Leadership Solutions

glasses2_copy.jpg

Knowledge Corner - Security Programs

The Knowledge Corner offers many resources to help you manage risk. Explore the topics offered in the navigation bar or if you can't find what you're looking for, use Find it For Me!™

The icons shown adjacent to the titles of these resources provide information about sources.
  • blue icon = Tools, solutions, research and publications created by Security Executive Council
  • cyan icon = Materials created by Security Executive Council strategic alliance partners
  • green icon = Other material reviewed and deemed relevant to security and risk management executives by the Security Executive Council




Tools

   

Balancing Headcount, Budget, Workload and Prioritized Services: Analysis Spreadsheet & Presentation Samples This is Security Executive Council material  

Created By: Security Executive Council
The Council has helped many Tier 1 Leaders™ with determining security staff duty day-to-day tasks and time spent (resource analysis) and determining what are the most valued security services across the enterprise (value analysis), expanding services where critical and customer valuation of services. These are several tools contained in a workbook, developed to help members with this informative and proactive "reduction defense" exercise.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Board Level Risk Categories & Security Program Elements (v.4) This is Security Executive Council material  

Created By: The Security Executive Council
The Board Level Risk diagram is a conceptual image to convey your program in the language of the board when presenting to senior management. This image is frequently used to explain how security programs align with enterprise level risk concerns. It can also be used as an awareness tool. The categories of risk areas and security strategies and mitigation efforts were developed from on research of numerous companies' risk mitigation assessments.
     Click here to view a short video describing this resource in more detail.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Executive Protection: Templates This is Security Executive Council material  

Created By: Security Executive Council
This document contains templates that may be used in executive protection programs. Some of the topics include: risk assessment, security risk analysis, service delivery model, surveys for when executives or employees are traveling, attending an event and staying at a hotel.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Online Reputation Matrix This is Security Executive Council material  

Created By: Security Executive Council
This matrix lists some of the social media concerns that companies face and provides potential security strategies, including possible mitigation and remediation options. Use this matrix with key stakeholders to identify greatest social media risks to brand and personnel safety to the company.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Reduction in Force: Employee Layoff Letter This is Security Executive Council material  

Created By: Security Executive Council
This document provides one example of an employee layoff letter for companies to modify. The letter contains high level statements of why the layoff is happening, how many positions are being cut and a time frame for forthcoming separation and employee assistance.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Reduction in Force: Employee Layoff and Recall Policy  This is Security Executive Council material  

Created By: Security Executive Council
This document provides a sample of a layoff and recall policy for companies that must reduce employment because of adverse economic or other conditions. This document should be used or modified in accordance with specific company requirements.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Reduction in Force: Employee Termination Policy and Procedure This is Security Executive Council material  

Created By: Security Executive Council
This document is a sample policy and procedure meant to assist Security, Human Resources and other internal corporate groups in planning for employee terminations / reductions in the work force.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Reduction in Force: Termination and Change Responsibilities Policy This is Security Executive Council material  

Created By: Security Executive Council
This document is meant to provide an example policy to help companies ensure that employees and contingent workers exit an organization or change employment in an orderly manner. This includes the completion of access rights removal and return of company-owned assets.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Reduction in Force: Voluntary RIF Program Policy This is Security Executive Council material  

Created By: Security Executive Council
This document provides companies with a sample of a voluntary reduction in force program policy. The program policy is meant to set forth the framework under which employees can volunteer to be separated in order to save other employees from a reduction in work force.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Security Executive Council Collective Knowledge: Business Continuity Program V.3 This is Security Executive Council material  
Created By: Security Executive Council
This document is based on a presentation in response to new regulations and corporate scrutiny on business crisis management planning, as a result of national incidence, business reporting requirements and corporate and board level risk.
A Tier 1 Leader item available for purchase. Visit our store.
     Click here to view a short video describing this resource in more detail.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Security Executive Council Collective Knowledge: Comprehensive Security Program V.3 This is Security Executive Council material  

Created By: The Security Executive Council
A presentation used as a benchmark security programs or to educate senior management (or new leadership) on program status or future direction. Showing senior management the security function is operating in similar fashion as other well established functions (e.g., finance or marketing) will go a long way.
     Click here to view a short video describing this resource in more detail.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Security Executive Council Custom Research: Business Conduct and Ethics Historical, Current and Future of Programs V.1  This is Security Executive Council material  

Created By: The Security Executive Council
This presentation may be used for developing an enterprise-wide business conduct and ethics program and to demonstrate what has been the typical program focus and characteristics, emerging trends and current practices. The research and trending information can be used as options for a company to make decisions as to the best model that works for their business strategy and goals.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   The Manager's Handbook for Business Security, 2nd Edition This is Security Executive Council material  
Created By: Security Executive Council
This book and accompanying CD have been developed to provide a series of short subjects on risk mitigation essentials. It was designed to save you time when enhancing or developing risk management programs. Included are actual program elements, documentation, examples, templates, outlines, presentations, tips and more.

This resource is a compilation of elements that should be in place to constitute the “baseline” of a security program (industry neutral). Practitioners, Council faculty and staff provided input on what they found to be the most critical elements of a successful program. Also incorporated are key materials from Council projects and deliverables. This guide is useful when creating a new program or validating an existing program to identify missing elements or other ways to approach an issue. It is also valuable as a check as to whether your programs are adding business value.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
   

Workplace Violence Case Management Flowchart This is Security Executive Council material  

Created By: Security Executive Council
This document is meant to provide a sample of how a workplace violence case may be processed and charted. It includes process information such as: Who reported the incident, who the incident was reported to, case management and strategy response.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
    Workplace Violence Continuum This is Security Executive Council material  
Created By: Security Executive Council
This workplace violence continuum is a graphic overview of a comprehensive workplace violence (mitigation) program. It depicts the stages and elements from the proactive to responsive and business continuity after an event has occurred. It provides the essential elements that can be modified and adapted to fit your business structure.
Click to download PDF file
853KB
   

Workplace Violence Intake This is Security Executive Council material  

Created By: Security Executive Council
This document provides a sample template to help customize the intake and assessment process of managing potential workplace violence cases in order best track and document the possible series of events.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Workplace Violence Issue Overview This is Security Executive Council material  

Created By: Security Executive Council
This document is meant as a sample workplace violence (WPV) issues template providing examples of types of violence, response options and common types of offenders for companies to use in conjunction with a holistic WPV program.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Workplace Violence Process Overview This is Security Executive Council material  

Created By: Security Executive Council
This document provides a sample workplace violence process template for customization, including protocols for intake, assessment, consultation and response planning.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Workplace Violence Team Roles This is Security Executive Council material  

Created By: Security Executive Council
This document provides a sample of workplace violence organizational cross-functional team roles such as corporate security, legal, human resources, safety and employee assistance programs, for risk response and assessing a company's available incident resources.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Workplace Violence: At-Risk Personnel Security This is Security Executive Council material  

Created By: Security Executive Council
This chart outlines criteria for assigning security levels and assessing risk for at-risk personnel from the CEO and board members to employees, for events and situations like meetings and travel.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only

Research & Benchmarks

   14 Effective Solutions for Creating Successful Security Programs This is Security Executive Council material  
Created By: Security Executive Council
This paper highlights brief case studies that depict solutions using Security Executive Council tools and processes. These are based on what the SEC has gleaned in the last 10 years working with security practitioners. At the end of the document don't miss 10 Tips You Can Learn from our Experience with Successful Programs.
 
   Assessment Quiz: Organizational Readiness for Security This is Security Executive Council material  
Created By: By: Security Executive Council
The Council has spent years researching this topic and has found that understanding what management thinks Security "is" and "does" is critical. You need to know how management perceives Security in order to educate them on the reality - and to get appropriate buy-in for resource requests or advancement of your goals.
 
   Background Investigations Benchmark - Exclusive Preliminary Results This is Security Executive Council material  
Created By: Security Executive Council
A preliminary summary of the SEC benchmark on background investigations has been just published. The information gathered in the research can be used to compare against your background investigations program, identify areas where improvement is possible and generate ideas. It provides a preliminary look into some of the results that have been gathered to date from this valuable benchmark research. For example: While all the participating organizations conducted background investigations on employees, over 50% of them also had their vendors undergo checks.
 
   Case Study: Risk Management and Security Metrics at Boeing This is Security Executive Council material  
Created By: Greg Niehaus, Security Executive Council Board of Visionary Leaders; Professor of Insurance and Finance, University of South Carolina
Here is an opportunity to get the inside story on building a superior metrics program for a world class enterprise security program. This first ever business case study focusing on security risk is being used at South Carolina's Darla Moore School of Business to introduce students to the security metrics program that is used by Boeing to improve decision making. It also provides insight into their workplace violence program.
 
   Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark This is Security Executive Council material  
Created By: The Security Leadership Research Institute
The Security Leadership Research Institute (SLRI) has published ground breaking results of their Corporate Security Organizational Structure, Cost of Services and Staffing survey. The full report covers such metrics as security budgets, staffing, program drivers, governance and oversight. This executive summary provides a glimpse into some of what is contained in the full report. If you participate in the SLRI surveys you can receive the next edition of the full report. For more information about SLRI click here
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Defining the Total Cost of Security: Programs and Services Survey Showing Interesting Security Program Results This is Security Executive Council material  
Created By: Security Executive Council
Selected preliminary analysis from our ground breaking research initiative is shown below. This represents only a small portion of the information being collected. You can expect much more in-depth analysis once the data collection phase of the process has concluded.
 
   Driving Excellence in Enterprise Security  This is Security Executive Council material  
Created By: George Campbell, Security Executive Council Emeritus Faculty
This paper provides a starting place for security leaders who are interested in operational excellence or are considering applying it within their programs. It includes: Range of approaches gathered from discussions with a number of Tier 1 Leaders™; insight into how to achieve a critical baseline assessment of security’s value; potential measures of excellence in security programs; and a template to help investigate and identify initial targets for application of operational excellence.
 
   Five Factors that are Key to Your Success This is Security Executive Council material  
Created By: Security Executive Council
Over ten years in the business of assisting security executives advance their programs and careers has provided the SEC with unique insight into what makes security initiatives successful. Our research has identified a few critical factors that play a significant role and understanding how these factors interact and affect security initiatives will lead you to better results on your projects.
 
   Global Security Operations Center Best Practices Survey Results This is Security Executive Council material  
Created By: Security Executive Council
The SEC conducted a survey within its GSOC Best Practices Working Group investigating such topics staffing structures, services provided, geographic scope, budget ownership, incident dispatch, location selection, alarm system management, and performance measures. The full report was distrbuted to members of the SEC GSOC working group.
 
   

International Security Programs Benchmark Report This is Security Executive Council material  

Created By: Security Executive Council
This is the full report that Security Executive Council Tier 1 Leaders™ and participants receive. This project began as a Tier 1 Leader™ driven strategic initiative to ascertain the what and how of international security programs. Based on in-depth Tier 1 Leader™ interviews earlier in the project, it became clear research was necessary to fully grasp the breadth and scope of programs currently in place and any differentiators. This is the first of three projected reports from this data.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
     Click here to view a short video describing this resource in more detail.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Investigative Confusion - Who Owns Investigations? This is Security Executive Council material  
Created By: Security Executive Council
Some organizations spread responsibility and ownership for different types of investigations among their business functions. Whether you want to bring investigations in under your department or just help eliminate investigative confusion this paper will help you get started.
 
   

Proven Solution Innovation Case Study: Persistent Background Screening Improves Compliance and Exception Reporting This is Security Executive Council material  

Created By: Security Executive Council
This Solution Innovation Case Study offers a proven process approach for mitigating risk(s) that could result in injury or impairment of people, assets, critical processes, products and/or brand reputation.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Security Barometer Results: Centralized Risk Repository This is Security Executive Council material  
A centralized repository of risks provides a robust foundation for an effective risk management program. While 90% of respondents felt a central repository was valuable less than half had one. See more about results of our poll here.
 
   Security Barometer Results: Security Program Maturity Models This is Security Executive Council material  
Created By: Security Executive Council
Maturity models are a framework that can be used to benchmark processes and procedures against clearly defined best practices. This Security Barometer quick poll asked security practitioners to self-assess their security programs using the framework created by the Software Engineering Institute at Carnegie Mellon University.
 
   

Security Budget Research Report This is Security Executive Council material  

Created By: The Security Executive Council
This is an analysis of data collected from survey of security program budgets that was conducted by the Council January 2009. This report, available to Council members, provides detailed information on the changes in budgets over the past two fiscal years segmented by industry as well as budget category. In addition the report provides a list of some of the creative efforts that security executives are undertaking to counter the effects the economy is having on their security programs.
     Click here to view a short video describing this resource in more detail.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Security Budget Research Report: Impact of the Economic Downturn
Executive Summary This is Security Executive Council material  

An executive summary of the results of a survey was sent to qualified security practitioners (over 85% at the director level or above) to gather information on the state of their security budgets and to assess any impact the economic downturn has had on their programs.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Security Measures and Metrics This is Security Executive Council material  
Created By: Security Executive Council
Are you trying to benchmark any of these programs? Background screening, Guard force, Investigations, IT security, Physical security, Workplace violence, Other security programs…

Are you often asked to calculate the cost of security? Get access to this information by joining the Security Leadership Research Institute. It is free to join; all it takes is a small amount of your time.

 
    Solution Innovation Case Study: Harnessing the Power of Social Media through Intelligence Analysis and Next-Gen Technology This is Security Executive Council material  
Created By: Security Executive Council
This Solution Innovation Case Study offers a proven process approach for mitigating risk(s) that could result in injury or impairment of people, assets, critical processes, products and/or brand reputation. This proof point examines representative risk issues, mitigations and result outcomes as validated by the Security Executive Council and the end- user.
Click to download PDF file
194KB
    Solution Innovation Case Study: Persistent, Real Time Criminal Activity Checks with Past Review Reduces Insider Threat This is Security Executive Council material  
Created By: Security Executive Council
This Solution Innovation Case Study offers a proven process approach for mitigating risk(s) that could result in injury or impairment of people, assets, critical processes, products and/or brand reputation. This proof point examines representative risk issues, mitigations and result outcomes as validated by the SEC and the end-user.
Click to download PDF file
208KB
   The Biggest Challenge to the Success of Security Programs This is Security Executive Council material  
Created By: Security Executive Council
This Security Barometer offered a tough question to answer. There are many possible challenges to the success of security programs but in this security barometer the respondents had to choose the single one they felt was the most significant.
 
   The Roadmap for Security Leadership Success This is Security Executive Council material  
Created By: Security Executive Council
This thought leader paper and series of podcasts is the result of ten years worth of working with security practitioners. Our research identified 10 common practices that highly accomplished security leaders exhibit. Also, listen to SEC subject matter experts provide their thoughts on executing the 10 practices.
 
   The Top Action to Combat Insider Threat This is Security Executive Council material  
Created By: Security Executive Council
How Many Organizations Have A Formal Insider Threat Program? What was voted the most important action to combat insider threat? This SEC Security Barometer polled security practitioners to answer to these and more questions on insider threats. Insiders, malicious or not, are frequently cited as one of the top risks to organizations. This poll reveals some interesting observations from your peers.
 
   The Top Security Risk Organizations are Facing Today? This is Security Executive Council material  
Created By: Security Executive Council
Here are the results from our latest Security Barometer quick poll of security practitioners. The top two risks look similar to last year but there has been an interesting shake up within the list you might be interested in knowing about.
 
   Top Security Risk to Organizations Today - 2015 This is Security Executive Council material  
Created By: Security Executive Council
Results of this Security Barometer peer quick pool show Cyber Crime followed by Insider Threat were the top two most selected responses. See the rest of the threats in order of top concerns and the comparisons of poll answers over the years.
 
   Trend Research: Bring Your Own Device (BYOD) To Work This is Security Executive Council material  
Created By: Security Executive Council
This resource was developed based on a Tier 1 Leader and their IT colleague looking at productivity around the topic of BYOD to work (e.g., if I had my own phone or computer (e.g., Apple brand device) I could increase my productivity.) The research was then expanded to include further information on what peer corporations are doing in this area (e.g., pros, cons, must haves, challenges, risks and liabilities).
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   What Are Your Peers Working On? This is Security Executive Council material  
Created By: Security Executive Council
Here is a short excerpt of some of the projects the SEC has been working on for your peers. Give it a quick scan and compare it with what you are doing in your organization.
 
   Who Owns Investigations? This is Security Executive Council material  
Created By: Security Executive Council
If you are like many organizations there are probably some types of investigations where two or more business units claim to own or lead. This is what we call "investigative confusion". If you want to bring investigations under your department or just want to address investigative confusion this paper will help you get started.
 

Presentation Materials

   Aligning Security Services with Business Objectives: The Security Director’s Template  This is Security Executive Council material  
Created By: Richard A. Lefler, Security Executive Council Emeritus Faculty
This comprehensive slide presentation was developed to immediately utilize within your company in order to be more successful and provide a higher level of security leadership to the corporation. This presentation was created by a former CSO to use when promoting Security's value to senior management. The main objective of such a presentation is to demonstrate how Security's strategy and services support business goals. Coaching notes are provided in PowerPoint "View > Notes."
A Tier 1 Leader item available for purchase. Visit our store.
     Click here to view a short video describing this resource in more detail.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Bringing a Corporate Security Culture to Life  This is Security Executive Council material  
Created By: Peter Cheviot, Security Executive Council Emeritus Faculty
In Bringing a Corporate Security Culture to Life, presenter Peter Cheviot, former vice president of corporate security for BAX Global Inc., discusses how to build and maintain a corporate security culture that encourages company employees to take ownership of security and facilitates communication. In this 18-minute video presentation of narrated slides, the concept of "security culture" is defined, and Cheviot explains how it can improve the effectiveness of security and risk management programs.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Developing a Comprehensive Security Program This is Security Executive Council material  
Created By: Bob Hayes, Kathleen Kotwica and Elizabeth Lancaster, Security Executive Council Staff
Developing a Comprehensive Security Program answers the question common among security managers, "What is a model security program, and how does our program compare to it?" In this seven-minute Proven Practices presentation, narrator Elizabeth Lancaster outlines the baseline elements of a security program, which have been defined by experienced Security Executive Council members and research.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Domestic Violence Spills Over into the Workplace This is Security Executive Council material  
Created By: Rosalind W. Jackson, Security Executive Council Staff Member
Problems associated with domestic violence frequently spill over into the workplace. This presentation discusses ways to assess the danger, help the survivor and keep the workplace safe. Issues such as the signs and types of abuse, developing and communicating a domestic violence policy, the cycle of violence, the cost of domestic violence to employers, developing a safety plan for survivors are addressed.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Establishing the Value of All-Hazards Risk Mitigation This is Security Executive Council material  
Created By: Francis D’Addario, Security Executive Council CSO Emeritus
This presentation is a value-added proposition for any leader who will require cross-functional engagement and support to meet the current and evolving risk requirements of their organization. This is a people-centric, data-qualified, and culturally-relevant approach to enterprise risk mitigation that has served Starbucks Coffee, Hardees Food Systems, Jerrico Inc. and the Southland Corporation. You will learn the art of influencing return-on-investment capable asset protection and many resources may be taken home to be used broadly by a diverse constituency of internal and external clients.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection in the Corporate World  This is Security Executive Council material  
Created By: Jerry Miller and Radford Jones, Security Executive Council Emeritus Faculty
Protecting people in the Corporate World can under certain circumstances require the protection of executives, employees and their families, contractors, visitors and even customers. “Personnel Protection” is a presentation that consists of 11 modules that cover: the Corporate World, Vehicle Operations and Security, Concepts of Executive Security, Threat Assessment, Executive Security Protection, Executive Compensation/Fringe Benefits, Advance Procedures, Executive Worksite Security, Residential Security, Aircraft Security and Kidnapping/Issues and Policies. This series may be viewed in its entirety or on a particular module of interest. The entire presentation includes over 200 slides on the listed topics. TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com.
 
   Personnel Protection: Advance Procedures, 1st Edition This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
Personnel Protection: Advance Procedures discusses the concept of the security advance, which is any activity, planning, or security arrangement made in advance of an executive visit. This 34-minute video presentation of narrated slides explains how security practitioners can mitigate risk to the executive by identifying potential risks before a visit, and includes guidelines for each area of the location that needs to be surveyed and closely monitored.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection: Aircraft Security, 1st Edition This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
Personnel Protection: Aircraft Security describes how, in conjunction with the aircraft operations team, the security team must be equipped mitigate aircraft risks. This 13-minute video presentation of narrated slides provides strategies for preparing for unintentional and intentional threats to aircraft security, which could take the form of, for example, the unintentional release of an executive’s flight times or the planned sabotage of aircraft equipment.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection: Executive Compensation and Fringe Benefits This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
According to IRS code, any property or service that an executive receives in lieu of or in addition to regular taxable wages is a fringe benefit that may be subject to taxation. There are exceptions to this rule, however, which may include security services provided. In Personnel Protection: Executive Compensation and Fringe Benefits, the factors necessary to exclude security-related expenses from the executive’s taxable gross income are defined, and the benefits to both the executive and the company are discussed.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection: Executive Worksite Security, 1st Edition This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
In Personnel Protection: Executive Worksite Security, presenters Jerome Miller and Radford Jones discuss the potential security risks to executives while at the office and en route to the office. This seven-minute presentation of narrated slides includes recommendations for controlling access to areas of particular concern, such as installing fencing, monitoring the premises using a closed-circuit television (CCTV) system, conducting visitor screening, and installing bullet-resistant glass doors and duress alarms.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection: Kidnapping Issues and Policies This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
In Personnel Protection: Kidnapping Issues and Policies, presenters Jerome Miller and Radford Jones discuss the issue of kidnapping as it relates to an executive security program. It covers the risks for kidnapping of the executive or executive’s family members, along with strategies for creating a sound corporate kidnapping policy. The presenters also discuss what kind of response the organization should make during a kidnapping, as the first hours immediately following are always critical to a successful resolution.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection: Residential Security This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
Executive protection doesn’t end when the executive leaves the office. In Personnel Protection: Residential Security, presenters Jerome Miller and Radford Jones discuss the components of a residential security system. Topics in this 10-minute video presentation of narrated slides include home security and fire alarm systems, safe rooms, personalizing the security program to involve the executive and his or her family, and special considerations for when the residence is a large, wooded, or walled estate. The presenters emphasize the rings of security concept, with each ring designed to detect or deter an attacker.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection: Security Personnel, 1st Edition This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
In Personnel Protection: Security Personnel presenters Jerome Miller and Radford Jones discuss the critically important task of selecting and training security personnel for executive protection duties. In this seven-minute video presentation of narrated slides, the topics covered include a comparison of contracted and proprietary personnel, the pros and cons of armed versus unarmed personnel, the characteristics of the ideal security person, and the training requirements for hired security personnel.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection: Threat Assessment Profile This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
In Personnel Protection: Threat Assessment Profile, presenters Jerome Miller and Radford Jones discuss the threat assessment profile as the basis for determining the need for an executive security program. This 12-minute video presentation of narrated slides covers the range of threats to consider, the executive’s public exposure and any history of threats, local safety issues, and business travel. The presenters emphasize the need for keeping an up-to-date executive dossier containing his or her personal information, in case there is a kidnapping situation.
Tier 1 Leaders: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personnel Protection: Vehicle Operations and Safety This is Security Executive Council material  
Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty
Because a business executive typically spends a considerable amount of time travelling by vehicle, the greatest risk of injury or death to the executive is by vehicle accident or attack while in the vehicle. In Personnel Protection: Vehicle Operations and Safety, presenters Jerome Miller and Radford Jones discuss the basic security principles of executive driver safety and training. This 20-minute video presentation of narrated slides covers the challenges the executive driver may face, how and why to vary routes, schedules, and vehicles, and the characteristics of a qualified executive driver.
Tier 1 Leaders: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Preventing Workplace Violence: A Training Guide for Managers and Supervisors This is Security Executive Council material  
Created By: Rosalind Jackson, Security Executive Council Staff Member
In Preventing Workplace Violence: A Training Guide for Managers and Supervisors, presenter Rosalind W. Jackson provides the fundamentals of workplace violence prevention, including initial program development. This presentation explains the components needed to develop a good baseline program, and focuses on recognizing patterns of unacceptable behavior. It addresses policy development and expert consultation considerations, along with the use of education and team coordination. The presentation also includes a sample workplace violence policy statement, and discusses the impact of workplace violence on the business.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only

Books/Guidelines/Manuals

   Business Continuity Playbook This is Security Executive Council material  
Created By: Dean Correia, Contributing Editor
Business continuity planning identifies an organization’s exposure to various risks while bringing together various resources in order to provide effective assessment, preparedness, response, and recovery from these risks negatively impacting the organization. Business continuity planning is an ongoing strategic practice governing how business is conducted.

This Playbook is meant to serve as a framework to help security leaders build a business continuity program from the ground up or enhance the program that is currently in existence. The materials have been compiled using various accredited sources, international standards, and the collective knowledge of the Security Executive Council and its subject matter experts, which represents decades of experience managing business continuity programs. The Playbook is adaptable to companies of all sizes from all industries.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Compliance Response to Misconduct Allegations This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Emeritus Faculty
This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Dealing with Activists and Protest Groups: Protecting Your Business Against Public Disorder This is Security Executive Council material  

Created By: Security Executive Council
This is supplemental material relating to the Knowledge Exchange concerns dealing with activists and protest groups.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Global Security Survival Guide (Version 1)  This is Security Executive Council material  

Created By: Security Executive Council
This guide was created to supplement security orientation training for General Managers located around the world.
     Click here to view a short video describing this resource in more detail.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   How to Develop and Implement a Security Master Plan This is Security Executive Council material  
Created By: Timothy D. Giles
Here is a practical guide which details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization’s particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com.
 
   IT Security Response to Misconduct Allegations This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Emeritus Faculty
This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators.
A Tier 1 Leader item available for purchase. Visit our store.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Personal Safety and Security Playbook This is Security Executive Council material  
Created By: Francis D’Addario, Contributing Editor, Security Executive Council Emeritus Faculty
The Personal Safety and Security Playbook is designed for anyone who may benefit from shared community safety and security responsibilities. Chapters are organized by areas of concern, from personal risk awareness to protection and security considerations for family, home, travel, and work. The guidelines included help the reader recognize personal safety and security hazards, take proactive prevention steps, and react reasonably to danger with beneficial outcomes.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Personal Security Guidelines This is Security Executive Council material  

Created By: Security Executive Council
Creating guidelines for dealing effectively with security risks involves a considerable amount of work and cost. The Security Executive Council’s goal in providing this guideline is to offer a template for you to use to start filling in the pieces of prevention strategies that work for your organization. TIER 1 LEADERS: To obtain your complimentary copy send an e-mail to contact@secleader.com.
 
   

Physical Security Guidelines This is Security Executive Council material  

Created By: Security Executive Council
Creating guidelines for dealing effectively with security risks involves a considerable amount of work and cost. The Security Executive Council’s goal in providing this guideline is to offer a template for you to use to start filling in the pieces of prevention strategies that work for your organization. TIER 1 LEADERS: To obtain your complimentary copy send an e-mail to contact@secleader.com.
 
    Reductions in Force/Lay-Offs Guidelines This is Security Executive Council material  
Created By: Kenneth Kasten, Security Executive Council Emeritus Faculty
There are more employment reductions in force in today’s business world than ever before, thus enhancing the opportunity for a potential security issue to surface during an involuntary separation of employment. This checklist/guideline addresses employment separations - both involuntary and voluntary – that can help you to consistently and appropriately address security issues and concerns generally associated with these types of events.
Registration required for download
REGISTRATION
REQUIRED
    Reporting Guidelines (sample) This is Security Executive Council material  
Created By: Security Executive Council
Sample reporting guideline for employees includes examples of what to report and how to report.
Click to download PDF file
56KB
   Response to Misconduct Allegations Series This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Emeritus Faculty
This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who is tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators. TIER 1 LEADERS:To obtain your complimentary copy send an e-mail to contact@secleader.com.
     Click here to view a short video describing this resource in more detail.
   

Searches and Inspections Guidelines This is Security Executive Council material  

Created By: Security Executive Council
Creating guidelines for dealing effectively with security risks involves a considerable amount of work and cost. The Security Executive Council’s goal in providing this guideline is to offer a template for you to use to start filling in the pieces of prevention strategies that work for your organization. TIER 1 LEADERS: To obtain your complimentary copy send an e-mail to contact@secleader.com.
 
   Security Technology Convergence Insights This is Security Executive Council material  
Created By: Ray Bernard, Security Executive Council Subject Matter Expert Faculty
Security technology convergence refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   The Business Response to Misconduct Allegations This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Content Expert Faculty
The Business Response to Misconduct Allegations playbook, third edition, has been created for business professionals who are the first to be contacted during a suspected employee-related claim and who may not have had investigative training. It is a step-by-step guide of what to do—and, perhaps more importantly, what not to do—in laying the groundwork of an investigation. Sections of this playbook discuss considerations when deciding whether to investigate, preliminary issues, naming investigators, investigative planning, interview techniques and issues, the importance of taking notes and written statements, and much more.
TIER 1 LEADERS: Log-in to obtain your copy. OTHER VISITORS: Click the title to order this SEC resource.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   The Facilities & Building Management Response to Misconduct Allegations This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Emeritus Faculty
This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators.
A Tier 1 Leader item available for purchase. Visit our store.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   The Human Resources Response to Misconduct Allegations This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Emeritus Faculty
This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators.
A Tier 1 Leader item available for purchase. Visit our store.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Workplace Security Playbook: The New Manager's Guide to Security Risk This is Security Executive Council material  
Created By: Security Executive Council
Creating guidelines for dealing effectively with security risks involves a considerable amount of work and cost. The Security Executive Council’s goal in providing this guideline is to offer a template for you to use to start filling in the pieces of prevention strategies that work for your organization. TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
     Click here to view a short video describing this resource in more detail.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only

Articles

    "Management by Walking Around" Gets You Ready for a Crisis This is Security Executive Council material  
Created By: Rad Jones, SEC emeritus faculty
A chief security officer has to nurture, cultivate and respect relationships with internal and external partners who are essential to resolving a critical incident. One way to do so is to simply walk around.
Click to download PDF file
337KB
    2011 Annual Report for the Security Executive Council  This is Security Executive Council material  
Created By: Security Executive Council
This year's report covers activities, initiatives and resources in a three page condensed document. The information may be used to learn the kinds of support the SEC can offer you as well as a glimpse into what its members are tackling.
Click to download PDF file
745KB
    Benchmarking Guidance for CSOs This is Security Executive Council material  
Created By: ASIS
An interview and coverage of the Council's International Security Programs Benchmark Report.
Click to download PDF file
319KB
    Comcast Center Sets a New Standard  This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
SEC member Mark Farrell helped Philadelphia's new Comcast Center showcase a unique commitment to service-oriented security. From the July 2008 issue of ST&D magazine.
Click to download PDF file
331KB
    Convergence and Layers of Security  This is Security Executive Council material  
Created By: Ray Bernard, Security Executive Council Subject Matter Expert Faculty
Q: Does security technology convergence mean that I need to be thinking differently about how I use technology? Although the quick answer is Yes, thinking differently doesn’t mean throwing away the perspectives about protective measures that have been effective in the past. Although security technology has changed significantly over the past decade, many traditional security perspectives have not changed. One such perspective is Layered Security.
Click to download PDF file
358KB
    Converging Risk Assessments This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
Security Executive Council member John McClurg discusses how a converged risk assessment presents the interdependence between physical and cyber vulnerability. From the August 2008 issue of Network-Centric Security.
Click to download PDF file
315KB
    Cutting to the Chase: New developments are paving the way for the value-focused  This is Security Executive Council material  
Created By: Bob Hayes, Managing Director, Kathleen Kotwica, Security Executive Council Bob Hayes, Managing Director, Kathleen Kotwica, Security Executive Council
Wouldn’t it be remarkable if cameras, access control systems and network monitoring software came with value statements that would allow CSOs to see at a glance what these products can really do for them?
Click to download PDF file
337KB
    Determining Operations Excellence in Security This is Security Executive Council material  
Created By: George Campbell, Emeritus Faculty, Security Executive Council
Since the 1980s, businesses have developed formal ways of gauging, monitoring and pursuing excellence in manufacturing and operations, including the disciplines of Six Sigma, Kaizen, Operations Excellence and Total Quality Management. Delivering excellence in products and services is a common-sense, accepted business objective. But what is “excellence” in security?
Click to download PDF file
325KB
    Extreme security program makeover  This is Security Executive Council material  
Created By: Karl Perman and Marleah Blades, Security Executive Council Staff
Companies are always interested in saving money, but in our economic climate, more of them are trying anything and everything to raise their bottom line. Some are undergoing massive corporate restructuring, some are firing and hiring, and many are asking individual business units to make do with less. These types of situations often call for the re-engineering or from-scratch development of a security program.
Click to download PDF file
484KB
   Global Survey of Workplace Hotline Reports Shows Significant Improvements in Some Key Industries – Data Obtained from 650 Companies This is Security Executive Council material  
Created By: Security Executive Council
The Security Executive Council's 2007 Corporate Governance and Compliance Hotline Benchmarking Report provides a key set of benchmark data for corporations in 10 industries.
 
    Helping to Ensure Your Supply Chain is Adequately Protected This is Security Executive Council material  
Created By: Security Executive Council Staff
Security professionals offer solutions for safeguarding your supply chain in the post-9/11 world.
Click to download PDF file
215KB
   How Does Your Insider Threat Compare?
A short evaluation of your insider threat vulnerability
 This is Security Executive Council material  
Created By: Bob Hayes, Managing Director and Kathleen Kotwica, Ph.D., EVP and Chief Knowledge Strategist, Security Executive Council
Based on numerous conversations with Fortune 500 corporate security practitioners the SEC has created the following definition of insider threat that covers the issues being identified within these businesses.
 
    How to Plan an Investigation This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Content Expert Faculty
A primer to help non-security personnel conduct effective investigations.
Click to download PDF file
339KB
    Include The People Factor in Supply Chain Security This is Security Executive Council material  
Created By: Sean Detloff, SEC Tier 1 Leader
Rather than antagonizing business processes, security initiatives should link to corporate-wide social responsibility philosophies. From the September 2007 issue of AC&SS magazine.
Click to download PDF file
306KB
    Insider Threat  This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
Each new study that is released further confirms that the malicious insider continues to pose a major threat to organizations in both the public and the private sectors. While many of us tend to reflexively think of this insider as a disgruntled IT worker who knows how to access and change system data, the reality is that the insider can act in a variety of ways by a variety of methods to harm the organization, and he or she could be anyone. It is true that cyber attacks are a popular way for insiders to commit crimes, simply because so much business in the public and private sectors is done electronically, and because even non-technical employees - particularly in the younger generations - are more technologically savvy than they have been in the past. But focusing protection efforts on cyber controls alone is a mistake.
Click to download PDF file
744KB
    Is ERM leaving security behind? This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
Ideally, enterprise risk management (ERM) is a top-down, formal framework for identifying, prioritizing, analyzing, monitoring and managing all types of risk that an enterprise faces. It provides solid guidance for executive decision-making. It is headed by the strong leadership of a B-level or C-level officer and it enjoys the enthusiasm and involvement of the board and the entire executive team. It is founded on a clear articulation of the company’s risk appetite — aligned with business goals — that is communicated to employees at all levels. It is supported by a cross-functional management and advisory team that shares information about business unit risk.
Click to download PDF file
654KB
    Lean Security This is Security Executive Council material  
Created By: Ray Bernard, Security Executive Council Subject Matter Expert Faculty; Lynn Mattice; Derrick Wright, Security Executive Council Tier 1 Leader
Lean principles contain perspectives and tools that can be of tremendous use in increasing the value that security managers and executives provide to their organizations. From the July 2008 issue of ST&D magazine.
Click to download PDF file
337KB
    Lean Security: Activity vs. Productivity  This is Security Executive Council material  
Created By: Derrick Wright, Security Executive Council Staff
Many components of a lean journey require a lot of activity: training, steering team meetings, benchmarking and study. These activities can consume vast resources and make those involved feel upbeat about their roles in making lean happen; however, none of these activities produce results. The only truly value-added activities in a lean program are those that directly deliver results — those that change the process or fix a problem.
Click to download PDF file
337KB
    Make Awareness Programs Count This is Security Executive Council material  
Created By: Eric Cowperthwaite, Security Executive Council Member
A security training and awareness program is a leadership obligation within the company. From the August 2007 issue of AC&SS magazine.
Click to download PDF file
313KB
    Metrics for Success: Warning Signs of Security's Decreasing Influence This is Security Executive Council material  
Created By: George Campbell, Security Executive Council Faculty
The first of three columns examining warning signs that security is losing influence with management decision-makers. From the October issue of Security Technology & Design magazine.
Click to download PDF file
124KB
    Missile Defense This is Security Executive Council material  
Created By: Bob Hayes, Security Executive Council Managing Director
Security at the Raytheon Missile Systems plant in Tucson, Arizona, is world class — in fact, the program received its second consecutive superior rating from the Defense Security Service this year. Raytheon’s security is built on relationships, awareness and training. Security personnel are “embedded” in every aspect of the business, with each employee conscious of both their own security requirements and how they fit into the big picture; while continuous training caters to the specific needs of each employee.
Click to download PDF file
342KB
    No Size Fits All  This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
Corporate campus security is often considered a no-brainer. Some access control, some cameras, maybe some CPTED and a guard force. Some CSOs delegate it entirely to their directors and managers and focus instead on more complicated business issues. But corporate campus security is not one-size-fits-all. Campus size, location and demographics, as well as business sector, facility type and risk factors of nearby businesses and landmarks, are all integral parts of an effective and appropriate corporate campus security plan. Microsoft, for example, makes its home base on one of the world’s largest corporate campuses. With more than 130 buildings spread over more than 15 million square feet centered around Highway 520 in Redmond, Wash., Microsoft’s headquarters campus looks imposing on paper. In all this openness, Mike Howard, General Manager of Global Security, has carved out a role for security that honors the company’s creative, casual culture while protecting the people and assets that make up one of the most recognized brands in the world. “You may spend a day at Microsoft and not be aware of security guards,” Howard says, “but that doesn’t mean Security hasn’t noticed you."
Click to download PDF file
1MB
    Protecting Companies from Identity Theft This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
SEC member Tony Heredia of Target and emeritus faculty Dick Lefler discuss how the data breach is changing how corporations look at what used to be mainly a consumer problem. From the June 2008 issue of ST&D magazine.
Click to download PDF file
352KB
    Qualities or Characteristics to Look for in a Vendor Partner This is Security Executive Council material  
Created By: Security Executive Council Staff
Security experts compare and contrast their favorite qualities in vendors.
Click to download PDF file
259KB
    Remembering The 3 Cs Can Ensure A Successful Evacuation Plan This is Security Executive Council material  
Created By: John McCarthy, Security Executive Council Emeritus Faculty
Emergency situations tend to confuse and panic employees, but a carefully crafted evacuation plan can provide a degree of order and discipline to an otherwise chaotic situation. From the October 2007 issue of AC&SS magazine.
Click to download PDF file
319KB
    Rx: Converge for Security Effectiveness This is Security Executive Council material  
Created By: David Kent, Security Executive Council member
The biotechnology industry must break out of the silo mentality. From the June 2007 issue of AC&SS magazine.
Click to download PDF file
310KB
    Securing Cities: Can We Do It Better? This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
Municipal governments present a challenging atmosphere for security. There’s the potential for leadership turnover at each election, and there are “politics,” which may manifest in strained relationships and difficulty accomplishing goals. Procurement rules and bureaucratic red tape can slow down even simple processes in some city governments, and then there are the challenges of zero-balance budgets.
Click to download PDF file
422KB
    Security Alert: When the economy’s down—and budgets are stressed—the threat level rises. This is Security Executive Council material  
Created By: George Campbell and Richard A. Lefler, Emeritus Faculty
Since the recession set in, many shifts have occurred in the enterprise risk environment; some threats are rising, while others are falling. Security budgets are being cut deeply and pervasively—though not always in ways responsive to these fluctuations. Security directors must do more with less while helping their businesses clearly understand the shifting threats and ensuring that the most urgent priorities are addressed. For that reason alone, adopting an enterprise risk perspective as a recession coping strategy is itself an urgent priority.
Click to download PDF file
1MB
    Security Executive Council Member Thought Leadership: A Unified View of Food Defense This is Security Executive Council material  
Created By: Bill Ramsey, Security Executive Council Member
Council member Bill Ramsey of McCormick provides a more accurate definition of “Food Defense” and outlines a cross-functional approach for food companies to use in developing their Food Defense plans.
Click to download PDF file
57KB
    Security Executive Insight: Marking the Yardstick  This is Security Executive Council material  
Created By: Kathleen Kotwica and Marleah Blades, Security Executive Council Staff
The benefits of benchmarking for security are many, but the process has limitations. The council’s International Security Research Database hopes to address benchmarking weaknesses to make it a more valuable and reliable tool for security professionals. From the August 2008 issue of AC&SS magazine.
Click to download PDF file
677KB
    Security in a J.A.R.  This is Security Executive Council material  
Created By: Robert Gates, Security Executive Council Tier 1 Leader
By now, we’ve all seen it: Businesses and organizational leaders are scaling back their internal investments, and are more concerned with surviving the economic turmoil of our time than enhancing (or sometimes even continuing to support) the services and programs that we feel protect the company in the best possible way.
Click to download PDF file
110KB
   Solution Innovation Case Study: Emerging Issue: Investigative Program Ownership/Responsibility Confusion  This is Security Executive Council material  
Created By: Security Executive Council
This case study is a demonstration of a Security Executive Council (SEC) service offering for Tier 1 Leader™ companies that experience "investigative confusion." This includes multiple departments with ownership of various aspects of investigations, lack of inter-departmental communication and reporting, and inefficiencies that could result in company brand damage or monetary losses.
 
    Supply Chain Security: Best Practices Build Success  This is Security Executive Council material  
Created By: Peter Cheviot, Security Executive Council Staff
As the supply chain industry continues to evolve at record pace, so does the need to improve protection for the products that move inside the networks. Two factors inevitably continue to push the need: (1) the value and attraction for theft; and (2) pressure from the consumer to get their valued products to their destinations – yesterday. 
Click to download PDF file
322KB
    The Case of the Reluctant Complainant  This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Content Expert Faculty
Key tips for human resources professionals who are approached with misconduct concerns.
Click to download PDF file
335KB
    The Forces of Change  This is Security Executive Council material  
Created By: Bob Hayes, Kathleen Kotwica, Marleah Blades, Security Executive Council Staff
Security is changing in ways that will transform the industry. The SEC is developing tools to assist in tracking these trends. Security professionals can use the SEC guide as a resource to prepare themselves for upcoming global challenges with everything from security for telecommuters to offshore outsourcing. From the April 2008 issue of Security magazine.
Click to download PDF file
199KB
    The Project Life Cycle, Nexus for Security Convergence This is Security Executive Council material  
Created By: Miki Calero, SEC Tier 1 Leader
Identifying stakeholders and organizational influences is a challenge to achieving security convergence. The project life cycle (PLC) brings these two key aspects together. From the November 2007 issue of AC&SS magazine.
Click to download PDF file
314KB
   The Threat of the Malicious Insider: What Is the CFO's Responsibility? This is Security Executive Council material  
Created By: Bob Hayes, Kathleen Kotwica, and Richard Lefler
Malicious insiders can and do perpetrate sabotage; fraud; monetary, asset, and data theft; and critical information leaks that can be far more damaging to the organization than any external attack. Financial executives may not feel directly responsible for managing malicious insider activity, but they are uniquely positioned to help detect, prevent and respond to much of it.
 
