Tools |
| Balancing Headcount, Budget, Workload and Prioritized Services: Analysis Spreadsheet & Presentation Samples Created By: Security Executive Council The Council has helped many Tier 1 Leaders™ with determining security staff duty day-to-day tasks and time spent (resource analysis) and determining what are the most valued security services across the enterprise (value analysis), expanding services where critical and customer valuation of services. These are several tools contained in a workbook, developed to help members with this informative and proactive "reduction defense" exercise.
|  Resource is for Tier One Leaders only |
 |
| Board Level Risk Categories & Security Program Elements (v.4) Created By: The Security Executive Council The Board Level Risk diagram is a conceptual image to convey your program in the language of the board when presenting to senior management. This image is frequently used to explain how security programs align with enterprise level risk concerns. It can also be used as an awareness tool. The categories of risk areas and security strategies and mitigation efforts were developed from on research of numerous companies' risk mitigation assessments. |  Resource is for Tier One Leaders only |
 |
| Executive Protection: Templates Created By: Security Executive Council This document contains templates that may be used in executive protection programs. Some of the topics include: risk assessment, security risk analysis, service delivery model, surveys for when executives or employees are traveling, attending an event and staying at a hotel. |  Resource is for Tier One Leaders only |
 |
| How to Quickly Show Stakeholders the State of the Security Program
Created By: SEC Three security executives in three very different situations used the Security Success Foundation Assessment(TM) in their organizations to achieve positive internal and organizational results. See how this process can help lead to your success.
| |
 |
| Online Reputation Matrix Created By: Security Executive Council This matrix lists some of the social media concerns that companies face and provides potential security strategies, including possible mitigation and remediation options. Use this matrix with key stakeholders to identify greatest social media risks to brand and personnel safety to the company. |  Resource is for Tier One Leaders only |
 |
| Reduction in Force: Employee Layoff and Recall Policy Created By: Security Executive Council This document provides a sample of a layoff and recall policy for companies that must reduce employment because of adverse economic or other conditions. This document should be used or modified in accordance with specific company requirements.
|  Resource is for Tier One Leaders only |
 |
| Reduction in Force: Employee Layoff Letter Created By: Security Executive Council This document provides one example of an employee layoff letter for companies to modify. The letter contains high level statements of why the layoff is happening, how many positions are being cut and a time frame for forthcoming separation and employee assistance. |  Resource is for Tier One Leaders only |
 |
| Reduction in Force: Employee Termination Policy and Procedure Created By: Security Executive Council This document is a sample policy and procedure meant to assist Security, Human Resources and other internal corporate groups in planning for employee terminations / reductions in the work force. |  Resource is for Tier One Leaders only |
 |
| Reduction in Force: Termination and Change Responsibilities Policy Created By: Security Executive Council This document is meant to provide an example policy to help companies ensure that employees and contingent workers exit an organization or change employment in an orderly manner. This includes the completion of access rights removal and return of company-owned assets. |  Resource is for Tier One Leaders only |
 |
| Reduction in Force: Voluntary RIF Program Policy Created By: Security Executive Council This document provides companies with a sample of a voluntary reduction in force program policy. The program policy is meant to set forth the framework under which employees can volunteer to be separated in order to save other employees from a reduction in work force. |  Resource is for Tier One Leaders only |
 |
| Regulation and Compliance Management Tool Created By: Security Executive Council This is a proprietary process developed by the SEC to help clients identify regulations and standards with security elements that are related to their particular industry. It assists the SEC’s subject matter experts to create a baseline standard; from which a relevant standard is created that fits the organization’s industry/sector and corporate culture.
To learn more contact us at contact@secleader.com | |
 |
| Security Executive Council Collective Knowledge: Business Continuity Program V.3 Created By: Security Executive Council This document is based on a presentation in response to new regulations and corporate scrutiny on business crisis management planning, as a result of national incidence, business reporting requirements and corporate and board level risk. A Tier 1 Leader item available for purchase. Visit our store. |  Resource is for Tier One Leaders only |
 |
| Security Executive Council Collective Knowledge: Comprehensive Security Program V.3 Created By: The Security Executive Council A presentation used as a benchmark security programs or to educate senior management (or new leadership) on program status or future direction. Showing senior management the security function is operating in similar fashion as other well established functions (e.g., finance or marketing) will go a long way. |  Resource is for Tier One Leaders only |
 |
| Security Executive Council Custom Research: Business Conduct and Ethics Historical, Current and Future of Programs V.1 Created By: The Security Executive Council This presentation may be used for developing an enterprise-wide business conduct and ethics program and to demonstrate what has been the typical program focus and characteristics, emerging trends and current practices. The research and trending information can be used as options for a company to make decisions as to the best model that works for their business strategy and goals. |  Resource is for Tier One Leaders only |
 |
| The Manager's Handbook for Business Security, 2nd Edition Created By: Security Executive Council This book and accompanying CD have been developed to provide a series of short subjects on risk mitigation essentials. It was designed to save you time when enhancing or developing risk management programs. Included are actual program elements, documentation, examples, templates, outlines, presentations, tips and more.
This resource is a compilation of elements that should be in place to constitute the “baseline” of a security program (industry neutral). Practitioners, Council faculty and staff provided input on what they found to be the most critical elements of a successful program. Also incorporated are key materials from Council projects and deliverables. This guide is useful when creating a new program or validating an existing program to identify missing elements or other ways to approach an issue. It is also valuable as a check as to whether your programs are adding business value.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource. | |
 |
| Workplace Violence Case Management Flowchart Created By: Security Executive Council This document is meant to provide a sample of how a workplace violence case may be processed and charted. It includes process information such as: Who reported the incident, who the incident was reported to, case management and strategy response. |  Resource is for Tier One Leaders only |
 |
| Workplace Violence Continuum Created By: Security Executive Council This workplace violence continuum is a graphic overview of a comprehensive workplace violence (mitigation) program. It depicts the stages and elements from the proactive to responsive and business continuity after an event has occurred. It provides the essential elements that can be modified and adapted to fit your business structure. | |
 |
| Workplace Violence Cross-Functional Risk Management Teams Created By: Security Executive Council This document provides a sample of workplace violence organizational cross-functional team roles such as corporate security, legal, human resources, safety and employee assistance programs, for risk response and assessing a company's available incident resources. | |
 |
| Workplace Violence Intake Created By: Security Executive Council This document provides a sample template to help customize the intake and assessment process of managing potential workplace violence cases in order best track and document the possible series of events. |  Resource is for Tier One Leaders only |
 |
| Workplace Violence Issue Overview Created By: Security Executive Council This document is meant as a sample workplace violence (WPV) issues template providing examples of types of violence, response options and common types of offenders for companies to use in conjunction with a holistic WPV program. |  Resource is for Tier One Leaders only |
 |
| Workplace Violence Process Overview Created By: Security Executive Council This document provides a sample workplace violence process template for customization, including protocols for intake, assessment, consultation and response planning. |  Resource is for Tier One Leaders only |
 |
| Workplace Violence: At-Risk Personnel Security Created By: Security Executive Council This chart outlines criteria for assigning security levels and assessing risk for at-risk personnel from the CEO and board members to employees, for events and situations like meetings and travel. |  Resource is for Tier One Leaders only |
 |
Research & Benchmarks |
| 14 Effective Solutions for Creating Successful Security Programs Created By: Security Executive Council This paper highlights brief case studies that depict solutions using Security Executive Council
tools and processes. These are based on what the SEC has gleaned in the last 10 years working with security practitioners. At the end of the document don't miss 10
Tips You Can Learn from our Experience with Successful Programs. | |
 |
| Are Core Security Programs Being Neglected? Created By: The Security Executive Council In this Security Barometer we wanted to see how prevalent this is and what participants felt are the hurdles that get in the way of improving the core programs that need updating or expansion. | |
 |
| Are Investigations Evolving?
Created By: SEC There is evidence that many companies are unwittingly suffering notable loss to fraud and other types of incidents that cause damage to the organization. It may be time to re-evaluating your investigation program to incorporate the latest best practices.
| |
 |
| Assessment Quiz: Organizational Readiness for Security Created By: By: Security Executive Council The Council has spent years researching this topic and has found that understanding what management thinks Security "is" and "does" is critical. You need to know how management perceives Security in order to educate them on the reality - and to get appropriate buy-in for resource requests or advancement of your goals. | |
 |
| Background Investigations Benchmark - Exclusive Preliminary Results Created By: Security Executive Council A preliminary summary of the SEC benchmark on background investigations has been just published. The information gathered in the research can be used to compare against your background investigations program, identify areas where improvement is possible and generate ideas. It provides a preliminary look into some of the results that have been gathered to date from this valuable benchmark research. For example: While all the participating organizations conducted background investigations on employees, over 50% of them also had their vendors undergo checks. | |
 |
| Case Study: Risk Management and Security Metrics at Boeing Created By: Greg Niehaus, Security Executive Council Board of Visionary Leaders; Professor of Insurance and Finance, University of South Carolina Here is an opportunity to get the inside story on building a superior metrics program for a world class enterprise security program. This first ever business case study focusing on security risk is being used at South Carolina's Darla Moore School of Business to introduce students to the security metrics program that is used by Boeing to improve decision making. It also provides insight into their workplace violence program. | |
 |
| Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark Created By: The Security Leadership Research Institute The Security Leadership Research Institute (SLRI) has published ground breaking results of their Corporate Security
Organizational Structure, Cost of Services and Staffing survey. The full report covers such metrics as security budgets, staffing, program drivers, governance and oversight. This executive summary provides a glimpse into some of what is contained in the full report. If you participate in the SLRI surveys you can receive the next edition of the full report. For more information about SLRI click here
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource. |  Resource is for Tier One Leaders only |
 |
| Defining the Total Cost of Security: Programs and Services Survey Showing Interesting Security Program Results Created By: Security Executive Council Selected preliminary analysis from our ground breaking research initiative is shown below. This represents only a small portion of the information being collected. You can expect much more in-depth analysis once the data collection phase of the process has concluded. | |
 |
| Driving Excellence in Enterprise Security Created By: George Campbell, Security Executive Council Emeritus Faculty This paper provides a starting place for security leaders who are interested in operational excellence or are considering applying it within their programs. It includes: Range of approaches gathered from discussions with a number of Tier 1 Leaders™; insight into how to achieve a critical baseline assessment of security’s value; potential measures of excellence in security programs; and a template to help investigate and identify initial targets for application of operational excellence.
| |
 |
| Five Factors that are Key to Your Success Created By: Security Executive Council Over ten years in the business of assisting security executives advance their programs and careers has provided the SEC with unique insight into what makes security initiatives successful. Our research has identified a few critical factors that play a significant role and understanding how these factors interact and affect security initiatives will lead you to better results on your projects. | |
 |
| Global Security Operations Center Best Practices Survey Results Created By: Security Executive Council The SEC conducted a survey within its GSOC Best Practices Working Group investigating such topics staffing structures, services provided, geographic scope, budget ownership, incident dispatch, location selection, alarm system management, and performance measures. The full report was distrbuted to members of the SEC GSOC working group. | |
 |
| International Security Programs Benchmark Report Created By: Security Executive Council This is the full report that Security Executive Council Tier 1 Leaders™ and participants receive. This project began as a Tier 1 Leader™ driven strategic initiative to ascertain the what and how of international security programs. Based on in-depth Tier 1 Leader™ interviews earlier in the project, it became clear research was necessary to fully grasp the breadth and scope of programs currently in place and any differentiators. This is the first of three projected reports from this data.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
|  Resource is for Tier One Leaders only |
 |
| Investigative Confusion - Who Owns Investigations? Created By: Security Executive Council Some organizations spread responsibility and ownership for different types of investigations among their business functions. Whether you want to bring investigations in under your department or just help eliminate investigative confusion this paper will help you get started. | |
 |
| Security Barometer Results: Centralized Risk Repository A centralized repository of risks provides a robust foundation for an effective risk management program. While 90% of respondents felt a central repository was valuable less than half had one. See more about results of our poll here. | |
 |
| Security Barometer Results: Security Program Maturity Models Created By: Security Executive Council Maturity models are a framework that can be used to benchmark processes and procedures against clearly defined best practices. This Security Barometer quick poll asked security practitioners to self-assess their security programs using the framework created by the Software Engineering Institute at Carnegie Mellon University.
| |
 |
| Security Barometer Results: What is the Security Department's Biggest Challenge Created By: Security Executive Council Leading a successful security program is a difficult task. Not only does the risk environment evolve but the organization's managing business leaders also bring challenges to the job. | |
 |
| Security Barometer: Security Policies that Organizations Have in Place Created By: Security Executive Council This Security Barometer peer poll looked at what security policies organizations have in place and corporate security's responsibility. | |
 |
| Security Budget Research Report Created By: The Security Executive Council This is an analysis of data collected from survey of security program budgets that was conducted by the Council January 2009. This report, available to Council members, provides detailed information on the changes in budgets over the past two fiscal years segmented by industry as well as budget category. In addition the report provides a list of some of the creative efforts that security executives are undertaking to counter the effects the economy is having on their security programs. |  Resource is for Tier One Leaders only |
 |
| Security Budget Research Report: Impact of the Economic Downturn
Executive Summary An executive summary of the results of a survey was sent to qualified security practitioners (over 85% at the director level or above) to gather information on the state of their security budgets and to assess any impact the economic downturn has had on their programs. |  Resource is for Tier One Leaders only |
 |
| Security State of the Industry: Travel Security
Created By: SEC New research report examines travel security program trends, risk factors, policy and program elements.
| |
 |
| The Biggest Challenge to the Success of Security Programs Created By: Security Executive Council This Security Barometer offered a tough question to answer. There are many possible challenges to the success of security programs but in this security barometer the respondents had to choose the single one they felt was the most significant. | |
 |
| The State of Security Convergence
Created By: Kathleen Kotwica, PhD, EVP and Chief Knowledge Strategist, SEC; Principal Analyst, Security Leadership Research Institute, and Herb Mattord, PhD, CISM, CISSP, Kennesaw State University - Department of Information Systems The convergence of corporate and cyber security is often said to enhance resilience by broadening the view of risk, providing more rapid detection of threats and response to emerging events, and improving intelligence sharing.
| |
 |
| The Top Action to Combat Insider Threat Created By: Security Executive Council How Many Organizations Have A Formal Insider Threat Program?
What was voted the most important action to combat insider threat? This SEC Security Barometer polled security practitioners to answer to these and more questions on insider threats. Insiders, malicious or not, are frequently cited as one of the top risks to organizations. This poll reveals some interesting observations from your peers. | |
 |
| The Top Security Risk Organizations are Facing Today? Created By: Security Executive Council Here are the results from our latest Security Barometer quick poll of security practitioners. The top two risks look similar to last year but there has been an interesting shake up within the list you might be interested in knowing about. | |
 |
| Trend Research: Bring Your Own Device (BYOD) To Work Created By: Security Executive Council This resource was developed based on a Tier 1 Leader and their IT colleague looking at productivity around the topic of BYOD to work (e.g., if I had my own phone or computer (e.g., Apple brand device) I could increase my productivity.) The research was then expanded to include further information on what peer corporations are doing in this area (e.g., pros, cons, must haves, challenges, risks and liabilities).
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource. |  Resource is for Tier One Leaders only |
 |
| Uniformed Security Officer Programs Under Fire Created By: Security Executive Council In this Security Barometer quick poll we investigated uniformed security officer programs and the burden they face to cut budgets. Roughly four out of five programs are experiencing significant budgetary pressure from their executive management. | |
 |
Presentation Materials |
| Bringing a Corporate Security Culture to Life
Created By: Peter Cheviot, Security Executive Council Emeritus Faculty In Bringing a Corporate Security Culture to Life, presenter Peter Cheviot, former vice president of corporate security for BAX Global Inc., discusses how to build and maintain a corporate security culture that encourages company employees to take ownership of security and facilitates communication. In this 18-minute video presentation of narrated slides, the concept of "security culture" is defined, and Cheviot explains how it can improve the effectiveness of security and risk management programs.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Developing a Comprehensive Security Program Created By: Bob Hayes, Kathleen Kotwica and Elizabeth Lancaster, Security Executive Council Staff Developing a Comprehensive Security Program answers the question common among security managers, "What is a model security program, and how does our program compare to it?" In this seven-minute Proven Practices presentation, narrator Elizabeth Lancaster outlines the baseline elements of a security program, which have been defined by experienced Security Executive Council members and research.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Domestic Violence Spills Over into the Workplace Created By: Rosalind W. Jackson, Security Executive Council Staff Member Problems associated with domestic violence frequently spill over into the workplace. This presentation discusses ways to assess the danger, help the survivor and keep the workplace safe.
Issues such as the signs and types of abuse, developing and communicating a domestic violence policy,
the cycle of violence, the cost of domestic violence to employers, developing a safety plan for survivors are addressed.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Establishing the Value of All-Hazards Risk Mitigation (Parts 1-5) Created By: Francis D'Addario, Security Executive Council Emeritus Faculty In this presentation, Francis D’Addario, SEC emeritus faculty and former VP of Partner and Asset Protection of Starbucks Coffee Company, explains how companies can tangibly enhance enterprise risk mitigation and brand by prioritizing people across the organization. He also presents data and examples to help security practitioners define and communicate the total cost of risk and return on investment of an all-hazards approach. | |
 |
| Personnel Protection in the Corporate World
Created By: Jerry Miller and Radford Jones, Security Executive Council Emeritus Faculty Protecting people in the Corporate World can under certain circumstances require the protection of executives, employees and their families, contractors, visitors and even customers. “Personnel Protection” is a presentation that consists of 11 modules that cover: the Corporate World, Vehicle Operations and Security, Concepts of Executive Security, Threat Assessment, Executive Security Protection, Executive Compensation/Fringe Benefits, Advance Procedures, Executive Worksite Security, Residential Security, Aircraft Security and Kidnapping/Issues and Policies. This series may be viewed in its entirety or on a particular module of interest. The entire presentation includes over 200 slides on the listed topics.
TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com. | |
 |
| Personnel Protection: Advance Procedures, 1st Edition Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty Personnel Protection: Advance Procedures discusses the concept of the security advance, which is any activity, planning, or security arrangement made in advance of an executive visit. This 34-minute video presentation of narrated slides explains how security practitioners can mitigate risk to the executive by identifying potential risks before a visit, and includes guidelines for each area of the location that needs to be surveyed and closely monitored. TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Personnel Protection: Aircraft Security, 1st Edition Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty Personnel Protection: Aircraft Security describes how, in conjunction with the aircraft operations team, the security team must be equipped mitigate aircraft risks. This 13-minute video presentation of narrated slides provides strategies for preparing for unintentional and intentional threats to aircraft security, which could take the form of, for example, the unintentional release of an executive’s flight times or the planned sabotage of aircraft equipment. TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Personnel Protection: Executive Compensation and Fringe Benefits Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty According to IRS code, any property or service that an executive receives in lieu of or in addition to regular taxable wages is a fringe benefit that may be subject to taxation. There are exceptions to this rule, however, which may include security services provided. In Personnel Protection: Executive Compensation and Fringe Benefits, the factors necessary to exclude security-related expenses from the executive’s taxable gross income are defined, and the benefits to both the executive and the company are discussed.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Personnel Protection: Executive Worksite Security, 1st Edition Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty In Personnel Protection: Executive Worksite Security, presenters Jerome Miller and Radford Jones discuss the potential security risks to executives while at the office and en route to the office. This seven-minute presentation of narrated slides includes recommendations for controlling access to areas of particular concern, such as installing fencing, monitoring the premises using a closed-circuit television (CCTV) system, conducting visitor screening, and installing bullet-resistant glass doors and duress alarms.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Personnel Protection: Kidnapping Issues and Policies Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty In Personnel Protection: Kidnapping Issues and Policies, presenters Jerome Miller and Radford Jones discuss the issue of kidnapping as it relates to an executive security program. It covers the risks for kidnapping of the executive or executive’s family members, along with strategies for creating a sound corporate kidnapping policy. The presenters also discuss what kind of response the organization should make during a kidnapping, as the first hours immediately following are always critical to a successful resolution.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Personnel Protection: Residential Security Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty Executive protection doesn’t end when the executive leaves the office. In Personnel Protection: Residential Security, presenters Jerome Miller and Radford Jones discuss the components of a residential security system. Topics in this 10-minute video presentation of narrated slides include home security and fire alarm systems, safe rooms, personalizing the security program to involve the executive and his or her family, and special considerations for when the residence is a large, wooded, or walled estate. The presenters emphasize the rings of security concept, with each ring designed to detect or deter an attacker.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Personnel Protection: Security Personnel, 1st Edition Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty In Personnel Protection: Security Personnel presenters Jerome Miller and Radford Jones discuss the critically important task of selecting and training security personnel for executive protection duties. In this seven-minute video presentation of narrated slides, the topics covered include a comparison of contracted and proprietary personnel, the pros and cons of armed versus unarmed personnel, the characteristics of the ideal security person, and the training requirements for hired security personnel.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Personnel Protection: Threat Assessment Profile Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty In Personnel Protection: Threat Assessment Profile, presenters Jerome Miller and Radford Jones discuss the threat assessment profile as the basis for determining the need for an executive security program. This 12-minute video presentation of narrated slides covers the range of threats to consider, the executive’s public exposure and any history of threats, local safety issues, and business travel. The presenters emphasize the need for keeping an up-to-date executive dossier containing his or her personal information, in case there is a kidnapping situation.
Tier 1 Leaders: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Personnel Protection: Vehicle Operations and Safety Created By: Jerome Miller & Radford Jones, Security Executive Council Emeritus Faculty Because a business executive typically spends a considerable amount of time travelling by vehicle, the greatest risk of injury or death to the executive is by vehicle accident or attack while in the vehicle. In Personnel Protection: Vehicle Operations and Safety, presenters Jerome Miller and Radford Jones discuss the basic security principles of executive driver safety and training. This 20-minute video presentation of narrated slides covers the challenges the executive driver may face, how and why to vary routes, schedules, and vehicles, and the characteristics of a qualified executive driver.
Tier 1 Leaders: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
| Preventing Workplace Violence: A Training Guide for Managers and Supervisors Created By: Rosalind Jackson, Security Executive Council Staff Member In Preventing Workplace Violence: A Training Guide for Managers and Supervisors, presenter Rosalind W. Jackson provides the fundamentals of workplace violence prevention, including initial program development. This presentation explains the components needed to develop a good baseline program, and focuses on recognizing patterns of unacceptable behavior. It addresses policy development and expert consultation considerations, along with the use of education and team coordination. The presentation also includes a sample workplace violence policy statement, and discusses the impact of workplace violence on the business.
TIER 1 LEADERS: Proven Practice presentations were created to be guidelines or training tools. This version is an Adobe file but you may contact us at contact@secleader.com for an online version with audio included from the subject matter expert.
|  Resource is for Tier One Leaders only |
 |
Books/Guidelines/Manuals |
| Business Continuity Playbook Created By: Dean Correia, Contributing Editor Business continuity planning identifies an organization’s exposure to various risks while bringing together various resources in order to provide effective assessment, preparedness, response, and recovery from these risks negatively impacting the organization. Business continuity planning is an ongoing strategic practice governing how business is conducted.
This Playbook is meant to serve as a framework to help security leaders build a business continuity program from the ground up or enhance the program that is currently in existence. The materials have been compiled using various accredited sources, international standards, and the collective knowledge of the Security Executive Council and its subject matter experts, which represents decades of experience managing business continuity programs. The Playbook is adaptable to companies of all sizes from all industries.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
|  Resource is for Tier One Leaders only |
 |
| Compliance Response to Misconduct Allegations Created By: John Thompson, Security Executive Council Emeritus Faculty This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource.
|  Resource is for Tier One Leaders only |
 |
| Dealing with Activists and Protest Groups: Protecting Your Business Against Public Disorder Created By: Security Executive Council This is supplemental material relating to the Knowledge Exchange concerns dealing with activists and protest groups. |  Resource is for Tier One Leaders only |
 |
| Global Security Survival Guide (Version 1)
Created By: Security Executive Council This guide was created to supplement security orientation training for General Managers located around the world.
|  Resource is for Tier One Leaders only |
 |
| How to Develop and Implement a Security Master Plan Created By: Timothy D. Giles Here is a practical guide which details how to construct a customized, comprehensive five-year corporate security plan that synchronizes with the strategies of any business or institution. The author explains how to develop a plan and implementation strategy that aligns with an organization’s particular philosophies, strategies, goals, programs, and processes. Readers learn how to outline risks and then formulate appropriate mitigation strategies. TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com. | |
 |
| IT Security Response to Misconduct Allegations Created By: John Thompson, Security Executive Council Emeritus Faculty This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators.
A Tier 1 Leader item available for purchase. Visit our store. |  Resource is for Tier One Leaders only |
 |
| Manager's Handbook for Business Security: Chapter 3 Created By: Security Executive Council New security managers don't always have the luxury of time to deeply research comprehensive textbooks on security fundamentals before they start taking action to build their programs. Download chapter 3 of The Manager's Handbook for Business Security to see a sample. | |
 |
| Personal Safety and Security Playbook Created By: Francis D’Addario, Contributing Editor, Security Executive Council Emeritus Faculty The Personal Safety and Security Playbook is designed for anyone who may benefit from shared community safety and security responsibilities. Chapters are organized by areas of concern, from personal risk awareness to protection and security considerations for family, home, travel, and work. The guidelines included help the reader recognize personal safety and security hazards, take proactive prevention steps, and react reasonably to danger with beneficial outcomes.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource. |  Resource is for Tier One Leaders only |
 |
| Personal Security Guidelines Created By: Security Executive Council Creating guidelines for dealing effectively with security risks involves a considerable amount of work and cost. The Security Executive Council’s goal in providing this guideline is to offer a template for you to use to start filling in the pieces of prevention strategies that work for your organization. TIER 1 LEADERS: To obtain your complimentary copy send an e-mail to contact@secleader.com. | |
 |
| Physical Security Guidelines Created By: Security Executive Council Creating guidelines for dealing effectively with security risks involves a considerable amount of work and cost. The Security Executive Council’s goal in providing this guideline is to offer a template for you to use to start filling in the pieces of prevention strategies that work for your organization. TIER 1 LEADERS: To obtain your complimentary copy send an e-mail to contact@secleader.com. | |
 |
| Physical Security Strategy and Process Playbook: Chapter 3
Created By: SEC The Physical Security Strategy and Process Playbook concisely and comprehensively lays out the requirements of physical security management as a critical part of sound business management. Download chapter 3 from the book. | |
 |
| Reductions in Force/Lay-Offs Guidelines Created By: Kenneth Kasten, Security Executive Council Emeritus Faculty There are more employment reductions in force in today’s business world than ever before, thus enhancing the opportunity for a potential security issue to surface during an involuntary separation of employment. This checklist/guideline addresses employment separations - both involuntary and voluntary – that can help you to consistently and appropriately address security issues and concerns generally associated with these types of events. | REGISTRATION REQUIRED |
 |
| Reporting Guidelines (sample) Created By: Security Executive Council Sample reporting guideline for employees includes examples of what to report and how to report. | 56KB |
 |
| Response to Misconduct Allegations Series Created By: John Thompson, Security Executive Council Emeritus Faculty This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who is tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators. TIER 1 LEADERS:To obtain your complimentary copy send an e-mail to contact@secleader.com. | |
 |
| Searches and Inspections Guidelines Created By: Security Executive Council Creating guidelines for dealing effectively with security risks involves a considerable amount of work and cost. The Security Executive Council’s goal in providing this guideline is to offer a template for you to use to start filling in the pieces of prevention strategies that work for your organization. TIER 1 LEADERS: To obtain your complimentary copy send an e-mail to contact@secleader.com. | |
 |
| Security Technology Convergence Insights Created By: Ray Bernard, Security Executive Council Subject Matter Expert Faculty Security technology convergence refers to the incorporation of computing, networking, and communications technologies into electronic physical security systems.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource. |  Resource is for Tier One Leaders only |
 |
| The Business Response to Misconduct Allegations Created By: John Thompson, Security Executive Council Content Expert Faculty The Business Response to Misconduct Allegations playbook, third edition, has been created for business professionals who are the first to be contacted during a suspected employee-related claim and who may not have had investigative training. It is a step-by-step guide of what to do—and, perhaps more importantly, what not to do—in laying the groundwork of an investigation. Sections of this playbook discuss considerations when deciding whether to investigate, preliminary issues, naming investigators, investigative planning, interview techniques and issues, the importance of taking notes and written statements, and much more.
TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource. |  Resource is for Tier One Leaders only |
 |
| The Facilities & Building Management Response to Misconduct Allegations Created By: John Thompson, Security Executive Council Emeritus Faculty This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators.
A Tier 1 Leader item available for purchase. Visit our store. |  Resource is for Tier One Leaders only |
 |
| The Human Resources Response to Misconduct Allegations Created By: John Thompson, Security Executive Council Emeritus Faculty This guide was written for the security executive to distribute to the person who has never been in the investigative field but is most likely to directly receive reports of misconduct allegations. It is for the business professional who has never been to an introductory investigations course. The series is also useful to the security executive or law department attorney who tasked with training professionals on what to do when they receive an allegation of wrongdoing. This book guides the non-security business professional through the investigative process up to the appropriate time to involve trained investigators.
A Tier 1 Leader item available for purchase. Visit our store. |  Resource is for Tier One Leaders only |
 |
| Workplace Security Playbook: The New Manager's Guide to Security Risk Created By: Security Executive Council Creating guidelines for dealing effectively with security risks involves a considerable amount of work and cost. The Security Executive Council’s goal in providing this guideline is to offer a template for you to use to start filling in the pieces of prevention strategies that work for your organization. TIER 1 LEADERS: Log-in to obtain your copy.
OTHER VISITORS: Click the title to order this SEC resource. |  Resource is for Tier One Leaders only |
 |
Articles |
| "Management by Walking Around" Gets You Ready for a Crisis Created By: Rad Jones, SEC emeritus faculty A chief security officer has to nurture, cultivate and respect relationships with internal and external partners who are essential to resolving a critical incident. One way to do so is to simply walk around. | |
 |
| A Risk Quantification Process Created By: Security Executive Council Having a list of security-related business risks and their associated countermeasures is an essential part of the risk management process. Understanding how to quantify those risks to set priorities is equally important. This flow chart lays out one approach to the analytical process associated with risk exposure quantification. | |
 |
| Baking in Success to Your Workplace Violence Program Created By: Dan Sauvageau, SEC Emeritus Faculty Creating or reviewing a workplace violence program is a chance to make sure the program contains all the right ingredients. | |
 |
| Defining Best Practices in Global Security Operations Centers Created By: George Campbell, SEC Faculty This initial report leverages this body of member experience and examines the range of elements that may serve to define operational excellence and best practices in these critical security services. | |
 |
| Development of an Insider Threat Program Created By: Security Executive Council The SEC created a graphic that depicts the main elements of a insider threat program. | |
 |
| Early Fraud Detection: The Secret to Security ROI?
Created By: SEC What if, by offering a particular service, Corporate Security could show a level of loss prevention or recovery that dwarfed its cost? It would be the ROI Holy Grail a lot of security leaders have spent their careers wishing for. But does it exist?
| |
 |
| Economic Espionage and the Growing Case for Corporate Counterintelligence (CI) Created By: John Slattery, SEC Emeritus Faculty A CI program can and should act as a force multiplier for other corporate security initiatives. CI integration with information assurance and cyber security assets is especially important. | |
 |
| Event Risk Analysis Template Created By: Security Executive Council An Event Risk Analysis template can help identify and organize risk factors to assist organizations making informed event security decisions. | |
 |
| Facility Criticality and Mitigations Option Tool Created By: Security Executive Council While it would seem that the security organization ought to play a role in developing the enterprise risk assessment (ERA), often they are not. Because of this, the classification of security risk areas, such as facilities by criticality and risk mitigation options may not correspond with classifications identified in the ERA. A more holistic view of risk would better serve the organization. | |
 |
| Faculty Advisor: Contract Security Challenges and Strategies: Part I Created By: Heather O’Brien, Security Executive Council Content Expert Faculty Contract security is often a large ticket item on any company’s P&L; unavoidably drawing the attention and sometimes scrutiny to your annual spend. Having the right processes in place and the right team of people assigned to support those processes can be an ongoing challenge - here are some tips. | |
 |
| Faculty Advisor: Contract Security Challenges and Strategies: Part II Created By: Heather O’Brien, Security Executive Council Content Expert Faculty Utilizing the right quantifiable KPI metrics can illustrate the effectiveness of your security program and demonstrate your ROI on every security dollar spent. The results can be powerful in the C-suite when defending your security budget. Meaningful KPIs are also an excellent tool for managing you contract security provider. | |
 |
| Faculty Advisor: Establishing a Global Security Operations Center Created By: Neil Johnston, Subject Matter Expert Faculty, SEC A reader asks: We are discussing establishing a GSOC to support our company and security organization. Since this is new to us, could you supply some fundamental considerations we should be thinking about? | |
 |
| Five Essential Considerations for Establishing a Valued Global Security Operations Center (GSOC) Created By: Security Executive Council Five key considerations from SEC subject matter experts. | |
 |
| Get Ahead of Social Media Reputational Risk Created By: Security Executive Council Negative social media buzz - whether factual or fictional - can quickly damage brand reputation and value. Security practitioners can help protect the organization by having a clear plan for dealing with events. | |
 |
| Global Survey of Workplace Hotline Reports Shows Significant Improvements in Some Key Industries – Data Obtained from 650 Companies Created By: Security Executive Council The Security Executive Council's 2007 Corporate Governance and Compliance Hotline Benchmarking Report provides a key set of benchmark data for corporations in 10 industries. | |
 |
| GSOC: Business Drivers and Service Scope Created By: Security Executive Council The heightened profile of SOCs/GSOCs is likely to continue to pique executive interest in these services well beyond the pandemic. And if you don't already operate a SOC, now may be a good time to learn more and to consider whether one could add value in your organization. | |
 |
| How Does Your Insider Threat Compare? Created By: Bob Hayes, Managing Director; and Kathleen Kotwica, Ph.D., EVP and Chief Knowledge Strategist, Security Executive Council A short evaluation of your insider threat vulnerability. | |
 |
| How Firm is Your Security Foundation Created By: Security Executive Council Sometimes security leaders get so focused on rolling out the "right" programs that they don't stop to think about the foundations those programs will be built upon. Some fall into this trap when they are building a brand-new security department. More often it happens when they are inheriting an existing function and hoping to improve.
