Leadership Solutions

book_stack.gif

Knowledge Corner - Security Programs

Take a sneak peek at our new Knowledge Corner resource pages. We’re working on making SEC resources easier for you to find what you need including resources related to security strategic planning, influencing senior management, risk assessment, leadership strategies and security metrics.

Contact us if you want to know the ways we assist security practitioners.




Articles

   "Management by Walking Around" Gets You Ready for a Crisis This is Security Executive Council material  
Created By: Rad Jones, SEC emeritus faculty
A chief security officer has to nurture, cultivate and respect relationships with internal and external partners who are essential to resolving a critical incident. One way to do so is to simply walk around.
 
   A Risk Quantification Process 
Created By: Security Executive Council
Having a list of security-related business risks and their associated countermeasures is an essential part of the risk management process. Understanding how to quantify those risks to set priorities is equally important. This flow chart lays out one approach to the analytical process associated with risk exposure quantification.
 
   Baking in Success to Your Workplace Violence Program This is Security Executive Council material  
Created By: Dan Sauvageau, SEC Emeritus Faculty
Creating or reviewing a workplace violence program is a chance to make sure the program contains all the right ingredients.
 
   Defining Best Practices in Global Security Operations Centers This is Security Executive Council material  
Created By: George Campbell, SEC Faculty
This initial report leverages this body of member experience and examines the range of elements that may serve to define operational excellence and best practices in these critical security services.
 
   Development of an Insider Threat Program This is Security Executive Council material  
Created By: Security Executive Council
The SEC created a graphic that depicts the main elements of a insider threat program.
 
   Economic Espionage and the Growing Case for Corporate Counterintelligence (CI) This is Security Executive Council material  
Created By: John Slattery, SEC Emeritus Faculty
A CI program can and should act as a force multiplier for other corporate security initiatives. CI integration with information assurance and cyber security assets is especially important.
 
   Event Risk Analysis Template  This is Security Executive Council material  
Created By: Security Executive Council
An Event Risk Analysis template can help identify and organize risk factors to assist organizations making informed event security decisions.
 
   Facility Criticality and Mitigations Option Tool This is Security Executive Council material  
Created By: Security Executive Council
While it would seem that the security organization ought to play a role in developing the enterprise risk assessment (ERA), often they are not. Because of this, the classification of security risk areas, such as facilities by criticality and risk mitigation options may not correspond with classifications identified in the ERA. A more holistic view of risk would better serve the organization.
 
   Faculty Advisor: Contract Security Challenges and Strategies: Part I This is Security Executive Council material  
Created By: Heather O’Brien, Security Executive Council Content Expert Faculty
Contract security is often a large ticket item on any company’s P&L; unavoidably drawing the attention and sometimes scrutiny to your annual spend. Having the right processes in place and the right team of people assigned to support those processes can be an ongoing challenge - here are some tips.
 
   Faculty Advisor: Contract Security Challenges and Strategies: Part II This is Security Executive Council material  
Created By: Heather O’Brien, Security Executive Council Content Expert Faculty
Utilizing the right quantifiable KPI metrics can illustrate the effectiveness of your security program and demonstrate your ROI on every security dollar spent. The results can be powerful in the C-suite when defending your security budget. Meaningful KPIs are also an excellent tool for managing you contract security provider.
 
   Faculty Advisor: Establishing a Global Security Operations Center This is Security Executive Council material  
Created By: Neil Johnston, Subject Matter Expert Faculty, SEC
A reader asks: We are discussing establishing a GSOC to support our company and security organization. Since this is new to us, could you supply some fundamental considerations we should be thinking about?
 
   Five Essential Considerations for Establishing a Valued Global Security Operations Center (GSOC) This is Security Executive Council material  
Created By: Security Executive Council
Five key considerations from SEC subject matter experts.
 
   Global Survey of Workplace Hotline Reports Shows Significant Improvements in Some Key Industries – Data Obtained from 650 Companies This is Security Executive Council material  
Created By: Security Executive Council
The Security Executive Council's 2007 Corporate Governance and Compliance Hotline Benchmarking Report provides a key set of benchmark data for corporations in 10 industries.
 
   How Does Your Insider Threat Compare? This is Security Executive Council material  
Created By: Bob Hayes, Managing Director; and Kathleen Kotwica, Ph.D., EVP and Chief Knowledge Strategist, Security Executive Council
A short evaluation of your insider threat vulnerability.
 
   How to Plan an Investigation This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Content Expert Faculty
A primer to help non-security personnel conduct effective investigations.
 
   Insider Threat is a Challenging Organizational Problem This is Security Executive Council material  
Created By: Security Executive Council
Here's how to identify it, set up a plan and prevent failure points.
 
   It Happens. Are You Prepared to Respond? This is Security Executive Council material  
Created By: The Security Executive Council
This briefing provides insight on preparing for and managing all types of critical incidents.
 
   Keeping Your Workplace Violence Program Current This is Security Executive Council material  
Created By: Roz Jackson, SEC Staff
Plan and prepare to dynamically evolve with an ever-changing risk environment.
 
   Next Generation Security Leader Forum: Driving Unified Risk Oversight through Global Security Operations Centers  This is Security Executive Council material  
Created By: Security Executive Council
A summary of highlights from a two-day SEC Next Generation Security Leader™ (NGSL) event. This event featured interactive sessions led by security’s most influential leaders. See presentation topics here.
 
   Personal Safety Guidelines for International Travel This is Security Executive Council material  
Created By: Security Executive Council
Security and safety awareness practices should be part of any travel, but safe international travel demands special preparation.
 
   Physical Security: Assessing the Needs of Your Business This is Security Executive Council material  
Created By: Security Executive Council
Tips to make sure sure physical security makes sense within the context of your business operations.
 
   Remembering The 3 Cs Can Ensure A Successful Evacuation Plan This is Security Executive Council material  
Created By: John McCarthy, Security Executive Council Emeritus Faculty
Emergency situations tend to confuse and panic employees, but a carefully crafted evacuation plan can provide a degree of order and discipline to an otherwise chaotic situation. From the October 2007 issue of AC&SS magazine.
 
   SEC Security State of the Industry: Could Your Security Program Fall Below Industry Standard of Care Resulting in a Finding of Negligence? This is Security Executive Council material  
Created By: Security Executive Council
A study of recent case law involving workplace violence programs.
 
   Security State of the Industry: The Emerging Role of Information Protection and Counterintelligence (CI) in Corporate Security This is Security Executive Council material  
Created By: Security Executive Council
When you hear counterintelligence, many think about it in military terms. But corporations are now being targeted at such a high rate that it's creating an urgent responsibility for corporate security to address the issue.
 
   Site Risk Assessment Scoring Template  This is Security Executive Council material  
Created By: Security Executive Council
This scoring template is one option. It provides a visual structure for your results, which may help facilitate high-level examination of gaps in policy and safeguards and site-specific consideration of improvements.
 
   Site Risk/Threat Assessment Ranking Template This is Security Executive Council material  
Created By: Security Executive Council
Understanding the nature and scope of security-related risk is a basic expectation of a corporate security program and those engaged in asset protection. The risk assessment process provides for a critical evaluation of mitigation programs.
 
   Solution Innovation Case Study: Emerging Issue: Investigative Program Ownership/Responsibility Confusion  This is Security Executive Council material  
Created By: Security Executive Council
This case study is a demonstration of a Security Executive Council (SEC) service offering for Tier 1 Leader™ companies that experience "investigative confusion." This includes multiple departments with ownership of various aspects of investigations, lack of inter-departmental communication and reporting, and inefficiencies that could result in company brand damage or monetary losses.
 
   The Case of the Reluctant Complainant  This is Security Executive Council material  
Created By: John Thompson, Security Executive Council Content Expert Faculty
Key tips for human resources professionals who are approached with misconduct concerns.
 
   The Essentials of a Physical Security Systems Risk Assessment This is Security Executive Council material  
Created By: Security Executive Council
A brief guide on the essentials of a physical security systems risk assessment.
 
   The Threat of the Malicious Insider: What Is the CFO's Responsibility? This is Security Executive Council material  
Created By: Bob Hayes, Kathleen Kotwica, and Richard Lefler
Malicious insiders can and do perpetrate sabotage; fraud; monetary, asset, and data theft; and critical information leaks that can be far more damaging to the organization than any external attack. Financial executives may not feel directly responsible for managing malicious insider activity, but they are uniquely positioned to help detect, prevent and respond to much of it.
 
   Threat/Risk Management Process Chart This is Security Executive Council material  
Created By: Security Executive Council
This chart provides an easy to understand diagram of a process with which to make security risk management decisions. It highlights the important aspects necessary to ensure a proper alignment with the organization's goals.
 
   Top Security Practices for a Resilient Business  
Created By: Security Executive Council
Themes that form a set of best practices (the SEC prefers to use the term "proven practices") that can inform any security practitioner aiming for business continuity excellence.
 
   Transitioning from Risk Assessment to Plan  This is Security Executive Council material  
Created By: Security Executive Council
Conducting a security risk assessment is an essential first step in developing successful security programs. But what should the security practitioner do with the results?