The Security Executive Council’s (SEC) Security Leadership Research Institute (SLRI) is partnering with Kennesaw State University’s Coles College of Business to research the current state of security convergence.

The SLRI recognizes that there are a variety of ways in which corporate and cyber security interact within organizations, so rather than referring to convergence as a singular achievement, they define it along a spectrum of collaboration in which most organizations can find themselves.

Optimizing risk mitigation

Through this research, they hope to build an improved model of how corporate and cyber security can or should work together for optimized risk mitigation. The study will also identify the benefits and costs that come from security convergence at different places along the convergence continuum.

The SLRI is looking for security practitioners to participate in a 20-minute survey to help build out this research. All information collected will be kept confidential, and results will be shared only in aggregate form, with no link between participants and the organizations they represent.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...