Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The New Security Assessment

By Robert D. Gates
January 1, 2009

What do security risk and threat assessments mean to you? To some, they mean an opportunity to justify the purchase of a new technology. To others, it’s a list of existing solutions in place and their perceived effectiveness. While others see it as a means to gain support for solutions that will help the business.

Now, what do security risk and threat assessments mean to the executives and upper management to whom you present them? Many view them as opportunities for improvement, unwelcomed requests for even
more funding, or as inconsequential.

How you view, conduct and present security assessments determines how your upper management will perceive them and, often, whether they’ll act upon your requests and recommendations.

Many of us have conducted security assessments by showing up with a clipboard that held a series of questions with Yes and No checkboxes next to them: Are our lights working? Are the locks operational? We filled it out and we handed it to our clients (upper management or corporate executives) as our final product.


What’s the Main Goal?

If your goal is to promote the security program by adding new technology or by getting management off your back, the checklist may be the best way to do it. It’s also a good way to invite management to view security as a target for funding reductions and to view you as an inhibitor of the business instead of an enabler. This is not because security isn’t important to the business; it’s because the checklist does not speak your client’s language.

If you walk up to the CEO of a bank, hand him or her the checklist and start talking CPTED, for example, you’re likely to get a polite smile or a blank stare, not because it’s not a significant issue, but because it’s not being presented in a way that enlightens the client or shows why it’s important to the business.

On the other hand, if your goal is to promote the business, improve the business, and protect the revenue stream and the company’s integrity, the checklist we’ve traditionally used is just your first step. It is a valuable tool for assessing the security of our businesses, but it should be just that – a personal data collection tool, not the final product. We still need to collect data on crime, incidents and the rationality or effectiveness of our current solutions. But then we must take that information, consider the audience we need to reach, and develop an assessment that will speak to that audience, capturing the language they will understand and inspiring action. In order to get action from our audience, our assessment must:
  • Audit expectations and standards
  • Adapt to business advantages
  • Achieve residual security benefits from routine practices
  • Align with corporate goals
  • Articulate the business case
Here are a couple of tips on how to accomplish that.

  • Focus your assessment on business results.
    Your final product doesn’t need to drill down to recommendations of specific technology items. Instead of presenting technology-oriented solutions, which are often viewed as unpleasantly high-cost recommendations, lay out the benefits and advantages your mitigation strategies will offer the business. For instance, can you present metrics that show how improved access controls or awareness programs would save labor or money?
  • Think about your audience.
    Determine who has the influence to execute the actions you’re recommending. If you are the person who has that authority, then propose your personal objectives and initiatives for which you need buy-in or departmental funding. If your clients are the ones who must take the action, your assessment should be geared towards motivating them to act, explaining why they should, or focusing on how to help them do their job better. Know your audience and take them into account early on.
  • Watch your language.
    While security professionals too often think in terms of cops and robbers, the business executives we’re trying to influence think in terms of revenue and opportunities. The language we use in our assessments has to reflect that point of view. Highlight how the security strategy can lower costs or increase efficiencies, grow or protect revenue, and retain or attract customers.
  • Think strategically.
    When assessing your efforts and results, ask yourself if what you are communicating represents a security tactic or a business strategy. Consider the strategy before reaching for those comfort zone checklists.
The way we present security assessments will help determine what our clients will be willing to do with them. It will also determine whether upper management clutch their checkbooks, or open the door and offer you a seat at the table.

Links

  • www.securityexecutivecouncil.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robert D. Gates is a member of the Security Executive Council and a security executive at a Fortune 100 company. The Security Executive Council is a member organization for senior security and risk executives from corporations and government agencies responsible for corporate and/or IT security programs.  A faculty of more than 100 experienced security executives provides strategy, insight and proven practices that cannot be found anywhere else. To learn about becoming involved, e-mail contact@secleader.com or visit www.securityexecutivecouncil.com/?sc=secmag.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Look at Risk from a Different Angle to Achieve Results

    See More
  • Copy of Security Podcast- Hanson (3).png

    Listen to Pamela Perini and the process of risk assessment in our latest The Security Podcast episode

    See More
  • The security risks surrounding COVID-19 vaccine distribution

    COVID-19 vaccine security: an assessment of the risks, both physical and cyber

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing