Blended Training for Six Sigma

By Gary Retherford


For the e-learning portion of the blended training program, the company chose, which specializes in online Six Sigma training. Over several weeks, each security team member worked on the online beginner class, which provided a cost effective way to evaluate Six Sigma. Individuals worked at their own pace until completing the program. Each member’s progress was monitored via the Web by tracking online quiz results. Teleconfer­ences were held to support the e-learning, as well as to discuss pos­sible projects.

The subjects taught during the class included the DMAIC process, process mapping, measurement and basic statistics, understanding variation, and standardized work documentation.

One team member was given additional training and served as the Six Sigma project leader after the trainer left. The remaining team members stopped after the in­i­tial training.

The purpose for training each member at a basic level was to give all members an understanding of terminology as well as driving cultural change. The goal was not just to save money and improve quality on a project-by-project basis, but to create an en­vironment driven by data and measurements.


As an initial project, the company chose to address access control issues. The overall problem was that security received a sig­­nificant number of access control alarms. When security responded to these alarms, they often found that the access control devices were malfunctioning. The data had been collected from the system audit reports that showed thousands of data points indicating various potential security breaches. However, security eventually responded to these alarms as if they were false, creating the potential for a real security incident to be ignored or handled poorly. Once the project was chosen, the Six Sigma project leader worked alongside the trainer to apply to the real world what had been learned in the online training class.

Applying the Six Sigma process, the company decided to work with the access control vendor and address each malfunctioning device. After this was completed, a maintenance schedule was de­vised to ensure that devices remained in good working order.



The Magazine — Past Issues


Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.