Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark
eBook - ePub

Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark

Research Report

  1. 76 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark

Research Report

About this book

This research report presents the findings of a broad survey of corporate security programs conducted by the Security Executive Council's Security Leadership Research Institute (SLRI). The researchers' objective was to benchmark the state of the security industry in terms of organizational structure, budget, staff resources, board-level risk concerns, program drivers, and services provided. The level of responsibility each respondent reported for a list of 30 security programs or services is also compared across several organizational categories.This report can be used by security professionals for introspective analysis of the security team within their organizations, external review of the ways in which other organizations approach risk management, internal justification of security budgets and initiatives, and for performance metrics.Corporate Security Organizational Structure, Cost of Services and Staffing Benchmarkis a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.- Summarizes the key findings of a large survey on security programs conducted by the Security Executive Council's Security Leadership Research Institute (SLRI)- Breaks down survey responses by organization size, scope of responsibility, industry, and more in easy-to-read charts and tables- Provides invaluable insight into other organizations' existing security programs and services

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark by Bob Hayes,Greg Kane,Kathleen Kotwica in PDF and/or ePUB format, as well as other popular books in Business & Information Management. We have over one million books available in our catalogue for you to explore.

Information

Survey Results

Section I: Organizational Demographics

In this section, information about the participants in this survey is provided. These demographics are used later in the report to provide metrics that enable organizations to compare apples to apples. A key takeaway from this first section is the diversity of the respondents’ organizations.
image
Figure 1.01 The geographic scope of the organization’s business (note: the original survey question defined regional as regional within a nation).
image
Figure 1.02 The regions of the world the organizations operate in (respondents could choose multiple regions).
Although a large number of industries are represented (see Figure 1.03), there were too few participants in this survey to warrant categorizing all of the following results by industry. Instead of providing possibly misleading metrics, it was decided not to provide a breakdown by industry for most of the analysis that follows.
image
Figure 1.03 The industries represented by the respondents’ organizations.
image
Figure 1.04 The organizations’ annual revenue (revenue was converted to U.S. dollars when appropriate).
image
Figure 1.05 The total number of employees per organization.

Section II: Respondent Demographics

In this section, the typical characteristics of the practitioners participating in the survey are examined.
Due to the many different titles used in the security and risk management field, the survey asked the participant to select the title level he or she felt best matched his or her position in the organization (see Figure 2.01).
image
Figure 2.01 The title level of individuals participating in the survey.
Further analysis of the data collected about security areas managed (Figure 2.02) showed that 53 percent of respondents managed only corporate security/physical security, and 7 percent managed only information security. Sixteen percent of respondents had responsibility for both corporate security/physical security and information security.
image
Figure 2.02 The security areas managed by respondents (respondents could choose multiple areas).
To get a better idea of the level within the organization in which the typical security and risk management executive operated, two questions were asked: what is the title level that best represented who they reported in to (Figure 2.03), and how many reporting levels the respondent is removed from the organization’s senior-most operating executive (Figure 2.04). The data in these two figures show that 73 percent of respondents report to a vice-president level individual or above, and 61 percent are within two reporting levels of the senior-most operating executive.
image
Figure 2.03 The reporting level of respondents within their respective organizations.
image
Figure 2.04 The number of levels of reporting between the respondent and the organization’s senior-most operating executive.
Further analysis of the levels of reporting indicated that the size of the organization did not appear to be a determining factor in whether or not a security executive is likely to directly report to the senior-most operating executive.
There was little commonality regarding the business area in to which the security groups report (Figure 2.05), with no clear correlation between the business area and any attribute measured in this survey, including industry, organization size (measured by revenue and employee count), scope of organization, and scope of responsibility.
image
Figure 2.05 The business function to which each respondent’s security group reports.
Examples of functional areas that fell into the ā€œotherā€ category consisted of:
• Security/corporate security
• Asset protection
• Director of police and security/law enforcement
• Security, crisis management, bus...

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Executive Summary
  6. Survey Results
  7. Appendix A. Board-Level Risk Categories
  8. Appendix B. Data Cleansing
  9. Reference
  10. About the Authors
  11. About Elsevier’s Security Executive Council Risk Management Portfolio