Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Home » Publications » Security Magazine

Security Magazine

November Emagazine cover

2022 November

This month, Security magazine releases its annual The Security Benchmark Report, which includes comparisons of all security functions, sector reports and top critical issues. This editorial report provides security teams with metrics the can use to measure their security functions against their peers.

Throughout this month, check out stories on security careers, campus security tech, security metrics, human trafficking, leadership and management, cyber strategies and more! 

  • Cover Story
  • Featured Articles
  • Columns
  • Departments

Cover Story

Back to Top
Benchmark report feautre
Special Report

The 2022 Security Benchmark Report — Main Report

The 2022 Security Benchmark Report includes comparisons of security functions, sector reports, top critical issues and achievements.
Maggie Shein
Maggie Shein
November 1, 2022

The 2022 Security Benchmark Report includes comparisons of all security functions, sector reports and top critical issues. This editorial report provides security teams with metrics they can use to measure their security functions against their peers.


Read More
SEC-1122-SBR-Report-Sector_1170x658.jpg
Special Report

The 2022 Security Benchmark — Sector Reports

The Security Benchmark Report data is broken up by sector to offer more direct comparisons among peer organizations.
Maggie Shein
Maggie Shein
November 1, 2022

Data from The Security Benchmark Report is broken down by sector to allow for specific security comparisons across various market sectors. For The Security Benchmark Sector Reports, you’ll see data regarding security’s roles, responsibilities and budgets broken down by sector.


Read More
SEC-1122-SBR-Report-Achiever_1170x658.jpg
Special Report

The 2022 Security Benchmark Report — Achievers

The Security Benchmark Report recognizes the achievements of this year's security teams.
Maggie Shein
Maggie Shein
November 1, 2022

The 2022 Security Benchmark Report recognizes security leaders achieving great things in training, making strides in diversity, equity and inclusion, adding value and enabling the business and more.


Read More
method
Special Report

The 2022 Security Benchmark — Methodology

More About The 2022 Security Benchmark Report
Maggie Shein
Maggie Shein
November 1, 2022

The purpose of The Security Benchmark Report is to create a database to measure security teams and organizations versus their peers, both among the industry as a whole and among individual sectors, for even better comparison.


Read More

Featured Articles

Back to Top
Man and women on phone

How security training can reduce human trafficking in hotels

Security teams in the hospitality industry must work diligently to prevent and identify human trafficking in and around their facilities.
Author
Jan Edwards
November 14, 2022

Security teams in the hospitality industry must work diligently to prevent and identify instances of human trafficking in and around their facilities.


Read More
collage

Leveraging non-traditional experience to drive your security career

Security professionals can cross-market skills from life experiences and other professional positions to excel in the security industry.
Adam Stone
November 14, 2022

Security professionals can use non-traditional experiences and cross-marketed skills to help excel in the security industry.


Read More
Convention

Direct access: The value proposition of ISMA

The International Security Management Association (ISMA) is shaping the direction of security risk management and enabling senior security executives to drive value to their organizations.
Maggie Shein
Maggie Shein
November 14, 2022

The International Security Management Association aids senior security executives and arms them with tools and solutions to prove the value of security.


Read More

Columns

Back to Top
Police

An inside look at University of Maryland, Baltimore’s campus safety tech

Security technology plays a critical role in the crisis response, situational awareness and emergency communications at the University of Maryland, Baltimore.
Lori Stone
Lori Stone
November 16, 2022

Security technology plays a critical role in the crisis response, situational awareness and emergency communications at the University of Maryland, Baltimore.


Read More
Cyber Tactics
Cyber Tactics

The 4 horsemen of the cybersecurity apocalypse

There are four high-level risks hurtling toward your organization right now — spanning across industry verticals and geographies. 
John McClurg
John McClurg
November 9, 2022

There are four high-level cybersecurity risks hurtling toward your organization right now — spanning across industry verticals and geographies.


Read More
Person Traveling
Career Intelligence

Press pause to advance your security career

Sometimes taking a break is the most important step a security leader can take
Pollock-2016-200px.jpg
Joanne R. Pollock
Brennan-2016-200px.jpg
Jerry J. Brennan
November 7, 2022

It is easy to get caught up in the demanding pace of security careers, however a break is often the most beneficial thing a security leader can take.


Read More
Group of people
Leadership & Management

Startup leadership: It’s all about the culture

How does leadership in a startup — particularly a security startup — differ from leadership in other environments?
Michael Gips
Michael Gips
November 7, 2022

Any new security startup calls for fitting leadership and a corporate culture that encourages respect, business innovation and employee retention.


Read More
Security Benchmark Report
Security Talk

Which security metrics are most impactful?

Let’s take a deeper dive into what security performance metrics are most impactful to agencies and organizations.
Maggie Shein
Maggie Shein
November 4, 2022

This issue presents Security magazine’s 2022 Security Benchmark Report; let’s dive deeper into the security performance metrics that are most impactful to security leaders’ organizations. 


Read More
cyber-insurance-fp1170xv45.jpg
Cybersecurity Education & Training

Why cyber insurance protection is mission-critical for your business

There are simple things that organizations can do to minimize cyber insurance premium increases.
Neil Jones.jpg
Neil Jones
November 3, 2022

The best strategy to keeping cyber insurance premiums manageable is to implement effective cybersecurity hygiene and data protection practices to protect your enterprise.


Read More

Departments

Back to Top
Security Lock
Global News

6 steps to respond to enterprise cybersecurity challenges

Cybersecurity is becoming an enterprise-wide issue beyond the chief information security officer’s (CISO’s) office.
Maria Henriquez
November 18, 2022

Learn about six strategies to prevent cybersecurity threats and reduce data breaches.


Read More
Featured Products
Product Spotlight

Product spotlight on security analytics

Maria Henriquez
November 18, 2022

Security magazine highlights security analytics that can help leaders gather new sources of business intelligence; add value to the organization beyond security; and enhance security measures with artificial intelligence.


Read More
Retail store

Retail security and loss prevention trends

Maria Henriquez
November 11, 2022

Discover current retail security, loss prevention and asset protection trends.


Read More
Global News
Global News

6 strategies to reduce workplace violence risk

Maria Henriquez
November 9, 2022

Here are six steps your organization can take to reduce workplace violence.


Read More
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing