Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Using Crime Data to Drive and Defend Security Resource Allocations

By Steven K. Aurand
DoorwaySecurity Thresholds based on Crime Forecast 2
DoorwaySecurity Thresholds based on Crime Forecast
Security budgets diagram
DoorwaySecurity Thresholds based on Crime Forecast 2
DoorwaySecurity Thresholds based on Crime Forecast
Security budgets diagram
May 1, 2012

The most enduring theory of W. Edwards Deming – one of the business world’s most respected authorities on organizational theory – was that unless an activity is measured, it cannot be properly managed. Dr. Deming believed that all decision-making must be driven by reliable data, and this once revolutionary concept is now accepted as a fundamental management practice at most corporations around the globe.

For corporate security professionals seeking to measure and manage the available tools and processes designed to protect their organization’s people and property, taking a data-driven approach to decision-making has never been an easy task; particularly for those responsible for the physical security of multiple locations, where reliable information is not always available or consistent; where assets, conditions and countermeasures may differ; and where a relevant baseline for measurement can be difficult to establish.

Despite these very real challenges, corporations increasingly require security professionals to apply Deming’s quantitative approach to justify their recommendations regarding selection of security procedures and equipment. Anecdotal reports, past experience and personal insights have been replaced by objective comparisons, cost/benefit analyses and industry best practices as the basis for all resource allocations, performance evaluations and management of liability exposure.

Regardless of an organization’s real or perceived security risks, and particularly in the current economic environment, if a security professional can’t provide senior management with well-reasoned and clearly articulated justifications for necessary resources that are based on empirical data, there may be at least one of two unpleasant outcomes:

•  Requested security budgets are denied or reduced, and/or

•  Senior management begins looking for someone who understands Deming’s theory

For both reasons, an increasing number of security professionals at companies of all sizes have adapted to a new business world that’s driven by quantitative analysis, by learning how to leverage blended crime forecasting data to create, justify and anticipate returns on investments in equipment and human resources, and also to manage premises liability risk, in a manner that puts a smile on the face of their company’s CFO.

 

How Crime Forecasting Data Can Be Leveraged

Not all elements of a corporate security program are easily measured. However, crime statistics and other demographic information for a specific location and its surrounding geographic area should play an important role in security deployment decision-making. In selecting external crime data on which to rationalize those decisions, it’s important to understand the difference between standard police reports and blended crime forecasting data.

In general, while law enforcement intelligence alone can provide helpful insight into a location’s crime risk potential, those reports tend to vary in consistency from jurisdiction to jurisdiction and are retrospective, looking back at what crime has occurred in the past. Blended external data combines police reports with a range of other demographic information in order to gauge a location’s level of social disorganization, and provides a more robust projection of crime that is likely to occur in the future.

The usefulness of blended crime data for security professionals is two-fold: it provides a more reliable evaluation of a location’s crime risk, and in turn, that consistency facilitates a scoring system that measures relative levels of risk at various locations. This external benchmarking – when combined with a company’s location-specific internal data such as claims/incidents history, shrink and other loss variables – enables companies to develop, rationalize, establish and defend security threshold levels and their corresponding resource allocations.

As figure 1 suggests, crime forecast ratings can serve as the basis for classifying the risk profiles of various locations, which in turn, facilitates a consistent approach to assignment of physical resources.

 

Nationwide Insurance Applies Data-Based Benchmark

The practical benefits of applying a data-based weighted benchmark for security resource allocation is apparent for many large companies, including Columbus, Ohio-based Nationwide Insurance, which maintains approximately 400 retail office locations at all times, and opens at least five new offices each year. Jay C. Beighley, who has overseen Nationwide’s security operations since 2001 and previously served as security director for the State of Ohio, was also responsible for security at two well-known retailing firms, and has authored two books and several articles in his 20+ years as a security professional.

According to Beighley, blended crime forecast reports enable Nationwide to establish a consistent starting point for measuring relative levels of crime risk at its retail locations, and for assignment of appropriate security resources. This uniformity provides Nationwide with several practical benefits, including:

•  The ability to maintain an efficient system for assignment of physical resources. Risk management formulas can never be 100-percent perfect, but if they are based on reliable data and updated regularly, they offer security professionals the most efficient means of objective, rational and defensible resource allocation.

•  Reduced personnel and travel-related costs.For companies with multiple locations, even those significantly smaller than Nationwide, the expense related to providing boots on the ground to assess risk levels at every new and existing location can be cost-prohibitive.

•  A defensible position for premises liability litigation that may arise.The key inquiry in these cases is based on whether a premises owner may be held liable for failing to protect people from the results of reasonably foreseeable criminal conduct. If and when a third-party criminal event occurs, a well-documented multi-tier risk management plan that addresses the issue of foreseeability provides companies with protection against an adverse verdict.

•  Purchasing leverage with various security resource vendors, by demonstrating the company’s intentions to maintain specific levels of investment.Vendors that know a company is committed to providing specific and consistent levels of security are often far more likely to offer volume-related incentives or discounts for their products and services.

“Most importantly,” according to Beighley, “the ability to build, explain and monitor a rational system for risk management of Nationwide’s assets builds confidence in our professionalism across the entire organization. For a well-known property & casualty insurance provider like Nationwide, this is an important part of our internal culture as well as our external brand reputation.”

 

Crime Forecast Data Leveraged by Many Banks

Nationwide Insurance is not alone in how it applies crime risk data as a basis for security resource allocation.  Established in 1898, Raleigh, NC-based First Citizens Bank operates more than 430 branches located in 17 states and Washington, D.C. Larry Brown, the bank’s senior vice president of Corporate Security who also serves as chairman of the ABA Bank Security Committee, considers blended crime risk data to be an essential planning tool.

Because of the bank’s historically strong balance sheet, First Citizens has rapidly expanded over the past decade, and continues to increase its national footprint.  As growth continues, the bank must address all of the related security issues. According to Brown, blended crime data reports are particularly useful for selection of sites for new bank branches. When a new branch is in the planning stage, First Citizens’ facilities division forwards Brown a list of possible locations within the selected community. Brown then generates a risk assessment report for each potential address, and also receives a county score that compares the site to the average risk of the county, state and national site risk scores. This information is supplemented with average scores from the past and a forecast of future scores.

Additionally, Brown’s recommendation for site selection is based on demographic information for the surrounding population and a map that visually identifies risks within a three-mile radius. He uses the data to validate or dispute reports he receives from local law enforcement and other credible sources, such as his peers at banks in the area. If there is a significant discrepancy between the data and local opinion, then Brown digs deeper to resolve the differences and get a clearer view of the site’s risk profile before a final decision is made.

One of the cases requiring closer examination involved a potential branch site – located directly across the street from a police station – that reflected a relatively high risk rating. Further investigation by Brown, however, showed that all crimes in the area had mistakenly been attributed to the police station address, which in turn, incorrectly reflected the potential branch location as an exceptionally crime-prone location. By investigating this apparent anomaly, Brown was able to identify a prime location for a bank branch.

The ability to run comparative reports on existing branches also enables First Citizens to monitor rising and falling risk levels. The comparison reporting function has allowed Brown to better allocate his security budget. “We want to spend our resources wisely and not all locations in a region need to have the same level of security, nor do they always remain the same,” he notes.  Our data-based approach better equips us to decide which branches might need enhanced security, such as security vestibules or bullet-resistant glass.

This is also the case at Green Bay, Wisconsin-based Associated Bank, which operates nearly 270 offices in Wisconsin, Illinois and Minnesota. According to Mark Heffernan, vice president of Physical Security at Associated Bank, crime forecast information plays an essential role in resource allocation and is directly related to the safety of employees and customers.

Associated Bank established a risk-based rating system at all of its locations a few years ago. Heffernan notes, “This system is a combination of six separate measurements, including type of location, amount of cash on hand and blended crime risk data for the area. We view the data-based score as a true independent indicator of the risk environment in which a particular branch is operating.”

Associated Bank’s rating system categorizes all of its branches as high, medium or low risk. Based on that rating system, the bank establishes security standards for each branch involving, for example, CCTV/DVD systems, remote monitoring, security guards, RFID, EAS and physical design considerations. Branches with higher risk ratings typically receive a greater level of security equipment than branches with relatively lower risk assignments.

 

Risk Rating Systems Must Have Flexibility

The diversity of locations in which banks like First Citizens and Associated Bank operate illustrates the importance of building flexibility into the creation of any security resource allocation strategy that’s anchored with consistent crime risk data. While external risk information provides an objective basis for a retail operation’s risk classifications and initial resource allocations, decision making must be flexible and factor in recent internal, location-specific crime experience. 

As the theoretical chart below suggests, specific locations that have been classified using a well-defined risk categorization strategy can be re-allocated as a result of recent crime activity. For example, a bank location rated as a “Level C” risk based on blended crime data, might be re-assigned to a “Level B” risk if a robbery has occurred at that location within the past two years.

 

Converting Crime Data into Tangible Outcomes

The cost implications and planning advantages of a flexible, tiered risk management system are readily apparent, easily understood and well appreciated by a company’s senior managers. Notably, using statistical analyses of its own internal data combined with blended external information, a company with multiple locations can optimize security resource allocation and achieve potential savings on countermeasure expenditures.

As depicted in Figure 2, a large retail operation with 1,000 stores currently spends $13.75 million annually by employing security guards on a consistent basis at all of its locations. By using crime forecast data to categorize 4 distinct levels of risk, and by using statistical analyses to determine the optimal allocation of security guards at each location, this company has the potential to reduce its overall security guard expenditure by $5.5 million annually.

Using the same 1,000 location example, the company additionally has the potential to reduce its overall expenditure for armored car service by $4.8 million annually. This same principle applies for companies of all sizes, with their potential for savings based largely on the number of locations they operate, and the types of security countermeasures they employ.

Increasingly, security professionals are becoming more adept and comfortable using objective crime data to identify future trends, to analyze the impact of decisions or events, and to evaluate the performance and economic justification of tools and resources.

Correspondingly, as the level of analytical sophistication and application of data-driven decision making increases across companies of all sizes and industries, these loss prevention and security resource allocation methodologies will no longer be considered cutting edge solutions; they will eventually be viewed as standard practices for prudent risk management.

Corporate security professionals who understand, introduce and successfully manage data-driven disciplines are currently in a position to provide significant, tangible benefits to their companies and to their own careers. Those who drag their feet should be prepared to explain what they’ve been waiting for.  

KEYWORDS: corporate security program crime statistics Dr. Deming security budget

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0512 cap slide4 150px

Steven K. Aurand is chairman and CEO of CAP Index, Inc., a company he founded in 1988 with noted criminology professor Dr. Robert M. Figlio, based on landmark research that predicted with a high degree of accuracy the likelihood of crime at specific locations. He holds an undergraduate degree from Haverford College, and completed graduate studies in criminology and statistics at the Wharton School of the University of Pennsylvania.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • risk-3576044_1280 (1)

    Using ESRM to Drive Success with ISO Risk-Based Standards

    See More
  • Top 3 Misconceptions About Data After Death - Security Magazine

    Using a Privacy-First Mindset to Transform Data into Intelligence

    See More
  • office

    Using technology to protect your security assets, workforce and data

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!