We’ve all been there. It’s annual budget time and we are told that belts are tightening and we have to cut costs. Where does the finance organization look first for savings and what is their risk tolerance? That’s right… to the functions within the organization who do not contribute directly to the bottom line.
So what’s a security professional to do when you are already operating a lean organization? You are protecting your company’s assets the best you can? And you still are being asked to perform better with fewer resources? In this article Rachelle Loyear discusses a few options for helping you meet the financial pressures of the organization while not going outside of the risk tolerances set by your management team.
How Can Enterprise Security Risk Management (ESRM) Help Your Security Program?
Find out now with your FREE Chapter!
You will further:- Explore how security has traditionally been viewed both inside and outside of the security profession.
- Understand how Enterprise Security Risk Management can change the perception of security in your business organization to help you better communicate the value of security risk management.
- See how ESRM is your best methodology to meet the changing global security risk climate.
Security and Business Leaders: A Communications Gap
When I find myself talking to a group of security professionals, eventually the topic will turn to whatever security breach was in the news that morning, and how easily it could happen to us. From there we might discuss how people outside the security profession do not see these obvious risks in the same way that we do. Then we will ask each other how we can convince our executives to give us the proper resources to protect our organizations from the threats that we see so clearly every day. How can they expect me to protect the company if they cut my budget? Why don’t they think about security before the incident happens? How do I get “a seat at the table”? Why does procurement have more say about my program than I do? Why won’t they do what I know they need to do to protect the (insert important thing here)? These questions, although natural to people who are driven to protect and defend what we are responsible for, are, in fact, not the questions that are going to get our security programs where they need to be. Why not? Because we are not speaking the language that our audiences understand.Bridging The Gap: Whose Job Is It?
We tend to believe that it is the business’s responsibility to understand the importance of security. Therefore we don't recognize the need to invest in security. But in the world of business, that’s just not the case. Business leaders have operations to run and missions to fulfill, and as security leaders we need to understand that it’s up to us to bridge the gap between the security way of thinking and the business way of thinking. Just as we would learn the language if we setting up a security shop in a foreign country, we need to ensure that we are speaking the language that business executives understand. This is critically important when we are discussing the needs we have for the the enterprise security program. It’s not a large gap to bridge. But you have to recognize that gap if you intend to cross it.Building the Bridge: A How-To Guide
There are a few relatively simple things to keep in mind as you begin the process of bridging the communications gap that seems to exist in many organizations between the security team and business leaders.Engage as a partner to understand what the business needs
You cannot build a bridge if you do not know what is on the other side of it. The most critical piece of the equation when engaging business executives in a discussion about the importance of security is understanding how they look at the world and what is most critical to them. In most cases, the easiest way to find out what is important to people is to just sit down and have a conversation Simple questions like:- What are your responsible for?
- What does your group do?
- Is there anything you are particularly worried about?
- What are the critical needs for your group that if something happened to them you would not be able to do your work?
Treat security risk the same as any other business risk
Framing your discussion of the security issues and risk will help build your relationship on a common platform. Business leaders are used to having critical discussions about risk. They deal with risk every day in all areas of the business. Financial risk, operational risk, resource risk, regulatory risk… These are all topics that your executives think about every day. If you are going to talk to them about security, frame your discussion in the language they understand… risk. The risk-based conversation looks a little different than the old-style security conversation. In a risk-based approach:Security conversations are based on:
- Quantified risk measures
- Identified risk tolerance thresholds
- Resource owner agreement
- Measurable evidence
Security decisions are NOT based on:
- A “gut feel”
- “What everyone else does”
- “Fear, Uncertainty, and Doubt”
- A “best practice”
- Anecdotal evidence
Measure and Report Your Results
However, it’s not enough to simply have a risk-based conversation. Once you are engaged in a risk-management approach, you must continue to engage in the business process, just as any other business function would. That will require ongoing reporting of the effectiveness of your program in quantifiable ways. Identify metrics that show trends in risk, not just tasks completed or hours of work accomplished. You must tie meaningful data to your security activities if you want to measure the impact of a mitigation on a security risk. A few examples of risk-management metrics:- A reduction in the number of vehicle breaks-ins in a parking lot after an increase in patrols
- An increase in reported security concerns following a campaign of security awareness for employees
- An increase in the number of visitors to a facility processed per hour when implementing a visitor management system
- A decrease in the time to deploy credentials to new employees in response to a streamlined procedure.