    The Workplace Violence Epidemic  This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
The challenges of securing employees, assets, clients and facilities can be difficult to meet in any environment; however, few organizations must contend with the level of daily turbulence and pressure that hospitals do. Changes due to federal health reform, compliance with data protection laws and employee safety directives, shifts in demographics and service philosophy, and increasing crime must all be addressed without inhibiting public access, reducing the speed of service, or enhancing patient discomfort and stress.
Click to download PDF file
344KB
    There's Value in Integrated Security This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
SEC member Mike Howard describes how Microsoft integrated and upgraded its three Global Security Operations Centers with built-in interoperability and redundancy.
Click to download PDF file
321KB
    Threat Protection and Value that Interoperable Physical and Logical Access Control Provides that Strong but Separate Physical and Logical Access Control Cannot  This is Security Executive Council material  
Created By: Security Executive Council Staff
Security professionals discuss the pros and cons of converging physical and logical access controls.
Click to download PDF file
324KB
    What Companies Can do to Better Protect Employees as Economic Pressures Raise Concerns About Increased Rates of Workplace Violence This is Security Executive Council material  
Created By: Security Executive Council Staff
Security professionals discuss smarter solutions for protecting employees.
Click to download PDF file
325KB
    Who's Protecting America's Small Business?  This is Security Executive Council material  
Created By: Bob Hayes, Managing Director, Security Executive Council
You hear it all the time from our political and economic leaders - small business is the engine of the U.S. economy. Of the nation's 26.8 million businesses, some 99.9 percent of them have fewer than 500 employees, according to the U.S. Census Bureau. Unfortunately, these small businesses tend to pay little attention to security issues - often because they lack the resources.
Click to download PDF file
478KB
    Workplace Violence Is Your Problem This is Security Executive Council material  
Created By: Marleah Blades, Security Executive Council Staff
How WPV hurts every business, why most companies don’t protect against it, and what Security can do. From the October issue of Security Technology & Design magazine.
Click to download PDF file
584KB

Forums

   

Dealing with Activists and Protest Groups: Protecting Your Business Against Public Disorder This is Security Executive Council material  

Created By: Security Executive Council
This is supplemental material relating to the Knowledge Exchange concerns dealing with activists and protest groups.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   Faculty Advisor: Are We Using the Wrong Metrics to Measure Workplace Violence? This is Security Executive Council material  
Created By: Bob Hayes, Security Executive Council Managing Director; and Rosalind Jackson, Security Executive Council Staff Member
Reports show homicides in the workplace are down, yet we’re not seeing a downward trend in our organization in workplace violence incidents. What does this mean? Read Security Executive Council's Bob Hayes and Rosalind Jackson's answer to this question.
 
   Faculty Advisor: Benefits and Risks of Using Security Frameworks This is Security Executive Council material  
Created By: Herbert Mattord, Security Executive Council Subject Matter Expert
Q: We are trying to find a good security framework to manage our security program. Any thoughts? SEC Subject Matter Expert faculty member, Herb Mattord, responds to this question.
 
   Faculty Advisor: Contingent Workforce – Screening & Clearance  This is Security Executive Council material  
Created By: Kenneth Kasten, Security Executive Council Emeritus Faculty
My company takes painstaking efforts to ensure that all of our employees are properly background screened and vetted to help ensure the safety and security of company personnel and assets. However, I can’t say with confidence that the same is true for the rest of our modern day workforce of temporary help, contract workers, on-site suppliers and vendor personnel. How do I ensure that the same level of diligence is put forth in vetting these “outside” workers who have similar access privileges to company facilities, personnel and information? Read Security Executive Council Faculty Emeritus, Ken Kasten's, answer to this question.
 
   Faculty Advisor: Diversity is More than Cultural and Ethnic Differences This is Security Executive Council material  
Created By: John McClurg, Member, Security Executive Council’s Board of Visionary Leaders; Vice President, Global Security, Dell
The quest for diversity in my company is a formalized drive. I appreciate the fact that certain departments, security as one example, tend to have a somewhat homogenous group of people. But we are not finding many candidates that are outside the "same old" group. Any thoughts on how to overcome this? Read John McClurg's response to this question.
 
   Faculty Advisor: Domestic Violence is a Workplace Issue This is Security Executive Council material  
Created By: Rosalind W. Jackson, Security Executive Council Staff Member
I recently learned that October is Domestic Violence Awareness Month; this made me think what impact domestic partner violence could potentially have at my workplace. Can you give me some pointers on what steps and precautions I might take to help keep our employees safe and secure around this issue? Read Security Executive Council staff member, Roz Jackson's response to this question.
 
   Faculty Advisor: Enterprise-Wide Collaboration to Minimize Impact of Activist Events This is Security Executive Council material  
Created By: Francis D’Addario, Security Executive Council Member Board of Advisors
Can you give me some pointers on evaluating and disseminating strategies that would minimize disruption and promote a safe environment during activist activity or events? Read SEC Faculty member Francis D'Addario's answer to this question.
 
   Faculty Advisor: Environmental Health & Safety Risk Assessments This is Security Executive Council material  
Created By: John Piper, Security Executive Council Subject Matter Expert Faculty
As CSO, I recently had a meeting with the head of our Environmental Health & Safety group regarding a security risk assessment that we recently completed for them. They do not think that the validity and sophistication of our risk assessment is on par with what they are doing in EH&S. Where might I be missing the boat? Read SEC Subject Matter Expert Faculty, John Piper's, answer to this question.
 
   Faculty Advisor: Global Brand Integrity This is Security Executive Council material  
Created By: Richard Post, Security Executive Council Emeritus Faculty
What does it really cost when you have a product attack? See Security Executive Council Emeritus Faculty, Richard Post's, answer to this question.
 
   Faculty Advisor: Insider Threats Pose Significant Risks to Organizations This is Security Executive Council material  
Created By: Kathleen Kotwica and Bob Hayes, Security Executive Council
Insider threat appears to be a growing concern for senior management these days; they are getting more involved in the management of insider threat. We want to bolster our insider threat stance. What should we be considering? See how Kathleen Kotwica and Bob Hayes responded to this question.
 
   Faculty Advisor: Investigating Allegations of Misconduct in a Foreign Country This is Security Executive Council material  
Created By: Randy Arnt, Security Executive Council Emeritus Faculty
We recently received an anonymous hotline call that said the president of one of our foreign subsidiaries had hired a consultant to channel bribes to the government’s tax officials in order to receive favorable tax treatment. Can you give me some guidance on how to proceed with an investigation in a foreign location? Read SEC Emeritus Faculty, Randy Arnt's answer to this question.
 
   Faculty Advisor: Mitigating Risks During Mergers and Acquisitions This is Security Executive Council material  
Created By: David A. Meunier, Security Executive Council Content Expert Faculty
What security controls would you recommend we put into place to mitigate the potential for damage during the due diligence phase prior to and after an acquisition? Read SEC Faculty member David Meunier’s answer to this question.
 
   Faculty Advisor: Personnel and Executive Protection Program This is Security Executive Council material  
Created By: Randy Uzzell, Security Executive Council Emeritus Faculty
What advice can you give me on creating an effective program that protects all personnel, not just executives? Read SEC Faculty member Randy Uzzell’s answer to this question.
 
   Faculty Advisor: Protocol for Executive Protection Agents Overseas Attire This is Security Executive Council material  
Created By: Kenneth Kasten, Security Executive Council Emeritus Faculty
What is your opinion/experience regarding the dress of executive protection agents working overseas? Do most companies normally expect the security driver and EP agent to dress in business attire or in regional dress in an attempt to not stand out? For example, would a protection detail in Saudi Arabia dress in traditional Arab dress or a business suit? See SEC Emeritus Faculty, Kenneth Kasten's, answer to this question.
 
   Faculty Advisor: The Power and Value of Risk, Threat and Vulnerability Assessments This is Security Executive Council material  
Created By: J. Kelly Stewart, Formerly Security Executive Council Emeritus Faculty
I just started as a new Chief Security Officer. I am constantly bombarded with questions on why the security department needs to conduct continual risk assessments. I have three main issues. First, how do I communicate the value of continual risk assessments to get management’s buy-in? Can you explain what a Comprehensive Risk, Threat and Vulnerability Assessment is? Is conducting a risk assessment once a year enough? See former SEC Emeritus Faculty member, J. Kelly Stewart's, answer to these questions.
 
