This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » 2011 Security 500 Sector Reports
Security 500 Report

2011 Security 500 Sector Reports

Security 500 Sector Report #1
Security 500 Sector Report #2
Security 500 Sector Report #3
Security 500 Sector Report #4
Security 500 Sector Report #5
Security 500 Sector Report #6
Security 500 Sector Report #7
Security 500 Sector Report #8
Security 500 Sector Report #9
Security 500 Sector Report #10
Security 500 Sector Report #11
Security 500 Sector Report #12
Security 500 Sector Report #13
Security 500 Sector Report #14
Security 500 Sector Report #15
Security 500 Sector Report: Ports and Terminals
Security 500 Sector Report: Retail/Restaurants/Convenience Stores/Food Service
Security 500 Sector Report:Transportation/Logistics/Supply Chain/Dist/Warehousing
Security 500 Sector Report: Utilities (Power, Electric, Gas, Nuclear and Water)
Security 500 Sector Report #1
Security 500 Sector Report #2
Security 500 Sector Report #3
Security 500 Sector Report #4
Security 500 Sector Report #5
Security 500 Sector Report #6
Security 500 Sector Report #7
Security 500 Sector Report #8
Security 500 Sector Report #9
Security 500 Sector Report #10
Security 500 Sector Report #11
Security 500 Sector Report #12
Security 500 Sector Report #13
Security 500 Sector Report #14
Security 500 Sector Report #15
Security 500 Sector Report: Ports and Terminals
Security 500 Sector Report: Retail/Restaurants/Convenience Stores/Food Service
Security 500 Sector Report:Transportation/Logistics/Supply Chain/Dist/Warehousing
Security 500 Sector Report: Utilities (Power, Electric, Gas, Nuclear and Water)
November 1, 2011
KEYWORDS security benchmarking / security leaders / security leadership
Reprints
No Comments

2011 Security 500 Methodology

 

The Security 500 Benchmarking Survey is based on information from several sources:

•  Data supplied directly by the organizations

•  Data obtained through public resources/records

 

The Security 500 tracks 19 vertical markets and collects unique data where appropriate (such as patients in healthcare) and applies this data to key metrics. The key metrics collected this year include:

Security Spending/Person

Security Spending/Revenue

Security Officers/Employee

Security Officers/Facility

“Person” is focused on the type of person the security budget is intended to protect. Examples include employees, citizens, students and patients. Rankings within each sector were primarily based on total revenue or operating budget, security budget and “person” data.

Several sectors had a coach who helped us customize questions for data collection and benchmarking purposes. Therefore, there were a series of general questions that all participants completed and unique questions within each sector. It is important to note that based on input from our sector coaches and our new research partner, the methodology has changed from prior years and results from prior years may have shifted significantly in some sectors.

 

The 2011 Security 500 Survey includes the following:

•  Sectors were measured and evaluated on metrics among peer organizations

•  The data requested and metrics used to benchmark within each sector were based on the input of our advisors.

 

The purpose of the Security 500 is to create a reliable database to measure your organization versus others and create a benchmarking program among security organizations. The results will enable you to answer the question, “Where Do I Stand?” as a basis of an ongoing peer review process.

Due to the greater accuracy of the information provided by security executives compared to that of estimations, completed entries were given greater weight in the rankings than the estimations.

Additionally, the sector in which a company is ranked is based on self-reported information. For example, one clothing retailer may select “Retail” and another clothing manufacturer may select “Manufacturing/Industrial” as their vertical markets. 

Based on continued feedback and the goal of creating a valuable resource for our participants and industry, the Security 500 is spread across 19 different sectors.

We recognize that as a result of the continued unprecedented economic changes that some organizations and their security leaders may no longer be in place. The listings are based on the information available at the time of publication. Each participating organization will receive their confidential report by December 31, 2011.

Subscribe to Security Magazine

Related Articles

2014 Security 500 Sector Reports

2011 Security 500: Alphabetical

2010 Security 500: 15 Sectors

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cybersecurity breach

The Top 12 Data Breaches of 2019

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing