The Security Executive Council’s suite of corporate security-specific assessments helps security leaders identify the function’s current state, pinpoint gaps, identify options, and communicate the way forward to executive management.

Comprehensive analysis 

The SEC has worked with practitioners in many industries, combining the Collective Knowledge™ of successful former security executives with Security Leadership Research Institute (SLRI) research to develop many assessments for different facets of the security function.

This suite, the Five Tools for Security Success, takes security leaders from high-level review to deep-dive analysis to provide a comprehensive view of the state of security.

Five Tools for Security Success

These include the following:

Security Success Universe Assessment

  • Identifies gaps and weaknesses.
  • Aligns with executives on the concept of security.

Maturity Assessment

  • Establishes baseline status.
  • Measures service level.

Program Comprehensiveness Review

  • Defines program magnitude.
  • Determines options for incremental improvement.

Quality and Performance Review

  • Establishes quality controls and performance measurements.
  • Ties performance to quality and cost.

Internal Value Analysis

  • Establishes value vs investment.
  • Tracks expenditures by customer and risk.

Understand how AI can transform business security strategies with our insights and analysis on AI in security.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...