Creating Security's Strategic Plan

Scaglione, Bernard
June 2010
Security: Solutions for Enterprise Security Leaders;Jun2010, Vol. 47 Issue 6, p44
Trade Publication
The author provides tips on how to create a strategic security plan. He cites the importance of considering the important elements in a security plan and defining the responsibilities and functions of the company's security department and personnel. The author advises to create an identification card for the employees, vendors, and contractors, as well as to develop a technique called Voice of the Customer, to hear feedbacks from customers within all levels of the organization.


Related Articles

  • Openness Opens Doors with IT and Physical Security. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Apr2011, Vol. 48 Issue 4, p44 

    The article presents the author's insights on the significance of information technology (IT) in the management of a corporation's physical security. He says that the involvement IT makes physical security management easier. He discusses the security management strategies using IT including the...

  • Making The Leap. WALKER, BRUCE // Government Security;Jul/Aug2008, Vol. 7 Issue 4, p6 

    The article discusses security systems, examining the transition to credentialing from badging. Multiple sets of information concerning one individual, as is the case with badging, creates opportunities for fraud, the article indicates. Other topics include Homeland Security directives and...

  • Courts Announce Renewal of Attorney Access Cards.  // Indiana Lawyer;12/21/2011, Vol. 22 Issue 21, p13A 

    The article focuses on the announcement of the Marion County Court Administrator's Office in Indiana regarding the renewal schedule for the application and distribution of attorney access cards to the City-County Building which will begin on February 23, 2012 for 25 dollars.

  • A distributable security management architecture for enterprise systems spanning multiple security domains. Priggouris, Ioannis; Hadjiefthymiades, Stathes // Electronic Commerce Research;Jul2006, Vol. 6 Issue 3/4, p355 

    Administering security in modern enterprise systems may prove an extremely complex task. Their large scale and dynamic nature are the main factors that contribute to this fact. A robust and flexible model is needed in order to guarantee both the easy management of security information and the...

  • Why Access Control and Identification is Healthy for Your Organization. Scaglione, Ben // Security: Solutions for Enterprise Security Leaders;Oct2011, Vol. 48 Issue 10, p60 

    The article discusses the significance of access control and identification for the organizations in the U.S. The author mentions that controlling access into and within a building or campus not only detects possible terrorist attacks, but reduces the opportunity for the commission of a crime or...

  • Video Verification: Use it Wisely! Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Dec2010, Vol. 47 Issue 12, p42 

    The article discusses the importance of using video verification efficiently in security management in the U.S. It mentions that the use of video cameras in security systems verify whether an intrustion alarm is false or genuine. It states that video verification in electronic access control...

  • Researchers Show On-card Fingerprint Match Is Secure, Speedy.  // Airport Security Report;4/10/2008, Vol. 16 Issue 7, p8 

    The article reports that a fingerprint identification technology for use in Personal Identification Verification (PIV) cards meets the standardized accuracy criteria for federal identification cards, according to researchers at the National Institute of Standards and Technology in the U.S. PIV...

  • It's the Business Basics with ID Convergence. Ritchey, Diane // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p82 

    The article discusses the employment of identification (ID) convergence in organizations as part of their security management systems. Colby DeRodeff cites some challenges that organizations will face in converging physical and logical security systems and teams which include the technical ones,...

  • The Plastic THAT PROTECTS.  // Government Security;Jul/Aug2008, Vol. 7 Issue 4, p16 

    The article discusses the use of photo identification (ID) cards in the security industry. Photo ID's make security and guest safety better, while also preventing unauthorized access and badge-swapping. Other topics include the HES Convention Services company's use of photo ID's for its...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics