Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Metrics Justify IP Transition

By Pamela Casale
June 5, 2006



The “table” referred to, of course, is where top executive managers of companies meet to discuss the business of increasing marketshare, growing revenues, returning value to shareholders and beating the competition. More and more, the talk at this table includes risk management and the strategy to protect the corporate brand from the negative impact of security breeches and compliance violations.

So what does it take for CSOs, CISOs and corporate security directors to get a seat at this strategic table? And why do some companies make a seat at the table for the security executive while others are left standing at the door? These questions are crucial as security operations move more decisively to IP-based security video and access controls for both physical and logical security needs.

Companies that include security executives in strategy and risk management discussions have three things in common:
  • Security executives more skilled at defining the business case for investment in security technology and services, and able to position security as a competitive differentiator.
  • A security organization with more extensive and meaningful relationships with their business partners at all levels throughout the company.
  • Security executives who better measure security value using metrics to justify spending and resources to sustain a secure and compliant enterprise.


Metrics measurements help security get a seat at the corporate table. Click image for larger view.

Combining elements

Few companies can deny that security is essential to competing in their markets. For example, headline-grabbing security breeches, for example, have proven to be a reason that customers change from one bank to another or avoid a healthcare or retail business. This creates an opportunity for security executives to demonstrate how security enables the business by protecting physical and information assets. Management reporting and metrics can put security information into the context of business success. This also balances the cost of security against the revenue produced by the business transactions.

Security effectiveness is a combination of technology, process and people.

Top security professionals share one characteristic: They are very good at collaborating with business partners to create and enforce policy that doesn’t restrict an agile business. Collaboration requires communication -- the ability to listen and understand their business counterparts and the ability of security to affordably automate the generation of metrics that can assure their partners that security is working.

Often security relies on highly visible catastrophes, perceived threats and regulatory mandates to justify spending. But metrics, displayed on a security dashboard, provide the concise, practical and highly visual summaries to justify additional spending. Collecting, analyzing operational statistics and turning them into action oriented, strategic metrics that business executives can understand requires automation.

For example, Khalid Kark, senior analyst for Forrester Research, an independent technology and market research company, writes in a 2006 research paper, “Are We Secure Yet?,” that “most (security professionals) realize that they can no longer keep asking for increasing budgets or using the excuses that they don’t have time to measure security or that measuring security is simply impossible.”

In a recent survey, sponsored by this author’s company, Intellitactics, and conducted and analyzed by Frost and Sullivan, security executives surveyed reported they are starting to use metrics or are planning to use metrics to measure security value. Specifically, almost half, or 46 percent, have already begun using metrics to measure security value, with about 43 percent planning to take an action in the coming year. About 60 percent of those taking steps to measure security performance are doing so to justify spending. In addition to justifying spending, the other strategic reasons cited for using metrics to measure security performance include an interest in improving security process, measuring the impact of security on business availability and the interest in providing regular communication to management. In both the Forrester research and the Intellitactics/Frost survey, the top areas for measuring and monitoring were regulatory compliance and incident handling and response. V

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pamela Casale is with Intellitactics, Reston, Va. She can be reached at pcasale@intellitactics.com. Also check the Security Magazine LINX service, powered by Google and at www.securitymagazine.com, for more information on measuring security value.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing