Insight into Program Best Practices

We help clients with our collective expertise to advance security leader and program success. Find SEC insight, trends and perspectives on security program development or enhancement.

Filter by

Insight into Program Best Practices

SEC COVID Resources: 2020-2021

SEC-created pandemic‐related security checklists, visuals, research results, slide decks, guidance documents, and collective knowledge from 2020-2021.
Click for more details
Insight into Program Best Practices

Emerging Threats: How High-Performing GSOCs Are Adapting

Exploring the role of the GSOC in identifying and managing emergent threats, the power of executive influence, and more.
Click for more details
Insight into Program Best Practices

The State of Security Convergence

Are preconceptions about the convergence of corporate and cyber security accurate in practice?
Click for more details
Insight into Program Best Practices

Expected Employee Response to Mandatory COVID-19 Vaccinations

Fallout can be expected regardless of whether your organization requires vaccinations to return to work.
Click for more details
Insight into Program Best Practices

Security Barometer Results: Do Cyber and Corporate Security Work Together in Your Organization?

Both cyber/information security and corporate/physical security have roles to play in protecting and securing the organization.
Click for more details
Insight into Program Best Practices

Security Policies that Organizations Have in Place

This Security Barometer peer poll looked at what security policies organizations have in place and corporate security's responsibility.
Click for more details
Insight into Program Best Practices

SOC/GSOC Benchmark Survey Results

The following results are from the SEC’s GSOC Best Practices Group that brings together over 50 global organizations to share proven practices and develop program strategies.
Click for more details
Insight into Program Best Practices

The Top Action to Combat Insider Threat

Now perhaps more than ever, insiders both malicious and otherwise can wreak a significant amount of damage to organizations almost instantaneously.
Click for more details
Insight into Program Best Practices

Not Following Established Policy Tops List of Most Significant Threats to Information Protection

This early release summary of "Threats to Information Protection 2015" provides a glimpse into the results of extensive research performed by Kennesaw State University's Center for Information Security Education (CISE) in partnership with the SEC.
Click for more details
Insight into Program Best Practices

Which is the Most Popular Business Continuity Standard?


This Security Barometer quick poll explores what business continuity standards security leaders were using when developing their programs.
Click for more details