| |
 |
| How to Plan an Investigation Created By: John Thompson, Security Executive Council Content Expert Faculty A primer to help non-security personnel conduct effective investigations. | |
 |
| Insider Threat is a Challenging Organizational Problem Created By: Security Executive Council Here's how to identify it, set up a plan and prevent failure points. | |
 |
| Is Your GSOC Contributing to Operational Excellence? Created By: Security Executive Council This short self-assessment can be used to help prepare you for a conversation about your GSOC's needs and capabilities with executive management. | |
 |
| It Happens. Are You Prepared to Respond? Created By: The Security Executive Council This briefing provides insight on preparing for and managing all types of critical incidents. | |
 |
| Keeping Your Workplace Violence Program Current Created By: Roz Jackson, SEC Staff Plan and prepare to dynamically evolve with an ever-changing risk environment. | |
 |
| Next Generation Security Leader Forum: Driving Unified Risk Oversight through Global Security Operations Centers Created By: Security Executive Council A summary of highlights from a two-day SEC Next Generation Security Leader™ (NGSL) event. This event featured interactive sessions led by security’s most influential leaders. See presentation topics here. | |
 |
| Personal Safety Guidelines for International Travel Created By: Security Executive Council Security and safety awareness practices should be part of any travel, but safe international travel demands special preparation. | |
 |
| Physical Security: Assessing the Needs of Your Business Created By: Security Executive Council Tips to make sure sure physical security makes sense within the context of your business operations. | |
 |
| Protest Guide for Security Leaders Created By: Security Executive Council Ensure your security organization is up to date on intelligence related to potential public disturbances. Reach out to public partners and other local organizations to collect and share information. Help your organization analyze its risk and take action in areas that may be impacted by civil unrest. | |
 |
| Remembering The 3 Cs Can Ensure A Successful Evacuation Plan Created By: John McCarthy, Security Executive Council Emeritus Faculty Emergency situations tend to confuse and panic employees, but a carefully crafted evacuation plan can provide a degree of order and discipline to an otherwise chaotic situation. From the October 2007 issue of AC&SS magazine. | |
 |
| SEC Security State of the Industry: Could Your Security Program Fall Below Industry Standard of Care Resulting in a Finding of Negligence? Created By: Security Executive Council A study of recent case law involving workplace violence programs. | |
 |
| Security Risk Assessment Success Factors Created By: Security Executive Council Several of our subject matter experts collaborated to develop the following list of security risk assessment success factors, based on their experience and our collective knowledge. | |
 |
| Security Risk Assessment: What Not to Do Created By: Security Executive Council Research has led us to believe that a significant percentage of risk practitioners are conducting risk assessments that underperform. Don't repeat these mistakes when planning your next risk assessment.
| |
 |
| Security State of the Industry: The Emerging Role of Information Protection and Counterintelligence (CI) in Corporate Security Created By: Security Executive Council When you hear counterintelligence, many think about it in military terms. But corporations are now being targeted at such a high rate that it's creating an urgent responsibility for corporate security to address the issue. | |
 |
| Site Risk Assessment Scoring Template Created By: Security Executive Council This scoring template is one option. It provides a visual structure for your results, which may help facilitate high-level examination of gaps in policy and safeguards and site-specific consideration of improvements. | |
 |
| Site Risk/Threat Assessment Ranking Template Created By: Security Executive Council Understanding the nature and scope of security-related risk is a basic expectation of a corporate security program and those engaged in asset protection. The risk assessment process provides for a critical evaluation of mitigation programs. | |
 |
| Solution Innovation Case Study:
Emerging Issue: Investigative Program Ownership/Responsibility Confusion Created By: Security Executive Council This case study is a demonstration of a Security Executive Council (SEC) service offering for Tier 1 Leader™ companies that experience "investigative confusion." This includes multiple departments with ownership of various aspects of investigations, lack of inter-departmental communication and reporting, and inefficiencies that could result in company brand damage or monetary losses. | |
 |
| The Case of the Reluctant Complainant Created By: John Thompson, Security Executive Council Content Expert Faculty Key tips for human resources professionals who are approached with misconduct concerns. | |
 |
| The Essentials of a Physical Security Systems Risk Assessment Created By: Security Executive Council A brief guide on the essentials of a physical security systems risk assessment. | |
 |
| The Threat of the Malicious Insider: What Is the CFO's Responsibility? Created By: Bob Hayes, Kathleen Kotwica, and Richard Lefler Malicious insiders can and do perpetrate sabotage; fraud; monetary, asset, and data theft; and critical information leaks that can be far more damaging to the organization than any external attack. Financial executives may not feel directly responsible for managing malicious insider activity, but they are uniquely positioned to help detect, prevent and respond to much of it. | |
 |
| Threat/Risk Management Process Chart Created By: Security Executive Council This chart provides an easy to understand diagram of a process with which to make security risk management decisions. It highlights the important aspects necessary to ensure a proper alignment with the organization's goals. | |
 |
| Top Security Practices for a Resilient Business Created By: Security Executive Council Themes that form a set of best practices (the SEC prefers to use the term "proven practices") that can inform any security practitioner aiming for business continuity excellence. | |
 |
| Transitioning from Risk Assessment to Plan Created By: Security Executive Council Conducting a security risk assessment is an essential first step in developing successful security programs. But what should the security practitioner do with the results? | |
 |
| Travel Security Framework Created By: Security Executive Council If your organization doesn't already have a travel security plan or program in place, the coronavirus outbreak serves as a helpful reminder to begin laying the foundation before the next crisis hits.Here is an abbreviated version of a program development process that has proven effective for several of our clients.
| |
 |
Forums |
| Building a Right-Sized Protection Program
In this Faculty Advisor column, emeritus faculty Francis D'Addario and Phil Hopkins weigh in on how to protect at-risk employees while avoiding the optics of a large security detail.
| |
 |
| Dealing with Activists and Protest Groups: Protecting Your Business Against Public Disorder Created By: Security Executive Council This is supplemental material relating to the Knowledge Exchange concerns dealing with activists and protest groups. |  Resource is for Tier One Leaders only |
 |
| Faculty Advisor: Are We Using the Wrong Metrics to Measure Workplace Violence? Created By: Bob Hayes, Security Executive Council Managing Director; and Rosalind Jackson, Security Executive Council Staff Member Reports show homicides in the workplace are down, yet we’re not seeing a downward trend in our organization in workplace violence incidents. What does this mean? Read Security Executive Council's Bob Hayes and Rosalind Jackson's answer to this question. | |
 |
| Faculty Advisor: Benefits and Risks of Using Security Frameworks Created By: Herbert Mattord, Security Executive Council Subject Matter Expert Q: We are trying to find a good security framework to manage our security program. Any thoughts? SEC Subject Matter Expert faculty member, Herb Mattord, responds to this question. | |
 |
| Faculty Advisor: Building a Consistent Employee Protection Program Created By: Phil Hopkins, Security Executive Council Emeritus Faculty Our SEC Faculty Advisor, Phil Hopkins, responds to this question: My company has no consistent executive protection and event security program. Any advice on how to build out a program that will allow us to better support the executives and our employees? | |
 |
| Faculty Advisor: Contingent Workforce – Screening & Clearance
Created By: Kenneth Kasten, Security Executive Council Emeritus Faculty My company takes painstaking efforts to ensure that all of our employees are properly background screened and vetted to help ensure the safety and security of company personnel and assets. However, I can’t say with confidence that the same is true for the rest of our modern day workforce of temporary help, contract workers, on-site suppliers and vendor personnel. How do I ensure that the same level of diligence is put forth in vetting these “outside” workers who have similar access privileges to company facilities, personnel and information? Read Security Executive Council Faculty Emeritus, Ken Kasten's, answer to this question.
| |
 |
| Faculty Advisor: Continuous Integrity/Background Screening Created By: Jerry Vergeront, SEC Faculty Why organizations should consider this risk mitigation tactic. | |
 |
| Faculty Advisor: Current Challenges Security Leaders are Facing Created By: Elizabeth Lancaster-Brisson, Security Executive Council Director of Tier 1 Services & Projects A recent exploration of hot issues seen across our SEC practitioner community and their companies found that one of the most frequently asked questions is what are the challenges or hot issues leading CSOs we work with are encountering. Our SEC faculty advisor responds. | |
 |
| Faculty Advisor: Diversity is More than Cultural and Ethnic Differences Created By: John McClurg, Member, Security Executive Council’s Board of Visionary Leaders; Vice President, Global Security, Dell The quest for diversity in my company is a formalized drive. I appreciate the fact that certain departments, security as one example, tend to have a somewhat homogenous group of people. But we are not finding many candidates that are outside the "same old" group. Any thoughts on how to overcome this? Read John McClurg's response to this question. | |
 |
| Faculty Advisor: Domestic Violence is a Workplace Issue Created By: Rosalind W. Jackson, Security Executive Council Staff Member I recently learned that October is Domestic Violence Awareness Month; this made me think what impact domestic partner violence could potentially have at my workplace. Can you give me some pointers on what steps and precautions I might take to help keep our employees safe and secure around this issue? Read Security Executive Council staff member, Roz Jackson's response to this question.
| |
 |
| Faculty Advisor: Enterprise-Wide Collaboration to Minimize Impact of Activist Events Created By: Francis D’Addario, Security Executive Council Member Board of Advisors Can you give me some pointers on evaluating and disseminating strategies that would minimize disruption and promote a safe environment during activist activity or events? Read SEC Faculty member Francis D'Addario's answer to this question. | |
 |
| Faculty Advisor: Environmental Health & Safety Risk Assessments Created By: John Piper, Security Executive Council Subject Matter Expert Faculty As CSO, I recently had a meeting with the head of our Environmental Health & Safety group regarding a security risk assessment that we recently completed for them. They do not think that the validity and sophistication of our risk assessment is on par with what they are doing in EH&S. Where might I be missing the boat? Read SEC Subject Matter Expert Faculty, John Piper's, answer to this question. | |
 |
| Faculty Advisor: Global Brand Integrity Created By: Richard Post, Security Executive Council Emeritus Faculty What does it really cost when you have a product attack? See Security Executive Council Emeritus Faculty, Richard Post's, answer to this question. | |
 |
| Faculty Advisor: Insider Threats Pose Significant Risks to Organizations Created By: Kathleen Kotwica and Bob Hayes, Security Executive Council Insider threat appears to be a growing concern for senior management these days; they are getting more involved in the management of insider threat. We want to bolster our insider threat stance. What should we be considering? See how Kathleen Kotwica and Bob Hayes responded to this question. | |
 |
| Faculty Advisor: Investigating Allegations of Misconduct in a Foreign Country Created By: Randy Arnt, Security Executive Council Emeritus Faculty We recently received an anonymous hotline call that said the president of one of our foreign subsidiaries had hired a consultant to channel bribes to the government’s tax officials in order to receive favorable tax treatment. Can you give me some guidance on how to proceed with an investigation in a foreign location? Read SEC Emeritus Faculty, Randy Arnt's answer to this question. | |
 |
| Faculty Advisor: Is My Workplace Violence Program Ready for the Next Generation of Challenges? Created By: Bob Hayes, Managing Director; and Rosalind Jackson, Staff Member, Security Executive Council We are revisiting our workplace violence prevention program and looking at it from a much broader perspective than when we initiated it many years ago. We want to ensure that we are not only incorporating the latest strategies in protecting our employees but that our program meets current requirements including duty of care. Can you provide any guidance on this? See how our SEC faculty advisors respond to this question. | |
 |
| Faculty Advisor: Mitigating Risks During Mergers and Acquisitions Created By: David A. Meunier, Security Executive Council Content Expert Faculty What security controls would you recommend we put into place to mitigate the potential for damage during the due diligence phase prior to and after an acquisition? Read SEC Faculty member David Meunier’s answer to this question.
| |
 |
| Faculty Advisor: Personnel and Executive Protection Program Created By: Randy Uzzell, Security Executive Council Emeritus Faculty What advice can you give me on creating an effective program that protects all personnel, not just executives? Read SEC Faculty member Randy Uzzell’s answer to this question. | |
 |
| Faculty Advisor: Protocol for Executive Protection Agents Overseas Attire Created By: Kenneth Kasten, Security Executive Council Emeritus Faculty What is your opinion/experience regarding the dress of executive protection agents working overseas? Do most companies normally expect the security driver and EP agent to dress in business attire or in regional dress in an attempt to not stand out? For example, would a protection detail in Saudi Arabia dress in traditional Arab dress or a business suit? See SEC Emeritus Faculty, Kenneth Kasten's, answer to this question. | |
 |
| Faculty Advisor: Screen Vendors Continuously and Comprehensively Created By: Bill King, SEC Subject Matter Expert Faculty My security function has been tasked with establishing screening protocols for the vendors and service providers bidding for our company’s contracts. How far should this screening extend? What should be included? | |
 |
| Faculty Advisor: Should Security be Involved in Anti-Counterfeiting Program? Created By: Walt Clements, Security Executive Council Emeritus Faculty Read our SEC Faculty Advisor's response to this question, "We think we can be of assistance in the organization’s product counterfeiting mitigation program. How might we approach this?" | |
 |
| Faculty Advisor: The Case for Corporate Counterintelligence Created By: John Slattery, Security Executive Council Emeritus Faculty I am trying to garner support for creating a corporate counterintelligence (CI) program within our security organization; we are an international company with people and facilities in multiple countries. What does a “good” corporate CI program look like?
See how John Slattery responds to this question. | |
 |
| Faculty Advisor: The Power and Value of Risk, Threat and Vulnerability Assessments Created By: J. Kelly Stewart, Formerly Security Executive Council Emeritus Faculty I just started as a new Chief Security Officer. I am constantly bombarded with questions on why the security department needs to conduct continual risk assessments. I have three main issues. First, how do I communicate the value of continual risk assessments to get management’s buy-in? Can you explain what a Comprehensive Risk, Threat and Vulnerability Assessment is? Is conducting a risk assessment once a year enough? See former SEC Emeritus Faculty member, J. Kelly Stewart's, answer to these questions. | |
 |
| Faculty Advisor: Travel Destination Security Intelligence Created By: Kenneth Kasten, Security Executive Council Emeritus Faculty I have responsibility for travel security in my company and I’m concerned about potentially dangerous places people might be traveling to. Where can I obtain travel destination security intelligence? Read SEC faculty member, Kenneth Kasten's, answer to this question. | |
 |
| Knowledge Exchange: Consolidation of Security Function after a Merger or Acquisition Created By: Security Executive Council Tier 1 Leaders and faculty shared experiences and advice on the subject of security's role when pulling companies together during/after mergers and acquisitions. Content contributors offer advice in the following areas: Getting involved in the M&A process early, personnel mapping and staff functions, tracking metrics closely, examples of how to sustain the organization and help staff adjust, the role of senior leadership, process timetables and other high-level strategies. |  Resource is for Tier One Leaders only |
 |
| Knowledge Exchange: Dealing with Activists and Protest Groups Created By: Security Executive Council Tier 1 Leaders and faculty shared experiences and advice in response and defense of activists and protest groups in the areas of crisis management, communication plans, risk exposure, outsourced assistance and guidelines in protecting your business against public disorder. |  Resource is for Tier One Leaders only |
 |
| Knowledge Exchange: Executive Protection Created By: Security Executive Council Tier 1 Leaders and faculty shared experiences and advice on executive protection. |  Resource is for Tier One Leaders only |
 |
| Knowledge Exchange: Executive Protection Session 2 Created By: Security Executive Council Tier 1 Leaders and faculty shared experiences and advice on crime prevention and awareness for families of executives. Includes 10 example documents (i.e. Travel tips and Risk Assessment Profile for Personnel) on slides 8 and 9. |  Resource is for Tier One Leaders only |
 |
| Knowledge Exchange: Mail Handling Operations Created By: Security Executive Council Tier 1 Leaders and faculty shared experiences and advice on a business case for moving mail handling operations to a separate facility. |  Resource is for Tier One Leaders only |
 |
| Knowledge Exchange: Merger and Acquisition Due Diligence Created By: Security Executive Council Tier 1 Leaders and faculty shared experiences and advice on what the range of the role in security doing due diligence prior to an acquisition or merger (M&A) is and about the process of converging/assimilating security functions during/after M&As. |  Resource is for Tier One Leaders only |
 |
| Knowledge Exchange: Paper Recycling Plant, Warehouse & Storage Facility Security Created By: Security Executive Council Tier 1 Leaders and faculty shared experiences and advice on the security needs of paper recycling plant, warehouse & storage facility. |  Resource is for Tier One Leaders only |
 |
| Knowledge Exchange: Private Sector Crisis Certification Law Created By: Bruce Blythe Hear from industry expert, Bruce Blythe from CMI on a new corporate "crisis" certification law titled "Implementing Recommendations of the 9/11 Commission Act of 2007" and is also referred to as Public Law 110-53. Title IX of the Act addresses required private sector preparedness plans and the certification program. |  Resource is for Tier One Leaders only |
 |
| Knowledge Exchange: Unified Risk Oversight™ Created By: Security Executive Council Tier 1 Leaders and faculty shared experiences and advice on the benefits of having a Unified Risk Oversight™ team. |  Resource is for Tier One Leaders only |
 |
| NGSL Research Results: Influencing Change for Nimble Global Risk Mitigation Created By: Security Executive Council Excerpts from the Security Executive Council’s Next Generation Security Leader forum held at MITRE Corporation in November 2016 based on research from the SEC’s Security Leadership Research Institute, which has been investigating corporate security risk leadership issues for over 10 years. | |
 |
| Security State of the Industry August 2015 Briefing - Insider Threat Created By: Security Executive Council The SEC hosted a Security State of the Industry briefing on Insider Threat. These sessions allow security leaders to come together and engage in in-depth discussions on topics relevant to their security programs. Recordings of the briefing are available on the SEC website.
| |
 |
Multimedia |
| Caught On Camera: Francis D’Addario, Security Executive Council Created By: Francis D'Addario, Security Executive Council Emeritus Faculty Former Starbucks CSO and emeritus faculty member of the Security Executive Council Francis D'Addario discusses business drivers for security directors and how those affect the business relationship between end-users and security systems integrators.
| |
 |
| Domestic Violence Spills Over Into the Workplace (Parts 1-4) Created By: Rosalind W. Jackson, Security Executive Council Staff Member In this series, Rosalind Jackson, SEC media and publications manager, discusses ways to assess the danger, help the survivor and keep the workplace safe. She discusses the signs and types of abuse; developing and communicating a domestic violence policy; the cycle of violence; the cost of domestic violence to employers; and developing a safety plan for survivors. | |
 |
| Establishing the Value of All-Hazards Risk Mitigation (Parts 1-5) Created By: Francis D'Addario, Security Executive Council Emeritus Faculty In this presentation, Francis D’Addario, SEC emeritus faculty and former VP of Partner and Asset Protection of Starbucks Coffee Company, explains how companies can tangibly enhance enterprise risk mitigation and brand by prioritizing people across the organization. He also presents data and examples to help security practitioners define and communicate the total cost of risk and return on investment of an all-hazards approach. | |
 |
| Impact of Economic Recession on Security Program Management Created By: Dick Lefler, Security Executive Council Executive Board of Advisors and Dean of Emeritus Faculty; and George Campbell, Security Executive Council Emeritus Faculty Mr. Campbell and Mr. Lefler will pose a series of questions designed for you to consider how the economic downturn might be impacting your company and your security programs. Issues covered include regulations and compliance, people and property protection, information protection and mergers and acquisitions, to name a few. The presenters will highlight inherent security risks to business goals based on assumptions of current and forecasted conditions. How to monitor, measure and track the success of security program shifts aligned with potentially new or altered business goals will also be covered. TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com.
| |
 |
| Personnel Protection Concepts of Executive Security (Parts 1-2) Created By: Rad Jones and Jerome Miller, Security Executive Council Emeritus Faculty This presentation presents an overview of both the proactive and reactive components of personnel protection. Presenters Rad Jones and Jerome Miller, SEC emeritus faculty, cover the layering of security measures, target hardening, intelligence gathering, and awareness. | |
 |
| Personnel Protection: Advance Procedures (Parts 1-5) Created By: Rad Jones and Jerome Miller, Security Executive Council Emeritus Faculty In this five-part series describes how to calculate the movement of the executive against the environment being visited to reduce obstacles to a successful event. and the type of planning and security arrangements that must be made in advance, including itinerary and instructions for all supporting security personnel. | |
 |
| Physical Security & IT Collaboration: Who, What, When, Why & How
Created By: Ray Bernard, Security Executive Council Subject Matter Expert Faculty TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com. | |
 |
| Security Master Planning Created By: Timothy Giles, Security Executive Council Emeritus Faculty Member TIER 1 LEADERS:To obtain your discounted copy send an e-mail to contact@secleader.com. | |
 |
| Supply Chain Security: The Art of Connectivity Management Created By: Peter Cheviot, Security Executive Council Emeritus Faculty Supply Chain Security offers great opportunities for Security Management to influence and connect security policy compliance to financial returns. This presentation explains the fundamental ways to bring it into your security objectives and how to measure your financial gains. TIER 1 SECURITY LEADERS:To obtain your member discounted copy contact the Director of Member Services. | |
 |
| Tabletop Exercises Created By: Security Executive Council Active Shooter? Chemical Spill? Product Tampering? Severe Weather? Do you have incident response plans to cover these risks and others that may impact your business? Close coordination among all first responders will ensure, to the highest degree possible, that all available resources are effectively deployed. The swift response and recovery from these and other incidents will allow your company to effectively positively impact the protection of your people, assets, and bottom line. TIER 1 LEADERS: To obtain your discounted copy send an e-mail to contact@secleader.com. | |
 |