There have been volumes written about the role of the CSO and how to gain a seat at the table in the C-suite. A relatively small number of CSOs have been able to convince their management that the CISO should be under their purview, citing the inherent mission conflicts that exist when the CISO reports to the CIO.
Businesses are putting their corporate security at risk, with one in three organizations (33 percent) allowing their staff unrestricted access to corporate resources from their personal smartphones, according to a survey.
Jeff Berkin rarely makes a business and security decision these days that doesn’t somehow impact, either positively or negatively, the business.That business is CACI International, which provides enterprise IT and network services for the federal government employing 14,600 employees working in more than 120 offices in the U.S. and Europe. Berkin is Senior Vice President and Chief Security Officer, the first CSO in the company, and he also has an impressive career, first as a trial attorney and then senior executive roles within the FBI.
Performance metrics are “critically important” to business leaders, says Greg Niehaus, Professor of Finance and Insurance for the Moore School of Business, University of South Carolina. “In my view it’s very important for business functions to have metrics that tie back to the objectives of the organization – that measure the impact on value and value creation.” If a function fails to develop and effectively communicate performance metrics, says Niehaus, “their contributions to the organization will likely be not appreciated, which, in down times, could lead to cutting of responsibilities or jobs and hurting the value of the organization.”
Workplace violence has grown into perhaps the most significant risk issue facing corporate security departments today. Security professionals have a unique contribution to make in helping the organization to meet its duty of care to anticipate, prevent, respond to and recover from workplace violence incidents. At the outset, corporate security needs to have a place at the strategic planning table.
Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!