Charlie Maclean-Bristol discusses how organizations can better prepare themselves by categorizing potential risks to their operations, and the importance of being prepared for all types of risk.
Upgrade your team’s Business Continuity and Risk Management Library today with these authoritative works, save 30%
How Can Enterprise Security Risk Management (ESRM) Help Your Security Program?
Find out now with your FREE Chapter!
You will:
Explore how security has traditionally been viewed both inside and outside of the security profession.
Understand how Enterprise Security Risk Management can change the perception of security in your business organization to help…
How Can Enterprise Security Risk Management (ESRM) Help Your Security Program?
Find out now with your FREE Chapter!
You will further:
Explore how security has traditionally been viewed both inside and outside of the security profession.
Understand how Enterprise Security Risk Management can change the perception of security in your business organization to…
How Can Enterprise Security Risk Management (ESRM) Help Your Security Program?
Find out now with your FREE Chapter!
You will further:- Explore how security has traditionally been viewed both inside and outside of the security profession.
- Understand how Enterprise Security Risk Management can change the perception of security in your business organization to help you better communicate the value of security risk management.
- See how ESRM is your best methodology to meet the changing global security risk climate.
Ensuring Insurance Recovery After a Hurricane Loss
by Finley Harckham and Joshua Gold for Risk Management Magazine on insurance and recovery
Weather experts reported recently that fewer hurricanes are likely to develop this season. But as most meteorologists will also tell you, it only takes one hurricane to make the season a catastrophe. Storms have increased…
What Makes a Successful Risk Leader?
First and foremost, risk management is still evolving as a profession. Risk leaders today are always trying to find ways to prove their value. They either come from a strong background of experience or they have to learn new policies, systems and processes. Most of the time they are…
Policy changes, geopolitical conflicts, volatile financial markets, and industry disruption are some of the many global issues that can threaten an organization. In today’s level of unprecedented change, risk readiness has fallen to its lowest point in over a decade. Which risks are on the horizon and how are leaders preparing for the unknown? How…
Security and Business Leaders: A Communications Gap
When I find myself talking to a group of security professionals, eventually the topic will turn to whatever security breach was in the news that morning, and how easily it could happen to us. From there we might discuss how people outside the security profession do not see these obvious risks in the same way that we do. Then we will ask each other how we can convince our executives to give us the proper resources to protect our organizations from the threats that we see so clearly every day. How can they expect me to protect the company if they cut my budget? Why don’t they think about security before the incident happens? How do I get “a seat at the table”? Why does procurement have more say about my program than I do? Why won’t they do what I know they need to do to protect the (insert important thing here)? These questions, although natural to people who are driven to protect and defend what we are responsible for, are, in fact, not the questions that are going to get our security programs where they need to be. Why not? Because we are not speaking the language that our audiences understand.Bridging The Gap: Whose Job Is It?
We tend to believe that it is the business’s responsibility to understand the importance of security. Therefore we don't recognize the need to invest in security. But in the world of business, that’s just not the case. Business leaders have operations to run and missions to fulfill, and as security leaders we need to understand that it’s up to us to bridge the gap between the security way of thinking and the business way of thinking. Just as we would learn the language if we setting up a security shop in a foreign country, we need to ensure that we are speaking the language that business executives understand. This is critically important when we are discussing the needs we have for the the enterprise security program. It’s not a large gap to bridge. But you have to recognize that gap if you intend to cross it.Building the Bridge: A How-To Guide
There are a few relatively simple things to keep in mind as you begin the process of bridging the communications gap that seems to exist in many organizations between the security team and business leaders.Engage as a partner to understand what the business needs
You cannot build a bridge if you do not know what is on the other side of it. The most critical piece of the equation when engaging business executives in a discussion about the importance of security is understanding how they look at the world and what is most critical to them. In most cases, the easiest way to find out what is important to people is to just sit down and have a conversation Simple questions like:- What are your responsible for?
- What does your group do?
- Is there anything you are particularly worried about?
- What are the critical needs for your group that if something happened to them you would not be able to do your work?
Treat security risk the same as any other business risk
Framing your discussion of the security issues and risk will help build your relationship on a common platform. Business leaders are used to having critical discussions about risk. They deal with risk every day in all areas of the business. Financial risk, operational risk, resource risk, regulatory risk… These are all topics that your executives think about every day. If you are going to talk to them about security, frame your discussion in the language they understand… risk. The risk-based conversation looks a little different than the old-style security conversation. In a risk-based approach:Security conversations are based on:
- Quantified risk measures
- Identified risk tolerance thresholds
- Resource owner agreement
- Measurable evidence
Security decisions are NOT based on:
- A “gut feel”
- “What everyone else does”
- “Fear, Uncertainty, and Doubt”
- A “best practice”
- Anecdotal evidence
Measure and Report Your Results
However, it’s not enough to simply have a risk-based conversation. Once you are engaged in a risk-management approach, you must continue to engage in the business process, just as any other business function would. That will require ongoing reporting of the effectiveness of your program in quantifiable ways. Identify metrics that show trends in risk, not just tasks completed or hours of work accomplished. You must tie meaningful data to your security activities if you want to measure the impact of a mitigation on a security risk. A few examples of risk-management metrics:- A reduction in the number of vehicle breaks-ins in a parking lot after an increase in patrols
- An increase in reported security concerns following a campaign of security awareness for employees
- An increase in the number of visitors to a facility processed per hour when implementing a visitor management system
- A decrease in the time to deploy credentials to new employees in response to a streamlined procedure.
About the Author: Rachelle Loyear
Rachelle Loyear is the VP of Integrated Security Solutions for G4S Americas. In this role, she leads the G4S Security Risk Management and Integrated Practices management office. Her main task is to help G4S customers take advantage of the powerful risk management business approach. She wants these customers to integrate the approach as part of their holistic security programs. Rachelle has spent over a decade managing programs in corporate security organizations. Focusing strongly on security risk management, she has been responsible for ensuring enterprise resilience in the face of many different types of risks, both physical and cyber. Rachelle is PMP, CISM, and MBCP certified, is active in multiple security industry groups, and volunteers as the program manager of the Enterprise Security Risk Management program management office at ASIS, International. Additionally, she is the author/co-author of three books in the security risk management subject area: Enterprise Security Risk Management: Concepts and Applications; The Manager’s Guide to Enterprise Security Risk Management: Essentials of Risk-Based Security; and The Manager’s Guide to Simple, Strategic, Service-Oriented Business Continuity.In October 2016, the Risk Management cover story “Hack the Vote: Cyberrisk at the Ballot Box” highlighted many of the vulnerabilities in America’s election infrastructure. Continuing investigation in the wake of that election has made the stakes clearer than ever. Two years later, many of the vulnerabilities still remain, and many of the threats are…
