TITLE

2010 Security 500 Methodology

PUB. DATE
November 2010
SOURCE
Security: Solutions for Enterprise Security Leaders;Nov2010, Vol. 47 Issue 11, p42
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the spectra of the 2010 Security 500 Benchmarking Survey designed to create a database which would measure and compare a certain security organization from the others and establish a benchmarking program in the U.S.
ACCESSION #
56437994

 

Related Articles

  • Why Fearing NORQ is Bad for Security. Johnston, Roger G.; Folk, Christopher N.; Warner, Jon S. // Journal of Physical Security;2014, Vol. 7 Issue 3, p9 

    The article discusses the irrational fear of non-objective, non-reproducible and non-quantitative (NORQ) approaches to analyzing security often seen among security practitioners, security managers and organizations involved in critical security applications. It notes that ORQ approaches include...

  • MPs call for clarity on crime. Meilton, David // Public Finance;6/24/2005, p15 

    Focuses on the House of Commons' Public Accounts Committee (PAC) regarding the necessity for the Home Office to do more to show how its measures to eliminate crime are working in Great Britain. Contention of the PAC that government initiatives have helped cut crime; Aim of the Office to reduce...

  • PROTECTING PRIVATE SECURITY-RELATED INFORMATION FROM DISCLOSURE BY GOVERNMENT AGENCIES. Conrad, James W. // Administrative Law Review;Summer2005, Vol. 57 Issue 3, p715 

    The article suggests that security vulnerability assessments and plans prepared by privately held companies can be handy tools for anyone who wishes to cause major harm to facilities owned by such companies. Such assessments generally describe ways to attack a facility that will produce the...

  • What To Do? French, Jon M. // Business Mexico;Oct2005, Vol. 15 Issue 10, p25 

    The article offers important guidelines on how to upgrade security. For personal security, it is important to review and update the company's crisis management program, validated with periodic desktop simulation exercises and give employees security awareness briefings tailored to minimize risks...

  • Insecurity Complex. Bodamer, David // Retail Traffic;Mar2007, Vol. 36 Issue 3, p2 

    The article discusses the issues regarding the compensation packaged allocated for security personnel particularly shopping mall security guards in the U.S. The author believes that business enterprises should observe appropriate compensation to attract skilled workers and basically ensure the...

  • Return On Security Investment (ROSI) -- A Practical Quantitative Model. Sonnenreich, Wes; Albanese, Jason; Stout, Bruce // Journal of Research & Practice in Information Technology;Feb2006, Vol. 38 Issue 1, p45 

    Organizations need practical security benchmarking tools in order to plan effective security strategies. This paper explores a number of techniques that can be used to measure security within an organization. It proposes a new benchmarking methodology that produces results that are of strategic...

  • Feds unite on security benchmarks. Fisher, Dennis; Carlson, Caron // eWeek;12/15/2003, Vol. 20 Issue 50, p1 

    A group of high-level information technology officials in the federal government has begun collaborating on configuration benchmarks that government agencies could be required to use in future purchases of hardware and software. The development of the benchmarks is at once an indication of the...

  • Benchmarks Aren't Magic, Theyre Tools. Hayes, Bob; Kotwica, Kathleen // Security: Solutions for Enterprise Security Leaders;Sep2011, Vol. 48 Issue 9, p74 

    The article presents authors insights on recognizing benchmarking as a business practice by security executives. They state that benchmarking identifies vulnerability, competitive strengths and business opportunities improvement. They say that security leaders find or create benchmark for the...

  • The 2008 Security 500: Trends Show an Expanded and More Integrated Role. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Nov2008, Vol. 45 Issue 11, p22 

    The article focuses on the 2008 Security 500 top ten trends. It states that the top 10 trends in the 2008 Security 500 includes the addition of business resilience and crisis management, the apparent omnipresence of benchmarking, and security is drawing a larger circle. It mentions that the best...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics