Insight on Program Best Practices

The SEC’s perspectives on security program development and enhancement.

Filter by

Insight on Program Best Practices

Security Barometer: Essential Elements of Cybersecurity Awareness Training

Share what you think are the essential elements of an effective cybersecurity awareness program in this quick poll and instantly see how your peers have responded.
Click for more details
Insight on Program Best Practices

Security Optimization - Looking Beyond Traditional Definitions of Convergence

How does cyber security and corporate security collaboration influence security optimization, and is one structure more likely to lead to optimization than another?
Click for more details
Insight on Program Best Practices

The State of Security Convergence

Are preconceptions about the convergence of corporate and cyber security accurate in practice?
Click for more details
Insight on Program Best Practices

Information Protection Playbook

Whether or not Corporate Security has direct responsibility for Information Security, excellence in risk management and information protection relies upon collaboration and coordination between these related functions. Without shared knowledge on strategy, methods, and threats, coordination will be difficult to achieve. The Information Protection Playbook provides a high-level overview that...
Click for more details
Insight on Program Best Practices

Security Barometer Results: Do Cyber and Corporate Security Work Together in Your Organization?

Both cyber/information security and corporate/physical security have roles to play in protecting and securing the organization.
Click for more details
Insight on Program Best Practices

The Mission is Not Cybersecurity- It's Enterprise Security

Security's current business model can deliver on the routine service demands, but our role in meeting these increasingly consequential risks will require a much more inclusive and mature presence.
Click for more details
Insight on Program Best Practices

Not Following Established Policy Tops List of Most Significant Threats to Information Protection

This early release summary of "Threats to Information Protection 2015" provides a glimpse into the results of extensive research performed by Kennesaw State University's Center for Information Security Education (CISE) in partnership with the SEC.
Click for more details