Enhance your knowledge and decision-making with the latest security research from the ASIS Foundation. Executive summaries are open to all and full reports are complimentary for ASIS members.
The ASIS Foundation has just released a new study identifying and describing the relationship between cybersecurity, physical security, and business continuity functions in organizations and the extent to which the three functions work independently, two of the three are converged, or all three are completely converged. The research also explores necessary success factors in creating a high-functioning integrated enterprise risk model, from both organizational and strategic perspectives.
Using survey responses from more than 1,000 security leaders in the U.S., Europe, and India, plus more than 20 follow-up interviews, the study provides a ‘current state’ of the relationship among physical security, cybersecurity, and business continuity. It provides relevant benchmarks to compare strategies, plans, and operations and determine best practices for creating more effective and cost-efficient security and risk operations.
Download the complimentary executive summary or receive the full report now available free to ASIS members.
Not a member? Join today and get this exclusive member benefit ($195 value) free with your membership.
Download | Purchase (nonmembers)
The ASIS Foundation funds practical, actionable research to benefit the security management profession. The research process is guided by the volunteer Foundation Research Committee. With input from ASIS staff and members, the Committee identifies research priorities for the next 1-2 years. It then develops RFPs (requests for proposals) on desired security management topics and circulates those to the research community. The RFP specifies the research scope, budget, and deadlines.
Potential researchers are invited to submit research proposals in response to the RFPs. The proposals are reviewed and rated by the Research Committee and a final project is selected for funding. A contract is signed with that research team. The Foundation usually funds 2-3 projects per year, depending on budget, and research projects are generally completed in one year or less.
Contact Peter Ohlhausen for questions about the RFP process or to be added to the distribution list for the next RFP.
- State of security management
- Security risk management
- Emerging security technologies
- Resilience in security
- Diversity, equity and inclusion in security
Submit a Research Topic
Prepare a one-page overview of the subject including the research questions, how the research would benefit security practitioners and why you believe it is important and timely to address this topic.
Send your suggestion to Beth McFarland, Foundation Director, who will share them with the Research Committee for consideration.
The Committee will then review the suggestion and may add it to the research agenda for a future project.
Resilience, Business Continuity, and COVID-19
To help security professionals benchmark and learn from one another, the ASIS Foundation completed a year-long project that tracked the response, continuity, and resilience of organizations during the worldwide COVID-19 pandemic. Read Article
This technical university in southeast Asia—which has a 75-acre campus and serves about 15,000 students—initially treated the COVID-19 outbreak as an influenza event, activating its business continuity practices and assembling its executive level crisis management team.
Many retailers of nonessential goods have been forced to close up shop and concentrate on online sales, and this global retailer is no exception.
Produced in partnership with BOMA International (BOMA) and the Security Industry Association (SIA), Intelligent Building Management Systems: Guidance for Protecting Organizations provides a framework for decision-makers to assign a risk-based criticality or impact to their building and asks relevant security questions to develop appropriate mitigation strategies.
The guidance is based on original research that provides an exhaustive overview of identified intelligent building critical vulnerabilities and mitigation strategies.
This innovative research initiative identifies seven key change drivers impacting the security profession. Understanding the implications of these changes will allow leaders to better navigate the evolving environment and develop effective strategies for a new, emerging future.
The insights generated will inform the Foundation's research agenda and the ASIS content strategy to meet future member needs. Each change driver represents an area where change is occurring most rapidly and could have the largest impact. To learn more about each topic, please click on the links below.
Archaeological Site of COLONIA CLUNIA SULPICA Penalba de Castro, Burgos, Spain
James H. Clark, CPP, Clark Security Group, LLC
Ricardo Sanz Marcos, Proarpa (Proteccion de Activos y Patrimonio)
Robert Carotenuto, CPP, PCI, PSP, New York Botanical Garden
Scholars believe that the site of Colonia Clunia Suplicia (Clunia) is the most representative of all the archaeological ruins that have been found from the Roman period in the Northern Iberian Peninsula. The objective of this assessment was to identify those conditions that could create security vulnerabilities for the site and its resources, including people, assets, and activities.
This report provides a case study, including a physical security assessment of Clunia and its surrounding environs, along with a review of other historic sites in the region.
Funded by a grant from the ASIS Foundation and presented by the ASIS Cultural Properties Council.
Persuading Senior Management with Effective, Evaluated, Security Metrics
The research report Persuading Senior Management with Effective, Evaluated, Security Metrics was sponsored by the ASIS Foundation, in collaboration with the ASIS Defense and Intelligence Council, to add to the body of knowledge about security metrics and to empower security professionals to better assess and present metrics.
This report provides the project's findings, including its three practical, actionable products:
- The Security Metrics Evaluation Tool (Security MET), which security professionals can self-administer to develop, evaluate, and improve security metrics
- A library of metric descriptions, each evaluated according to the Security MET criteria
- Guidelines for effective use of security metrics to inform and persuade senior management, with an emphasis on organizational risk and return on investment