Research conducted by the Security Leadership Research Institute (SLRI) and Kennesaw State University has been accepted for publication by the journal Information and Computer Security.

'Organizational perspectives on converged security operations' was published online on November 1 and will appear in an upcoming print issue of the journal. The study is the first phase of a multiphase project that will dive into issues such as metrics, staff group structures, cost, and current practices in security optimization efforts being implemented by organizations.

Security collaborative optimization

All submissions to the journal are subject to double-blind review by academic experts

Information and Computer Security examines the impact of user and organizational behavior on information security. All submissions to the journal are subject to double-blind review by academic and industry experts to ensure the research is valid and relevant.

The paper’s publication reinforces the validity of our research, which found that security convergence can also take the form of what we coined 'security collaborative optimization' between corporate and cyber security functions to enhance risk mitigation efforts in an organization,” says Kathleen Kotwica, Principal Analyst for the SLRI and EVP and Chief Knowledge Strategist for the Security Executive Council (SEC).

She adds, “This is the first phase of security convergence research we are doing to assess how it's playing out in our security community.”

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...