About the Author: Rachelle Loyear
Rachelle Loyear is the VP of Integrated Security Solutions for G4S Americas. In this role, she leads the G4S Security Risk Management and Integrated Practices management office. Her main task is to help G4S customers take advantage of the powerful risk management business approach. She wants these customers to integrate the approach as part of their holistic security programs. Rachelle has spent over a decade managing programs in corporate security organizations. Focusing strongly on security risk management, she has been responsible for ensuring enterprise resilience in the face of many different types of risks, both physical and cyber. Rachelle is PMP, CISM, and MBCP certified, is active in multiple security industry groups, and volunteers as the program manager of the Enterprise Security Risk Management program management office at ASIS, International. Additionally, she is the author/co-author of three books in the security risk management subject area: Enterprise Security Risk Management: Concepts and Applications; The Manager’s Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security; and The Manager’s Guide to Simple, Strategic, Service-Oriented Business Continuity.Cyberrisks are fast-evolving, posing an ever-changing threat to businesses. Five years ago cyber security risks ranked at number 15 for most important peril. According to the annual Allianz Risk Barometer cyber security risks is now the second most important peril globally today. But some of these risks remain underestimated, and negligence scenarios are also increasing.…
How Can Enterprise Security Risk Management (ESRM) Help Your Security Program?
Find out now with your FREE Chapter!
You will further:- Explore how security has traditionally been viewed both inside and outside of the security profession.
- Understand how Enterprise Security Risk Management can change the perception of security in your business organization to help you better communicate the value of security risk management.
- See how ESRM is your best methodology to meet the changing global security risk climate.
In October 2016, the Risk Management cover story “Hack the Vote: Cyberrisk at the Ballot Box” highlighted many of the vulnerabilities in America’s election infrastructure. Continuing investigation in the wake of that election has made the stakes clearer than ever. Two years later, many of the vulnerabilities still remain, and many of the threats are…
The world is an ever-changing landscape in terms of risk, and as these changes happen, the business continuity and resilience industry must evolve.
The BCI is proud to be a part of this evolution and we are releasing our Manifesto for Organizational Resilience during Business Continuity Awareness Week (BCAW) 2018.
The manifesto positions us within the organizational resilience sphere; not as the ‘know-all’ organization, but as a central point for collaboration across all management disciplines.
The world is an ever-changing landscape in terms of risk, and as these changes happen, the business continuity and resilience industry must evolve.
The BCI is proud to be a part of this evolution and we are releasing our Manifesto for Organizational Resilience during Business Continuity Awareness Week (BCAW) 2018.
The manifesto positions us within the organizational resilience sphere; not as the ‘know-all’ organization, but as a central point for collaboration across all management disciplines.
Why we need to agree on our definitions and change our thinking around risk management, business continuity and resilience.
First, this is not about where the responsibility for business continuity should reside within an organization. It is about the responsibilities of the business continuity profession and its practitioners. Lately, I’ve witnessed the practice of risk management begin to take over that of business continuity. Many practitioners promote this alignment and foster the perception that business continuity is simply a part of the practice of risk management. I say this is bad for both disciplines and the organizations they serve.As a security professional, have you found that you and others in your company do not always define “security” the same way? Have security interests and business interests become misaligned? Brian Allen and Rachelle Loyear offer a NEW approach: Enterprise Security Risk Management (ESRM). By viewing security through a risk management lens, ESRM can help make you and your security program successful!
Brian Allen and Rachelle Loyear show you step-by-step how Enterprise Security Risk Management (ESRM) applies fundamental risk principles to manage all security risks, based on years of practical experience and research. Whether risks you face are informational, cyber, physical security, asset management, or business continuity, all are included in the holistic, all-encompassing ESRM approach which will move you from task-based to risk-based security.
