Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementThe Security Benchmark ReportSecurity Leadership and Management

2018 Security 500 Report: Metrics, Budgets & Accomplishments

By Diane Ritchey
SEC1118-cover-Feature-slide1_900px
SEC1118-cover-slide2_900px
Fig. 2. Security 500 Members report into or are within these departments.
SEC1118-cover-slide3_900px
Fig. 3. A break down of member's Organizational Responsibilities.
SEC1118-cover-slide4_900px
Fig. 4. We’re excited to provide data on security budgets – 62% of Security 500 respondents reported budget increases from 2017.
SEC1118-cover-Feature-slide1_900px
SEC1118-cover-slide2_900px
SEC1118-cover-slide3_900px
SEC1118-cover-slide4_900px
November 1, 2018

Welcome to the 2018 Security 500 report, which includes the 2018 Security 500 rankings and sector reports. Our annual Top 10 Trends will be officially unveiled in a webinar later this month.

We’re excited to provide data on security budgets – 62% of Security 500 respondents reported budget increases from 2017 – in addition to data on where Security 500 Members report into within their enterprises, and a question about the use of a security metrics program that defines productivity, value creation and cost avoidance.

SEC1118-cover-rankings-BLOCK_300px
Click here to view the
Security 500 rankings
SEC1118-cover-sectors-BLOCK_300px
Click here to view the
Security 500 sectors

 

This year's Security 500 survey included questions about some of the successes that enterprise security achieved in 2017. The answers were impressive, and included:

  • “Maintaining best in class standards and practices despite rapid growth in new lower cost locations while meeting new and existing regulatory expectations.”
  • “Mandatory Workplace Violence (WPV) and active shooter response (Run, Hide, Fight) training for all employees.”
  • “We were not victims of terrorist activity and we kept our employees safe while traveling.”
  • “Reduction of loss through solid prevention program that resulted in $6.2 million in loss prevention.”

We also asked questions about the types of security technology that Security 500 Members will employ in their enterprises in the future. Some of those responses:

  • A drone detection system.
  • An Incident Response Program.
  • An enhanced vendor and third-party risk management program.

A comprehensive list of successes, technology, and strategies/philosophy changes that enterprise security executives expect to implement in the coming year will be also be discussed in the Security 500 webinar on November 20, 2018. The webinar will be available on-demand until November 2019.

 

What security technology/technologies do you expect to implement in the coming year?

  • Piloting several technologies to determine their capabilities and fit-for-use within our environment, to include wireless hand-held credential screeners, drone fleets, robots, credential kiosk in lobbies and other perimeter entry areas and smart camera software.
  • Thermal cameras, turnstiles, man traps, virtual fencing with cross line detection and license plate recognition.
  • Two-factor access control, expanded video storage and improved security at the perimeter.
  • Stop the Bleed training for officers.
  • A drone detection system.
  • Addition of video analytics to our video management system.
  • Increase our focus on students in our cybersecurity program, including hiring several student workers to be a part of our security team for the first time to help supplement our security operations center initiatives. 
  • Exploring access control components such as optical turnstiles in our public lobbies and metal detectors in our Emergency Department.
  • Active monitoring of employee and non-employee populations.
  • More social media monitoring technologies.
  • Encrypted solutions on every security device or technology.

 

What strategy/philosophy changes do you expect to implement in the coming year?

  • Implementation of an electronic visitor management system and requiring sex offender registry check and photo identification for all visitors, to include parent, vendors, contractors and others.
  • Exercising Enterprise Security Risk Management (ESRM) in all security decisions.
  • An increased effort to obtain external partnerships to allow us to further mitigate risk.
  • An examination of how we respond to non-criminal matters, such as those when an individual is in crisis. 
  • Expansion of our Security Liaison program where we partner with a clinical team to support them in caring for our patients. 
  • Expanded active shooter awareness to include framework for implementing strategies such as ALICE training for employees. 
  • Education and deployment of an enterprise-wide security plan.
  • Be more proactive – hunt for threats rather than responding to them after the fact.  
  • Continuing to add Intruder Deterrent Locks to all of our classroom spaces.
  • Present a business case to expand the security/safety strategy to other business components of the enterprise.
  • Improvement in guard skills and performance through greater compliance and salaries. The greater the core competencies, the greater the salary required, the greater the performance.
  • Continued focus on process excellence, particularly around regulatory topics (privacy, DHS anti-terrorism standard), crisis management, including more robust plan testing.
  • Transform some of the security services provided in the field to more strategic and less tactical everyday resolution of issues. 
  • Greater focus on training for international travel.
  • Increased security and data protection measures to understand where the data is, how it is used, and how to best categorize it.
  • Introducing a mass communication system to assist us in warning people of significant events occurring on campus in close to real time.

 

What was your security organization’s greatest achievement in 2017?

  • The acceptance of the Global Security Operations Center as being a central point/clearing house of information for various business entities within the enterprise.
  • 100% of all Security Officer staff received credentialing with the International Association for Healthcare Security and Safety.
  • Contracted with local sheriff's department to provide armed security in the Emergency Department.
  • Significant expansion of community policing to increase community involvement in overall community safety and awareness.
  • Weathering Hurricane Harvey, and Winter Ice Storm Inga that arrived a few months after Harvey, including transporting nearly 70 physicians, nurses and medical technologies into the medical center, rescuing medical professionals from rising waters, distributing relief supplies to our own employees in need, responding to medical emergencies and crimes, and deployed extra officers to ensure the safety of our buildings.  
  • Rolled out an asset protection program in the SE Asia Region.
  • Creation of a program to offer support to staff in caring for victims of violence.
  • More than 2 million people safely attended events at our stadium in 2017.
  • Movement to the cloud for physical access control and visitor management. 
  • Completion of a unified security system installation.
  • Development and implementation of a firm-wide security awareness and education program that provides topical security content to support employees and customers, utilizing on-demand video.    
  • Developed a multi-disciplinary fraud and cyber risk mitigation.
  • Significant support provided during 60 straight days of EOC activation in response to major hurricanes Harvey, Irma and Maria, a strong earthquake in Mexico and wildfires in the Western U.S.
  • Protective Services secured approval and funding for access control renovation across the enterprise.
  • For the first time we were able to conduct an Active Assailant exercise with classes in session.
  • Creation of a Global Security Operations Center, successfully securing operations at the Korea Olympics and Russia World Cup.
  • Took on five additional corporate retail locations out of state, on-boarded each location's management team, coordinating intrusion system and NVR upgrades, all while coordinating a major corporate office remodel and move concerning keys/cores and doors.
  • The arming of our security officers.
  • Identification and initiation of remediation efforts to reduce cyber risk to our company.
  • Development of opioid addiction committee with key community members and action programs, including community outreach initiatives, which assisted in reducing drug related deaths by 30% from the January 2017 to June 2018 time period.
  • In 2017 we chartered and implemented an executive level Risk Committee, charged with managing all risk associated with security of the organization. A metrics report program was created to keep the committee informed, and an enterprise integrated risk management for security program was established. The program was briefed to the membership and Board of the organization.
  • Managed budget reduction while dealing with increase in total incidents.

 

 

KEYWORDS: security benchmarking security budget security risk management Security trends

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1118-rankings-Feature-slide_900px

    The 2018 Security 500 Rankings

    See More
  • SEC1118-method-Feature-slide_900px

    The 2018 Security 500 Methodology

    See More
  • SEC1118-sectors-Feature-slide1_900px

    The 2018 Security 500 Sector Reports

    See More
×
Fig. 2. Security 500 Members report into or are within these departments.
Fig. 3. A break down of member's Organizational Responsibilities.
Fig. 4. We’re excited to provide data on security budgets – 62% of Security 500 respondents reported budget increases from 2017.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!