   Faculty Advisor: Travel Destination Security Intelligence This is Security Executive Council material  
Created By: Kenneth Kasten, Security Executive Council Emeritus Faculty
I have responsibility for travel security in my company and I’m concerned about potentially dangerous places people might be traveling to. Where can I obtain travel destination security intelligence? Read SEC faculty member, Kenneth Kasten's, answer to this question.
 
   Faculty Advisor: Workplace Safety During Staffing Adjustments This is Security Executive Council material  
Created By: Rosalind Jackson, SEC Staff Member
As a senior security executive, what proactive measures should I take to help weather the inevitable storm that accompanies a reduction in force when people who have worked here for many years learn that they will no longer have a job? How can we ease the tension and give these employees some hope of moving forward? Read SEC staff member Rosalind Jackson’s answer to this question.
 
   Faculty Advisor: Workplace Violence Policy Template This is Security Executive Council material  
Created By: Rosalind Jackson, SEC Staff Member
Can you recommend a template to assist with developing a good, comprehensive workplace violence policy that is easily communicated to large frontline populations? Read SEC staff member Rosalind Jackson’s answer to this question.
 
   

Knowledge Exchange: Consolidation of Security Function after a Merger or Acquisition This is Security Executive Council material  

Created By: Security Executive Council
Tier 1 Leaders and faculty shared experiences and advice on the subject of security's role when pulling companies together during/after mergers and acquisitions. Content contributors offer advice in the following areas: Getting involved in the M&A process early, personnel mapping and staff functions, tracking metrics closely, examples of how to sustain the organization and help staff adjust, the role of senior leadership, process timetables and other high-level strategies.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Knowledge Exchange: Dealing with Activists and Protest Groups This is Security Executive Council material  

Created By: Security Executive Council
Tier 1 Leaders and faculty shared experiences and advice in response and defense of activists and protest groups in the areas of crisis management, communication plans, risk exposure, outsourced assistance and guidelines in protecting your business against public disorder.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Knowledge Exchange: Executive Protection This is Security Executive Council material  

Created By: Security Executive Council
Tier 1 Leaders and faculty shared experiences and advice on executive protection.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Knowledge Exchange: Executive Protection Session 2 This is Security Executive Council material  

Created By: Security Executive Council
Tier 1 Leaders and faculty shared experiences and advice on crime prevention and awareness for families of executives. Includes 10 example documents (i.e. Travel tips and Risk Assessment Profile for Personnel) on slides 8 and 9.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Knowledge Exchange: Mail Handling Operations This is Security Executive Council material  

Created By: Security Executive Council
Tier 1 Leaders and faculty shared experiences and advice on a business case for moving mail handling operations to a separate facility.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Knowledge Exchange: Merger and Acquisition Due Diligence This is Security Executive Council material  

Created By: Security Executive Council
Tier 1 Leaders and faculty shared experiences and advice on what the range of the role in security doing due diligence prior to an acquisition or merger (M&A) is and about the process of converging/assimilating security functions during/after M&As.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Knowledge Exchange: Paper Recycling Plant, Warehouse & Storage Facility Security This is Security Executive Council material  

Created By: Security Executive Council
Tier 1 Leaders and faculty shared experiences and advice on the security needs of paper recycling plant, warehouse & storage facility.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Knowledge Exchange: Private Sector Crisis Certification Law This is Security Executive Council material  

Created By: Bruce Blythe
Hear from industry expert, Bruce Blythe from CMI on a new corporate "crisis" certification law titled "Implementing Recommendations of the 9/11 Commission Act of 2007" and is also referred to as Public Law 110-53. Title IX of the Act addresses required private sector preparedness plans and the certification program.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   

Knowledge Exchange: Unified Risk Oversight™ This is Security Executive Council material  

Created By: Security Executive Council
Tier 1 Leaders and faculty shared experiences and advice on the benefits of having a Unified Risk Oversight™ team.
Resource is for Tier One Leaders only
Resource is for Tier One Leaders only
   NGSL Research Results: Influencing Change for Nimble Global Risk Mitigation This is Security Executive Council material  
Created By: Security Executive Council
Excerpts from the Security Executive Council’s Next Generation Security Leader forum held at MITRE Corporation in November 2016 based on research from the SEC’s Security Leadership Research Institute, which has been investigating corporate security risk leadership issues for over 10 years.
 
   Security State of the Industry August 2015 Briefing - Insider Threat This is Security Executive Council material  
Created By: Security Executive Council
The SEC hosted a Security State of the Industry briefing on Insider Threat. These sessions allow security leaders to come together and engage in in-depth discussions on topics relevant to their security programs. Recordings of the briefing are available on the SEC website.
 

Multimedia

   Caught On Camera: Francis D’Addario, Security Executive Council This is Security Executive Council material  
Created By: Francis D
Former Starbucks CSO and emeritus faculty member of the Security Executive Council Francis D'Addario discusses business drivers for security directors and how those affect the business relationship between end-users and security systems integrators.
 
   Impact of Economic Recession on Security Program Management This is Security Executive Council material  
Created By: Dick Lefler, Security Executive Council Executive Board of Advisors and Dean of Emeritus Faculty; and George Campbell, Security Executive Council Emeritus Faculty
Mr. Campbell and Mr. Lefler will pose a series of questions designed for you to consider how the economic downturn might be impacting your company and your security programs. Issues covered include regulations and compliance, people and property protection, information protection and mergers and acquisitions, to name a few. The presenters will highlight inherent security risks to business goals based on assumptions of current and forecasted conditions. How to monitor, measure and track the success of security program shifts aligned with potentially new or altered business goals will also be covered. TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com.
 
   Physical Security & IT Collaboration: Who, What, When, Why & How  This is Security Executive Council material  
Created By: Ray Bernard, Security Executive Council Subject Matter Expert Faculty
TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com.
 
   Security Master Planning This is Security Executive Council material  
Created By: Timothy Giles, Security Executive Council Emeritus Faculty Member
TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com.
 
   Supply Chain Security: The Art of Connectivity Management  This is Security Executive Council material  
Created By: Peter Cheviot, Security Executive Council Emeritus Faculty
Supply Chain Security offers great opportunities for Security Management to influence and connect security policy compliance to financial returns. This presentation explains the fundamental ways to bring it into your security objectives and how to measure your financial gains. TIER 1 SECURITY LEADERS:To obtain your member discounted copy contact the Director of Member Services.
 
   Tabletop Exercises This is Security Executive Council material  
Created By: Security Executive Council
Active Shooter? Chemical Spill? Product Tampering? Severe Weather? Do you have incident response plans to cover these risks and others that may impact your business? Close coordination among all first responders will ensure, to the highest degree possible, that all available resources are effectively deployed. The swift response and recovery from these and other incidents will allow your company to effectively positively impact the protection of your people, assets, and bottom line. TIER 1 LEADERS: To obtain your discounted copy send an e-mail to contact@secleader.com.
 
   

Take Five: Resources your Peers are Using to Enhance Their Programs (and Careers) This is Security Executive Council material  

Created By: Security Executive Council
This presentation describes five of the Security Executive Council’s more popular resources. Covered are: Understanding the relationship between your company’s strategic business objectives and your security programs; how to best educate senior management (or new leadership) on program status or future direction; showing the Board and senior management security’s contribution in addressing Board-level risk concerns; measuring security program value; and staying on top of emerging trends.
     Click here to view a short video describing this resource in more detail.