Skip to content
Menu
menu

ASIS Foundation Research

Enhance your knowledge and decision-making with the latest security research from the ASIS Foundation. Executive summaries are open to all and full reports are complimentary for ASIS members.

Digital Transformation Series

Using Social Media to Gather Security Intelligence

Using two case studies, this report reveals that social media can provide a wealth of information to security professionals. With the assistance of artificial intelligence, large amounts of social media data can be analyzed efficiently and effectively to identify new security issues.

Artificial Intelligence in Security: Opportunities and Implications

This research-supported report helps security professionals understand how artificial intelligence is used in security technologies. It supports security professionals in their AI adoption and decision making, providing a framework of factors to be considered for assessing the suitability of AI-based security technologies for the protection of assets. The Executive summary is complimentary. Full report is available for purchase and free to ASIS Members.

Blockchain: A Guide for Security Professionals

This report provides a practical overview of the blockchain facets most relevant to security practitioners plus factors to consider before implementation. Learn how the technology is being applied today in areas such as identity management, smart contracts, and video verification, and how it may be leveraged more extensively in the future. The Executive summary is complimentary. Full report is available for purchase and free to ASIS Members.

The State of Security Convergence Report

Sponsored by 

The ASIS Foundation has just released a new study identifying and describing the relationship between cybersecurity, physical security, and business continuity functions in organizations and the extent to which the three functions work independently, two of the three are converged, or all three are completely converged. The research also explores necessary success factors in creating a high-functioning integrated enterprise risk model, from both organizational and strategic perspectives.

Using survey responses from more than 1,000 security leaders in the U.S., Europe, and India, plus more than 20 follow-up interviews, the study provides a ‘current state’ of the relationship among physical security, cybersecurity, and business continuity. It provides relevant benchmarks to compare strategies, plans, and operations and determine best practices for creating more effective and cost-efficient security and risk operations.

Download the complimentary executive summary or receive the full report now available free to ASIS members.

Not a member? Join today and get this exclusive member benefit ($195 value) free with your membership.

Download | Purchase (nonmembers)

ASIS Foundation Research Process

The ASIS Foundation funds practical, actionable research to benefit the security management profession. The research process is guided by the volunteer Foundation Research Committee. With input from ASIS staff and members, the Committee identifies research priorities for the next 1-2 years. It then develops RFPs (requests for proposals) on desired security management topics and circulates those to the research community. The RFP specifies the research scope, budget, and deadlines.

Potential researchers are invited to submit research proposals in response to the RFPs. The proposals are reviewed and rated by the Research Committee and a final project is selected for funding.  A contract is signed with that research team. The Foundation usually funds 2-3 projects per year, depending on budget, and research projects are generally completed in one year or less.

Contact Peter Ohlhausen for questions about the RFP process or to be added to the distribution list for the next RFP.

Current Research Priorities
  • State of security management
  • Security risk management
  • Emerging security technologies
  • Resilience in security
  • Diversity, equity and inclusion in security

Submit a Research Topic

  1. Prepare a one-page overview of the subject including the research questions, how the research would benefit security practitioners and why you believe it is important and timely to address this topic.

  2. Send your suggestion to Beth McFarland, Foundation Director, who will share them with the Research Committee for consideration.

  3. The Committee will then review the suggestion and may add it to the research agenda for a future project. 

Resilience and Recovery After COVID-19

Resilience, Business Continuity, and COVID-19

To help security professionals benchmark and learn from one another, the ASIS Foundation completed a year-long project that tracked the response, continuity, and resilience of organizations during the worldwide COVID-19 pandemic. Read Article

Campus Security and Student Health at a Technical University

This technical university in southeast Asia—which has a 75-acre campus and serves about 15,000 students—initially treated the COVID-19 outbreak as an influenza event, activating its business continuity practices and assembling its executive level crisis management team.

Preparing to Reopen at a Furniture Retailer

Many retailers of nonessential goods have been forced to close up shop and concentrate on online sales, and this global retailer is no exception.

Additional ASIS Foundation Research

Intelligent Building Management Systems: Guidance for Protecting Organizations

Produced in partnership with BOMA International (BOMA) and the Security Industry Association (SIA), Intelligent Building Management Systems: Guidance for Protecting Organizations provides a framework for decision-makers to assign a risk-based criticality or impact to their building and asks relevant security questions to develop appropriate mitigation strategies.

The guidance is based on original research that provides an exhaustive overview of identified intelligent building critical vulnerabilities and mitigation strategies.

Download the guidance document, full report, and shareable infographics today!

Scouting the Future

This innovative research initiative identifies seven key change drivers impacting the security profession. Understanding the implications of these changes will allow leaders to better navigate the evolving environment and develop effective strategies for a new, emerging future.

Executive Summary

The insights generated will inform the Foundation's research agenda and the ASIS content strategy to meet future member needs. Each change driver represents an area where change is occurring most rapidly and could have the largest impact. To learn more about each topic, please click on the links below.

Archaeological Site of COLONIA CLUNIA SULPICA Penalba de Castro, Burgos, Spain​

Principal Authors:
James H. Clark, CPP, Clark Security Group, LLC
Ricardo Sanz Marcos, Proarpa (Proteccion de Activos y Patrimonio)
Robert Carotenuto, CPP, PCI, PSP, New York Botanical Garden

Scholars believe that the site of Colonia Clunia Suplicia (Clunia) is the most representative of all the archaeological ruins that have been found from the Roman period in the Northern Iberian Peninsula. The objective of this assessment was to identify those conditions that could create security vulnerabilities for the site and its resources, including people, assets, and activities.

This report provides a case study, including a physical security assessment of Clunia and its surrounding environs, along with a review of other historic sites in the region.

Funded by a grant from the ASIS Foundation and presented by the ASIS Cultural Properties Council.

Download Report
View all CRISP Reports

Persuading Senior Management with Effective, Evaluated, Security Metrics

The research report Persuading Senior Management with Effective, Evaluated, Security Metrics was sponsored by the ASIS Foundation, in collaboration​ with the ASIS Defense and Intelligence Council, to add to the body of knowledge about security metrics and to empower security professionals to better assess and present metrics.  

This report provides the project's findings, including its three practical, actionable products:

  1. The Security Metrics Evaluation Tool (Security M​ET), which security professionals can self-administer to develop, evaluate, and improve security metrics
  2. A library of metric descriptions, each evaluated according to the Security MET criteria
  3. Guidelines for effective use of security metrics to inform and persuade senior management, with an emphasis on organizational risk and return on investment
arrow_upward