Welcome to a stealth area of our website. If you have reached this page, it means that you have been invited to participate in research and would like more information. We get it. Just so you know, we don’t spam, partner with vendors, and we aren’t trying to sell you anything. We are practitioners like yourself and just trying to validate information beyond our own visibility and interpretation.
WHO ARE WE AND WHAT WE DO AS IT PERTAINS TO THIS RESEARCH:
D6 Research, focuses on researching security challenges, methods, outcomes and improvements. We are dedicated to uncovering new insights and providing clarity to large scale global organizations, solely for their benefit. I am inviting you to take a survey whereby I will in turn share some of the collective insights with you – which will be by far the deepest analysis ever performed in this space without vendors and media driving the message to tell you what to think.
Like yourself, we are practitioners; Terry Gold is an expert in access controls (both physical and logical). Much of our time is spent on research dedicated to identifying innovative paths for global organizations to deal with new threats, align with next generation initiatives, while facing increased pressure from management to do more with less. This advisory work is balanced with mercenary work to help carve a path for some organizations relative to their unique circumstance.
D6 is unique in that we don’t partner with vendors, we’re not a channel, we don’t resell, accept commissions or referral fees, and therefore neither benefit from any product selections nor constrained to limited viewpoints bound by industry loyalties. In fact, we don’t even employ sales people. Additionally, much of our background has not only focused on building programs but breaking them as well (facility systems and controls) to help organizations understand how to fix the problems before the bad guys do it (and don’t tell you). From these experiences, we have built a set of methodologies over the years for integrating, migrating and operationalizing improvements for large scale organizations.
SO WHAT ARE WE DOING?
After applying such methodologies in some of the most challenging global organizations, we have developed a scientific set of markers that can measure the direction of organizational security programs and are working to uncover unprecedented insights into how organizations need to operate, interpret the demands of technology, and measure how aligned vendors really are when compared to the collective and measured inputs of the end users.
This specific survey is focused on physical security, identity and access controls. It is being conducted on a large scale and is quite different because:
- Reliable data inputs. It is tightly controlled. All people taking it are vetted that they are in fact representative of the collective scope that we are analyzing.
- Strictly peer input. Not mixing small organizations or government with enterprise.
- Relevance. We are contextualizing the analysis to go really deep to identify significant trends that would otherwise be overlooked.
- Competence. Constructed and conducted by people that really understand this stuff; spending most of their time bridging gaps between forward looking next generation strategy coupled with backward compatibility to legacy systems to control cost and disruption.
WHAT ARE WE ASKING YOU TO DO?
We are inviting your organization to participate and understand that you may be concerned with sharing such information. One of the most valuable resources for improvement in security programs is sharing our experiences and learning lessons from one another. However, inherent to the nature of our business, this information remains guarded and as a result we either share information in small pockets or have information fed to us by vendors and their channels, and media – from their perspective. Too often it is overly generalized, outdated and for their benefit – not yours.
THE TYPE OF QUESTIONS THAT ARE ASKED:
There are generally 4 sections to the survey. It takes between 2-030 minutes to complete. Yes, it is a time investment but is really the only way to get beyond the high level assumptions so we can do proper analysis – and share it with you in return.
Part 1: Current state: This is really trying to understand decisions that you have made. Type of technology, why it was selected, how it is working out. This helps serves as a baseline to compare future state goals.
Part 2: Security: This focuses on your providing insight into how you define security, expected goals and program success criteria. Security means different things to different people, I see it all. I need to get a handle on perceptions while doing analysis on trends. Very important. This section isn’t terribly specific to information about your company, but how you think and might be applying it. It will ask about which aspects of security are important, effective, perception of specific threats, etc.
Part 3: Future State: This is to measure the journey and find out what really matters, to whom, and preferences on what you would like to see in how it will get you there. It will ask about desired changes, outcomes, capabilities, and some awareness of technologies.
CONCERNS ABOUT WHAT YOU TELL US? WE GET IT AND HAVE THAT COVERED:
We can assure you that we NEVER share survey responses with ANYONE. We have also developed data privacy practices that exceed most organization’s information security requirements. We would even be willing to sign an NDA if this is your requirement or preference. You can visit our practice and policy here where we detail the process and controls in simple language https://d6research.com/survey-privacy-policy/
WHAT TO EXPECT (the process):
- You will receive a link to the survey, password, and a separate communication with a unique code (we use a code in place of your identity, nothing in the survey system knows your code belongs to you. In fact, your name and company is never entered into the system.
- In appreciation of your participation, I will share some of the insights (free of charge) as the analysis takes shape. If you elect, we will update you as we revise this analysis with new significant insights.
- The census seems to be that the survey takes around 20-30 minutes and can be taken on any device with a browser, except small mobile phones.
WHY MAKE THE TIME TO CONTRIBUTE?
We realize that this request to fit this into your schedule may be inconvenient, but it the only way to get beyond the high level assumptions that permeate our industry really don’t give the the end user community the type of insights that could otherwise be incredibly useful and inspiring. Additionally, to anyone that contributes, we will make some of the insights available (at no cost of course) after the initial analysis. If you elect, we can put you on a list to receive updates as we get more participation globally (entirely up to you and the list is not used for anything else).
STILL HAVE QUESTIONS?
Call or email Terry Gold, our founder directly. We are happy to answer any that you have as well as provide references within your peer group to validate our integrity, mission and the work that we in serving end user organization interests. We would also be happy to answer any other questions that you may have as a thank you for taking the time (systems, tech, vulnerabilities, etc.).