyberEd.io, we have discovered that the key employment opportunities lie along the front lines of deployment, where trained cyber-warriors are so necessary not just to defend our critical assets but to serve as a deterrent to the flood of cyber-criminals assaulting our fortresses. Every CISO we talk to confirms this requirement with both anecdotal and empirical evidence that is leading to almost daily breaches across all industrial sectors with specific threats to banking, education, healthcare, military and industrial control systems in automated factories (OT).
The cyber-warrior education career path starts with a solid grasp of network engineering fundamentals, followed by security architecture & engineering with an emphasis on Cloud/SysOps/*nix (*Unix/Linux Linux, FreeBSD, and Mac OS X), ICS/IoT, identity access management, security assessment & testing, current threat profiles and malware infrastructure and architecture, vector identification, incident detection, security operations with forensics and incident handling, pen testing, and exploitation.
Without properly trained resources in advanced cyber-warfare, we will never prevail in our constant challenge to protect and defend, let alone being able to take the threat to the enemy. As more and more entry candidates choose training to prepare them for ...
Managing Startups in Times of Covid-19 WHU Incubator
Keynote by Dr. Marcus Erken, Founding Partner of Sunfish Partners on "Managing Startups in Times of Covid-19". Marcus presents how startups can make the most of the ongoing crisis and discusses layoffs, leadership, and the current fundraising landscape from his perspective as a VC.
Top Cyber News Magazine. Carmen Marsh
The technologies of tomorrow are at the heart of our daily life and work, touching all aspects of our lives in countless ways. Organizations and individuals that prioritize digital innovation are achieving remarkable results. The advancement of technologies has seen new digital highways emerge, and on these highways, we desperately need to foster greater cybersecurity. Digitalization and cybersecurity must evolve hand in hand.
Cybersecurity is becoming the most important security topic of the future. The threat landscape is changing constantly and, probably, by the time you have finished reading this article, a new vulnerability was discovered. It is for this reason that the foundation of knowledge and best strategies is so important, and the need for skilled cybersecurity professionals is more crucial than ever.
In cybersecurity, and in tech in general the need to gather diverse input and perspective to meet cyber-threats and technology road-blocks grows by the minute.
To close industry’s skills gap, to continue developing the world’s cyber workforce of the future, we must make cybersecurity education an integral part of our culture, taught and evangelized across genders, ages, and organizational sectors. For statistically, global shortages in talent affecting 82% of organizations.
Now is the time for women to step into emerging technologies and cybersecurity industries. Reskilling is a great issue. Inclusion is as important as innovation. We will have to go into learning mode, be willing to be taught.
Founded by Carmen Marsh, 100 Women in 100 Days Cybersecurity Career Accelerator creates more career pathways for women wanting to further build security expertise, advance their security knowledge or start a career in cybersecurity.
Talented and highly qualified technologist, born leader and role model, Mrs. Carmen March invests her passion, knowledge and faith to educate and mentor women in cybersecurity.
The brightest stars are those who shine for the benefit of others. Carmen Marsh is this star.
Marketing management case analysis of 'NIKE'. This PPT contains Nike's Acquisitions, Pros & cons and risk faced by NIKE and spokes persons of the NIKE. SWOT analysis of ADIDAS. Purely focused on Marketing Mix and SWOT analysis of NIKE and ADIDAS.
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStéphane Nappo
"One of the main Cyber risks is to think they don't exist. The other is to try to treat all risks".
Key cybersecurity quotes, key methodologies, and advanced risk management approches. Seeking for simplicity and efficiency in the complex realm... Do read.
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Group
Cybersecurity is a business critical risk not just an IT issue. The reputational damage of a cyber breach is often less than the technical damage inflicted, the money lost, or the regulatory fines. With new threats proliferating at startling speed how companies respond to an attack can be more important than the attack itself. The good news is that companies can seize this challenge to differentiate themselves from the competition and earn a greater level of trust from stakeholders.
Learn more about the four steps companies can take to build their reputational resilience to cyber attack.
In the Forefront Exemplary Leaders of the Business World.pdfCIO Look Magazine
This edition features a handful of The Exemplary Leaders of the Business World to Watch that are leading us to a better future
Read More: https://ciolook.com/in-the-forefront-exemplary-leaders-of-the-business-world-november2023/
Own Your Future!
“It is time for us all to stand and cheer for the doer, the achiever - the one who recognizes the challenges and does something about it.” Vince Lombardi
ONLY talents! NO ranking here!
With the global skills shortage, it is crucial to encourage talents who dedicate their life and career to cybersecurity.
This special edition spotlights remarkable cybersecurity and industry 4.0 professionals. Top Cyber News Magazine is pleased to unveil a constellation of young and devoted men and women: amabasadors, erudites, and influencers.
All, part and inspiring force behind the global Cybersecurity Awareness movement. These talented experts and brilliant people coming from nineteen countries and five continents.
I invite you to discover these wonderful people. Speak about them. See the light in others and you will be stunned how this light comes back to you! Enjoy reading! Share! Learn!
40 under 40! Move to the Front Lines!
Editorial by Steve KING
Managing Director at CyberTheory
As the gap expands between supply and demand in cybersecurity skills, we now see over 70 online eLearning courses available that focus across a wide range of upskilling opportunities from data privacy to compliance to risk and vulnerability assessment and audit. As we celebrate our newest class of 40 under 40, we are optimistic that this generation of cybersecurity enthusiasts are interested in the actual battle zones upon which our current war is being fought and not on preparation for the administrative roles which are also necessary in battle, yet not feeling the pressure from the current skills gap.
In our work with our own eLearning platform, CyberEd.io, we have discovered that the key employment opportunities lie along the front lines of deployment, where trained cyber-warriors are so necessary not just to defend our critical assets but to serve as a deterrent to the flood of cyber-criminals assaulting our fortresses. Every CISO we talk to confirms this requirement with both anecdotal and empirical evidence that is leading to almost daily breaches across all industrial sectors with specific threats to banking, education, healthcare, military and industrial control systems in automated factories (OT).
The cyber-warrior education career path starts with a solid grasp of network engineering fundamentals, followed by security architecture & engineering with an emphasis on Cloud/SysOps/*nix (*Unix/Linux Linux, FreeBSD, and Mac OS X), ICS/IoT, identity access management, security assessment & testing, current threat profiles and malware infrastructure and architecture, vector identification, incident detection, security operations with forensics and incident handling, pen testing, and exploitation.
Without properly trained resources in advanced cyber-warfare, we will never prevail in our constant challenge to protect and defend, let alone being able to take the threat to the enemy. As more and more entry candidates choose training to prepare them for ...
Managing Startups in Times of Covid-19 WHU Incubator
Keynote by Dr. Marcus Erken, Founding Partner of Sunfish Partners on "Managing Startups in Times of Covid-19". Marcus presents how startups can make the most of the ongoing crisis and discusses layoffs, leadership, and the current fundraising landscape from his perspective as a VC.
Top Cyber News Magazine. Carmen Marsh
The technologies of tomorrow are at the heart of our daily life and work, touching all aspects of our lives in countless ways. Organizations and individuals that prioritize digital innovation are achieving remarkable results. The advancement of technologies has seen new digital highways emerge, and on these highways, we desperately need to foster greater cybersecurity. Digitalization and cybersecurity must evolve hand in hand.
Cybersecurity is becoming the most important security topic of the future. The threat landscape is changing constantly and, probably, by the time you have finished reading this article, a new vulnerability was discovered. It is for this reason that the foundation of knowledge and best strategies is so important, and the need for skilled cybersecurity professionals is more crucial than ever.
In cybersecurity, and in tech in general the need to gather diverse input and perspective to meet cyber-threats and technology road-blocks grows by the minute.
To close industry’s skills gap, to continue developing the world’s cyber workforce of the future, we must make cybersecurity education an integral part of our culture, taught and evangelized across genders, ages, and organizational sectors. For statistically, global shortages in talent affecting 82% of organizations.
Now is the time for women to step into emerging technologies and cybersecurity industries. Reskilling is a great issue. Inclusion is as important as innovation. We will have to go into learning mode, be willing to be taught.
Founded by Carmen Marsh, 100 Women in 100 Days Cybersecurity Career Accelerator creates more career pathways for women wanting to further build security expertise, advance their security knowledge or start a career in cybersecurity.
Talented and highly qualified technologist, born leader and role model, Mrs. Carmen March invests her passion, knowledge and faith to educate and mentor women in cybersecurity.
The brightest stars are those who shine for the benefit of others. Carmen Marsh is this star.
LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docxsmile790243
LEE JACOB GARCIA
Hello Classmates,
1. Describe the framework for managing and leading a security force.
The framework for managing and leading a security force starts with the port managers and leaders. The key to establishing this framework within the port security organization is in how well the leadership develops the middle management function (Christopher, 2014). The best tool that may be utilized is the use of "middle-managers", middle-managers can be the "go to" individual where in fact, they become the liaison between the front line workers and upper management. When developing middle managers, senior leaderships must ensure they understand and have the full expectations of the Organization’s intent, mission, and goals, in order for middle managers filter this down to the operational levels, where the actual work of port security gets done. In the military, these positions are what we call Team Leaders, senior leaders mentor and develop Team Leaders in order for the team to achieve success with their everyday mission or goals. Team Leaders must understand the Organization’s intent, mission, goals, regulations, policies, and procedures in order to better guide their Soldiers. Team Leaders are the keen advocate for the Soldiers because they interact more with the Soldiers and guide them to ensure standards are being met. They achieve this through active engagement and constant evaluations of their work performance and their professional/personal development.
One of the main role of middle-manager is to ensure that issues from subordinates are brought up the chain of command and these middle-managers can solicit input from employees and act accordingly to ensure policy reflects the wishes of the employees. Employee input is crucial to make this type of work model productive. Leadership skills are then exercised and exploited by acting accordingly on these issues in their level, if issues are of higher concerns, this is when middle managers raises these issues to senior leaderships to get some answers.
2. What is meant by maintaining force competencies in port security?
Maintaining force competencies is for port security management to assess the level of competency of the security workforce. It is important that the port security management team maintain force competencies and asses if the workforce has adequate training required in order for them to do their job. Understanding the type of training required is crucial for port security management to know hence, security management would know what qualifications and training is needed.
Each training requirement and certifications may vary depending on the capacity of their job and expected to perform. The importance is to asses if the workforce are qualified to perform their duties as expected. Validation and assessment of training and certifications must be done frequently depending on what is established or outlined based on the Standard Operating Procedures ( ...
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
Discussion Questions
: “The difficulty in predicting the future is that the outcomes are unreliable, due to the occurrence of wild-card events that distort the relatively well-understand trends for the near to mid-future.” Offer an example of such a “wild-card” event and some ways in which the security professional might address it in an effective manner. Regarding the need for the security industry as a whole to maintain the professionalism and competencies needed to address emerging threats and hazards, what do you feel are its primary areas of weakness and what proposals could you offer to address them?
The Future of the Security
When considering what awaits the security profession in the years to come and those that will operate within it, developments and forecasts related to security science will in large part be impacted by what has occurred in the past and in present day. What
might
occur, what is most
plausible
and
feasible
given current and expected occurrences, and what has proven to be effective (or not) will all need to be considered in determining those issues that will remain relevant or change. So predicting the future (not in the form of Nostradamus or similar prophets) as it relates to security is a technique that considers probable or desirable outcomes in the face of known or anticipated risks. So given this backdrop, where is security heading?
Physical Security
As long as there are structures that people operate within and house various assets, there will continue to be a need to offer needed protection related to them. All of the topics discussed in this course related to walls, fencing, sensors, alarm systems, guards, locks, and other such issues will be needed in some form or fashion. Whether through manual or technological means, these will remain a constant for the security administrator in providing appropriate defensive measures for the material, tangible assets they oversee. Concerning technology, the same trend will continue in serving as a needed aid in providing security moving forward. Mobile devices of various types, functions, capabilities, and their ability to access data, the ever-increasing use of robotics and the functions they can carry out, sensors that will be able to gain more intelligence regarding detection, and high frequency security cameras that will have the capability to verify the chemical compound of an object at a distance are just some of the many technical innovations on the horizon. Yet, just as technology has taken on a greater role in providing these efforts, so too does technology represent ever-increasing concerns to the security manager.
Cyber Security
As society becomes connected on an ever-increasing basis, attention must be directed towards what implications this environment has related to not only security, but related privacy concerns as well. In
Future Scenarios and Challenges for Security and Privacy
(2016, Williams, Axon, Nurse, & Creese), the researchers took a ver.
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
20160224-AQ-ASI
1. Daallo Airlines
Bombing:
Somalia-based
al-Shabaab
targets aviation
ALSO:
SMART SECURITY
ADDRESSING THE INSIDER THREAT
THE SECURITY MANAUFACTURERS COALITION
SeMS
MAIN MEDIA SPONSOR TO:
THE GLOBAL JOURNAL OF AIRPORT & AIRLINE SECURITY
www.asi-mag.com
TERRORISM
AND TOURISM
28 20
SCREENING
LAPTOPS
FEBRUARY 2016 VOLUME 22 ISSUE 1
2. February 2016 Aviationsecurityinternational26 To subscribe www.asi-mag.com/subscribe
Security
Leadership
W
here did all the time go? This year marks a
significant milestone in my career and I really
didn’t see it coming. 2016 finds me looking back
on a 25-year career in security. I can hardly believe how
much time has passed since my manager at the International
Telecommunication Union, the UN agency where this
incredible journey began, asked me to “look after the security
stuff”. She was someone I neither had the desire nor the
courage to refuse, so I did as I was asked. Armed only with an
abundance of inexperience, naivety and a notebook, I set out
to find out what all this ‘security stuff’ was about and how I
might be able to ‘look after’ it. I had absolutely no idea what
was expected of me.
In the two and a half decades since, I still routinely
find myself at a loss on how to solve a particular
security problem. Armed perhaps with slightly more
experience and slightly less naivety today (but never
without the notebook!), I make no apology for not
knowing, immediately, how to answer a question or solve
a particular problem. I’ve come to rely heavily on the
advice and support of a great many people around the
world from whom I’ve learned so much and to whom I am
both indebted and forever grateful.
Many of them have become great friends. Many of them are
avid readers of Aviation Security International and I trust all
of them will know I’m writing about them today, confident in
the knowledge I would have struggled to achieve even half as
much without their help.
Looking forward to the next 25 years, I wonder what
challenges the next generation will face. And I worry about
how they might deal with those challenges. What support
will they have? Who will they go to for advice? What
experience will they have? Will their work in security still
be low-paid and under-valued? How will they lead their
organisations and how will they work across boundaries,
across government and industry, across geographies and
cultures to effect change and lead us forward to a better,
more secure future? I ask these questions because I
honestly don’t know. And not knowing those answers does
concern me.
So where are we today?
Organisations responsible for security are under immense
pressure and face a growing number of increasingly
complex threats. New causes are driving new actors to
exploit vulnerabilities and conduct attacks using entirely
new methods of operation. We are witnessing the crisis
of a generation on the borders of Europe as hundreds of
thousands flee war-ravaged countries and failed States,
who risk everything in pursuit of a better life, with many
losing them along the way.
These issues are compounded by the sheer number of
organisations responsible for security with new tools and
techniques demanding procedures be rethought, impacting
already strained operations.
So how can these organisations anticipate threats and still
shape the industry’s future direction?
The answer, I firmly believe, lies in leadership.
The Security Landscape
The security sector is in desperate need of leaders who can
learn lessons from the past, prepare for the future, understand
how they perform today and who are willing to become better
leaders for themselves and their organisations tomorrow.
The range of threats faced by government, the private
sector and the general public is increasing in both number
and complexity. Transportation systems, particularly civil
aviation, remain high value targets. Modus operandi have
changed fundamentally, as has the profile of those seeking
to carry out attacks. Against this backdrop, detection,
identification and data-mining technologies continue to
evolve, playing a vital role in shaping new security measures
and countermeasures.
Ultimately, whatever cause or ideology drives terrorism
and whatever laws and technologies are put in place to
mitigate these threats, security always comes down to people
– the hundreds of thousands of people who perform mission-
critical tasks at the front line every single day and the people
who lead and inspire them to perform to the absolute best of
their abilities.
Poverty of Leadership
In the 25 years of working in the sector, it is hard yet
necessary to admit that the security industry suffers from
a ‘poverty of leadership’. All too often, security staff are
under-valued and regarded as low-skilled workers; their
managers unaware of the leadership qualities they need;
and those leading the organisation not having the time
to evaluate how they lead or how to inspire the best from
their people.
Combined, these factors form a compelling case to
elevate the importance of leadership in security: to create
an environment for today’s leaders to see the system as a
whole, examine the global landscape, develop innovative
and holistic solutions, anticipate future trends and
provide strong direction that improves outcomes, activates
leadership in their teams, attracts and retains talent and
takes people with them.
AVSEC
OPINION
By Matthew Finn
“…the security sector is in
desperate need of leaders who
can learn lessons from the past,
prepare for the future, understand
how they perform today and
who are willing to become better
leaders for themselves and their
organisations tomorrow…”
3. February 2016 Aviationsecurityinternational www.asi-mag.com 27
Potential Barriers
The appetite for this type of examination may be muted for a
number of reasons. Some leaders may believe they can achieve
these outcomes through further training or participating in
industry conferences, or may feel uncomfortable with this
type of ‘deeper’ intervention. Indeed, that may be the very
reason it doesn’t currently exist.
My own experience has led me to conclude that the
majority of conferences, valuable in their own way, only offer
networking opportunities and a chance to listen to case studies
from a cohort of speakers, myself included, who are regular
features on the speaking circuit. For its part, training, whilst
important for more junior and middle leaders in providing
foundation knowledge and models for interpreting data,
routinely fails to deliver either the insight or the behavioural
change to develop people as leaders.
What could we achieve together?
I believe, with the right approach and the right people, we can
fundamentally change how our industry performs.
Together, we can collectively define and agree on the
purpose of security and develop a compelling collective
vision for the future – one that collaborates across imposed
boundaries of each individual State, policy responsibility,
organisation, department, private or public sector.
Together, we can share and learn lessons from the past,
examine the current context and prepare for the future.
Together, we can develop innovative strategies to tackle
the challenges leaders face. And, together, we can define the
leadership needed to tackle these challenges and give leaders
insight into their individual approaches and create a powerful
network among security leaders around the world.
Start the Conversation
If now is not the right time to do this, then when is? We can
of course continue to sit on the sidelines and opine how we
might have done things differently or better. And we can
continue to see problems in our industry yet fail to act upon
them. Or we could start a conversation. And from that
conversation, we can take action and effect vital, positive
change in security and put leadership at the top of our
agenda, become better leaders ourselves and create even
better leaders in those who follow in our footsteps.
This is the conversation I want to have with today’s
security leaders and hear, first hand, what their challenges
are and how, together, we might work to address them.
That’s why I’m investing in a forum to develop leadership in
security for those who feel the same way so we can explore
what we can achieve together. And I’m equally keen to hear
from those who hold a different view or who are developing
different ideas.
It’s about security. It’s about our industry. It’s about
leadership. And it’s about time we all stepped up. The people
who will be ‘looking after the security stuff’ for the next 25
years really need our help.
Matthew Finn is the Managing Director of AUGMENTIQ, an
independent consultancy practice specialising in aviation,
border and transportation security.
“…the security industry suffers
from a ‘poverty of leadership’…”