Insight Newsletter

Security Executive Council Insight
Our corporate security newsletter provides the strategic insight that helps security executives excel in their roles. Topics frequently covered include:
  • Security strategic planning
  • Risk assessment
  • Program best practices
  • Corporate security metrics
  • Career roadmaps
  • Communicating Security’s value
  • Advice from security leaders

By clicking on the link below and filling out the form on the following page you will be added to the newsletter.

You can easily remove your name from our mailing list at any time by clicking on the unsubscribe link at the bottom of the newsletters.
Subscribe to the Insight Newsletter

Most Popular Security Executive Council Insight Newsletter Resources for the Past Three Years


How to Quickly Show Stakeholders the State of the Security Program
Three security executives in three very different situations used the Security Success Foundation Assessment(TM) in their organizations to achieve positive internal and organizational results.

Security State of the Industry: Travel Security
New research report examines travel security program trends, risk factors, policy and program elements.

What Does the Board and Senior Management Need to Know About Corporate Security?
We asked our subject matter experts to share some lesser-known benefits of corporate security and examples of ways in which corporate security can evolve beyond the typical expectations for the function.

Interviewing Security Candidates in a Talent Shortage
When attrition is high nationwide, finding - and keeping - the right candidates for your core security team becomes an even greater challenge.

What Should Your Corporate Security Organizational Structure Look Like?
Unlike in some other business functions, there is no central standard that lays out a required or ideal organizational structure for corporate security.


Security Risk Assessment: What Not to Do
Research has led us to believe that a significant percentage of risk practitioners are conducting risk assessments that under perform.

COVID-19 Security Response Tactics and Strategies to Consider for Business Resumption Plans
Most organizations are focusing on what they need to do just to deal with temporary facility closures. But what measures should be considered when officials allow businesses to reopen or non-essential associates return to work?

Security Risk Assessment Success Factors
Recently several of our subject matter experts collaborated to develop the following list of security risk assessment success factors, based on their experience and our collective knowledge.

Ten Actions Highly Accomplished Security Leaders Take
For many years, the SEC has been collecting data on what separates standout leaders in security management from the others.

The State of Cyber and Corporate Security Cooperation
Security practitioners from both sides provided their insights regarding the state of cooperation between the security groups.


When Your Security Nightmare Comes True
If your worst-case scenario were to occur is your security program defensible? There are changes in case law all security practitioners should be aware of.

Twelve Indicators of Successful Security Programs
Over the last 15 years, the SEC has helped hundreds of security leaders guide their programs to the next level. Each organization's journey to security evolution is unique, but success often shares a series of common indicators.

How to Get the Traction Security Needs to Influence the Organization
We all have great ideas for improving security within our organizations. The tough part is getting executive management to listen.

Results: What is the Security Department's Biggest Challenge?
Leading a successful security program is a difficult task. Not only does the risk environment evolve but the organization's managing business leaders bring unique challenges to the job.

Transitioning from Risk Assessment to Plan
Conducting a security risk assessment is an essential first step in developing successful security programs. But what should the security practitioner do with the results?