The role of the security officer in a digital organization

 0,00

WHAT IS IT ABOUT?

The role of the security officer has changed a lot over the years. In this questionnaire, you can find out more about what a security officer is occupied with.

  • The CIO who has appointed a specific manager for security matters.
  • The CISO who needs to check a security officer's set of assignments.
  • The consulting partner who needs the assess the security processes of her client.
  • The technology implementation partner who needs to assess the security situation.
  • The CTO of a technology company who needs to tally the quality of the security processes.
Control
what is the control environment

Security officer
who is in charge of security

Communications
how to communicate with staff and visitors

Environmental controls
how do you protect against physical threats?

Physical security
how can you secure your building, equipment and assets?

As you can see, you're not asking your respondents for opinions, satisfaction or agreement. Our scientific research has shown that these are very bad fuel for algorithms. Instead, we ask for verifiable facts or -behaviour. For further reading, you can download our AMAIZE magazine dedicated to this topic or discover the scientific papers in the Resources section.

After you have downloaded this questionnaire, you can - in your Toolbox - edit, add/delete, and translate questions & answers to your liking. Clicking the "Help me PRAIORITIZE" buttons in the Toolbox activates our A.I. to help you finish your masterpiece..

Q. Are controls for physical security known?
  1. No OR ad hoc procedures
  2. Policy and procedures known BUT not applied OR ad hoc changes are made to that policy and/or procedure
  3. Policy and procedures known AND also formally applied AND formally adjusted when necessary

Q. Physical access to buildings/premises is/are controlled?
  1. Not OR ad hoc control system in place
  2. Ad hoc control system in place BUT not formalized with third parties
  3. Formalized with third parties AND additional hardening measures taken where needed
The artificial intelligence creating the questionnaires for the store has been inspired by over 11.000 whitepapers from more than 100 noted consultancy firms. Algorithms selected the 20% best papers and grouped papers from different consultancy firms into specific questionnaires. Why settle for less? Here is a summary how we did it.

If you feel you need outside support after conducting your assessment, we recommend the firms that have written the below mentioned whitepapers. Not having a paper selected does NOT mean that a firm does not give good advice.
NAMETITLE PAPER
oxeraMerger-decisions-and-share-prices.pdf
pwcpwc-pls-alert-2019-1-applying-the-constraint-to-cost-to-cost-model.pdf
pwcpwc-trendsetter-barometer-q4-2018-chart-pack.pdf
pwcpwc-sales-and-marketing-excellence.pdf
deloittegx-deloitte-tmt-2018-connectivity-report.pdf
rhrinternationalconsultantsResearch Study Authenticates Psychological Assessments for Business Applications.pdf
fminetQ3_2019_E-C_Leadership_During_Bull_Market.pdf
lek2135-Medicare-Advantage-Penetration.pdf
You will download so much more than a set of questions and answers. This questionnaire contains everything for the full consultancy experience:
  • Respondent profiles for a helicopter view of your audience.
  • A maturity model with which algorithms calculate a six times smarter improvement target (compared to when you leave that to a human).
  • Improvement suggestions (per question) how to move from one answer to another
  • Suggested follow-on projects. After all, moving your organization from A to B might require more than just doing an assessment.
This English questionnaire is also available in Dutch, French, German, and Spanish.

Reviews

    There are no reviews yet.

    Be the first to review “The role of the security officer in a digital organization”

    Your email address will not be published. Required fields are marked *

    ALSO CHECKED THESE QUESTIONNAIRES?

    READY FOR SOME SERIOUS BUSINESS?