Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The New Security Assessment

By Robert D. Gates
January 1, 2009

What do security risk and threat assessments mean to you? To some, they mean an opportunity to justify the purchase of a new technology. To others, it’s a list of existing solutions in place and their perceived effectiveness. While others see it as a means to gain support for solutions that will help the business.

Now, what do security risk and threat assessments mean to the executives and upper management to whom you present them? Many view them as opportunities for improvement, unwelcomed requests for even
more funding, or as inconsequential.

How you view, conduct and present security assessments determines how your upper management will perceive them and, often, whether they’ll act upon your requests and recommendations.

Many of us have conducted security assessments by showing up with a clipboard that held a series of questions with Yes and No checkboxes next to them: Are our lights working? Are the locks operational? We filled it out and we handed it to our clients (upper management or corporate executives) as our final product.


What’s the Main Goal?

If your goal is to promote the security program by adding new technology or by getting management off your back, the checklist may be the best way to do it. It’s also a good way to invite management to view security as a target for funding reductions and to view you as an inhibitor of the business instead of an enabler. This is not because security isn’t important to the business; it’s because the checklist does not speak your client’s language.

If you walk up to the CEO of a bank, hand him or her the checklist and start talking CPTED, for example, you’re likely to get a polite smile or a blank stare, not because it’s not a significant issue, but because it’s not being presented in a way that enlightens the client or shows why it’s important to the business.

On the other hand, if your goal is to promote the business, improve the business, and protect the revenue stream and the company’s integrity, the checklist we’ve traditionally used is just your first step. It is a valuable tool for assessing the security of our businesses, but it should be just that – a personal data collection tool, not the final product. We still need to collect data on crime, incidents and the rationality or effectiveness of our current solutions. But then we must take that information, consider the audience we need to reach, and develop an assessment that will speak to that audience, capturing the language they will understand and inspiring action. In order to get action from our audience, our assessment must:
  • Audit expectations and standards
  • Adapt to business advantages
  • Achieve residual security benefits from routine practices
  • Align with corporate goals
  • Articulate the business case
Here are a couple of tips on how to accomplish that.

  • Focus your assessment on business results.
    Your final product doesn’t need to drill down to recommendations of specific technology items. Instead of presenting technology-oriented solutions, which are often viewed as unpleasantly high-cost recommendations, lay out the benefits and advantages your mitigation strategies will offer the business. For instance, can you present metrics that show how improved access controls or awareness programs would save labor or money?
  • Think about your audience.
    Determine who has the influence to execute the actions you’re recommending. If you are the person who has that authority, then propose your personal objectives and initiatives for which you need buy-in or departmental funding. If your clients are the ones who must take the action, your assessment should be geared towards motivating them to act, explaining why they should, or focusing on how to help them do their job better. Know your audience and take them into account early on.
  • Watch your language.
    While security professionals too often think in terms of cops and robbers, the business executives we’re trying to influence think in terms of revenue and opportunities. The language we use in our assessments has to reflect that point of view. Highlight how the security strategy can lower costs or increase efficiencies, grow or protect revenue, and retain or attract customers.
  • Think strategically.
    When assessing your efforts and results, ask yourself if what you are communicating represents a security tactic or a business strategy. Consider the strategy before reaching for those comfort zone checklists.
The way we present security assessments will help determine what our clients will be willing to do with them. It will also determine whether upper management clutch their checkbooks, or open the door and offer you a seat at the table.

Links

  • www.securityexecutivecouncil.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robert D. Gates is a member of the Security Executive Council and a security executive at a Fortune 100 company. The Security Executive Council is a member organization for senior security and risk executives from corporations and government agencies responsible for corporate and/or IT security programs.  A faculty of more than 100 experienced security executives provides strategy, insight and proven practices that cannot be found anywhere else. To learn about becoming involved, e-mail contact@secleader.com or visit www.securityexecutivecouncil.com/?sc=secmag.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Look at Risk from a Different Angle to Achieve Results

    See More
  • Copy of Security Podcast- Hanson (3).png

    Listen to Pamela Perini and the process of risk assessment in our latest The Security Podcast episode

    See More
  • The security risks surrounding COVID-19 vaccine distribution

    COVID-19 vaccine security: an assessment of the risks, both physical and cyber

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing