Power to the People

To start the final day of GovSec 2012, former Sen. George Mitchell took the stage to provide the keynote for attendees of the conference and FOSE.

A capacity crowd heard what I would call wisdom of the ages.

I’ve met a lot of influential people in my day, and introducing the senator to the crowd is one of those cool moments in my life.

Mitchell, it would seem to me, is cool under fire and has a wealth of knowledge we all would be benefactors of hearing and listening to. He opened with a personal story about his older brothers, all of whom were tenacious and dominant athletes in their hometown of Maine. Mitchell, it would seem, was the kid brother.

Not so much today as the former leader of the House of Representatives also has served as a federal judge in his home state of Maine. His address was simple and packed with good advice. Security is a personal responsibility and a worldwide threat.

Mitchell served as a special envoy of the U.S. government for Middle East peace and shared several insights about the peace process. One of the problems, it would seem, is the former leaders with Palestinian interests were unsuccessful in establishing a separate and free state for the Palestinians is their lack, or lack of ability, to compromise.

No compromise, no peace.

The senator also related his experiences during the IRA revolution in Northern Ireland. He said it was the willingness of different faction leaders’ ability to lay their personal interests aside and negotiate for the betterment of the British Isles.

This, according to Mitchell, is the mark of a true politician -- to be able to express leadership through compromise. Mitchell said that is a problem in today’s political arena, the lack of leadership, and the stepped up visceral underpinnings of campaign tones and pointed political attacks.

The political process, Mitchell pointed out, has never been without disagreement and discontent, but politicians today seem to desire a public forum rather than compromise. Mitchell said even the Founding Fathers disagreed on political messages but their tactic to reconciliation was diplomacy.

The government security message echoed his words of wisdom: compromise in a political discussion and prove political leadership without slinging stinging barbs at your opponent.

Mitchell’s delivery and response was everything you hope it would be from a man of wisdom, thus having political undertones, but a message an audience rarely hears. His advise and years of experience spoke volumes of peace and civility.

About the Author

Ralph C. Jensen is the Publisher of Security Today magazine.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Securing the Flow of Operations

    The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3