Metrics is Not a Four-Letter Word

Treece, Dennis; Freadman, Michele
November 2010
Security: Solutions for Enterprise Security Leaders;Nov2010, Vol. 47 Issue 11, p90
Trade Publication
The article focuses on the aspects of metrics program in relation to the improvement of security program performance in the U.S. It mentions the need to measure the activities of metrics program and manage security program by design rather than by exception to effectively administer metrics program and enhance the performance of security program. It also cites the key components of metrics program, namely collection, analysis and reporting of data, which are essential to any security program.


Related Articles

  • Effective Alarm Monitoring. Wicks, Sean // Security: Solutions for Enterprise Security Leaders;Jul2004, Vol. 41 Issue 7, p32 

    Explores the ways involve in the implementation of centralized monitoring system. Characteristic of intrusion, motion and tamper alarms to be monitored at the security control room by the security staff; Options for companies with multinational operations to develop a sophisticated reporting...

  • STEP 2- GAP ANALYSIS.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p29 

    The article discusses the second step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security measures. The goal of this phase is to identify the gaps between the model facility and the current situation. It...

  • STEP 3 - GAP CLOSURE.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p71 

    The article discusses the third step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. This phase prompt to mitigate the various risks identified in the second step through consideration and evaluation...

  • STEP 4 - SECURITY STRATEGIC PLAN.  // Integrated Physical Security Handbook (Government Training Inc.);2006, p169 

    The article discusses the fourth step needed to identify critical assets, treat and targets and the appropriate measures to implement an effective integrated physical security plan. The section focuses on how to set out strategic plan appropriate to get management approval and develop a blue...

  • TECHNOLOGY ON THE LINE. Rothman, Paul // Government Security;Apr2004, p20 

    Discusses the actions taken by the United States government in protecting its borders. Description of several technology tools which were used in protecting the nation's borders; Outline of the Aviation and Transportation Security Act which was enacted by the Congress in November 2001. INSET:...

  • 'Prepare for the Future' Warns ISC Keynote Speaker.  // SDM: Security Distributing & Marketing;May2004, Vol. 34 Issue 5, p15 

    Discusses Bernard Kerik's keynote address at ISC Expo/West held on March 31, 2004 in Las Vegas in relation to the terrorist attack that struck New York in 2001. Emphasis on the importance of protecting the country's landmarks and public places; Presentation of a hypothetical example of a suicide...

  • Bridging the Security Knowledge Gap. Cipra, Cory // Transmission & Distribution World;Mar2004 Supplement, Vol. 56, p36 

    The article presents information on security measures taken by organizations to ensure the safety of their critical assets. Securing infrastructure requires leadership and a well integrated approach. The challenge is finding a cooperative way in which to build a security program that encompasses...

  • Not Your Average Printer Accessories.  // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p28 

    Highlights the latest technology in identification cards as of September 2005. Cards implanted with a tamper-resistant hologram within the layers of plastic cards; Pre-printed text on ID cards; Opacity marked cards; Pre-printed serial numbers.

  • Tools of the Master Planning Trade. Collins, Kurt W. // Security: Solutions for Enterprise Security Leaders;Dec2007, Vol. 44 Issue 12, p36 

    The article discusses why organizations need a master security plan and how to go about assembling and implementing the plan. Creating a security master plan calls for a lot of homework including the need to know the existing and future needs of the business enterprise. The baselining of current...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics