Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Recession Security Program Management

By Mark McCourt
April 1, 2009

Could there be a drier, more boring headline on a column? Probably not.

But right now recession management is all the rage and grabbing the attention of security and business leaders around the world. In fact, the recent Security Executive Council (SEC) presentation, “The Impact of Economic Recession on Security Program Management,” focused on recognizing and managing the shift in business and risk assumptions.

Let’s jump to the finish line: The chief financial officer’s (CFO) job is to manage risk. Cutting the security budget (imprudently) can increase risk. There are metrics and measures you can use to make this case and present the reasons for versus against spending. Amazing, but Recession Management just got kind of sexy. A CFO in any position other than “freefall” has to respect risk management realities and recognize there is a point where the risk cost exceeds the budget savings.



Tackling the Big Issues

Never shy to tackle our industry’s toughest issues, the SEC brought together their thought leaders: proven chief security officers (CSOs) with the experience, track record and expertise, to authoritatively discuss this topic and provide reliable and straightforward management direction. It was part of the SEC Live series. Included:

Richard A. Lefler, vice president, worldwide security, American Express (retired) and current Dean of Emeritus Faculty, Security Executive Council, who also is a member Board of Advisors of IPSA International, an international investigative consulting firm.

George K. Campbell, a managing partner in the Business Security Advisory Group, a professional security consultancy and is a member of the Emeritus Faculty of the Security Executive Council. He retired in 2002 as CSO at Fidelity Investments, the world’s largest privately owned financial services firm.
He is the author of Measures and Metrics in Corporate Security.

Joe Nelson, CSO of Teradyne (retired), and current Emeritus Faculty of the Security Executive Council moderated the session. His background as a security leader within IBM, Lotus, Teradyne, CMGI and Digital helps ensure these events are built and organized for real world problems and real world solutions.


Applying the Assumptions

The group presented business assumptions that most organizations are facing today. They posed a number of rhetorical questions that allow you to consider how those business/risk assumptions would apply to their organization, including:
  • Negative revenue growth
  • Reduction in force
  • Flat/negative earnings growth
  • Increased regulatory/compliance requirements
  • Decreased employee travel
  • Increased criminal activity
  • Increased risk of insider threats
To each assumption, questions about related risks were asked, for example, risks related to scaling back background investigations. In a tight economy, it may seem obvious to reduce funding for background investigations and using a lower standard of review. However, research shows that during periods of higher unemployment, candidates are most likely to embellish qualifications. Please read the ENTERPRISE SOLUTIONS article on this topic elsewhere in this issue.

Lefler and Campbell provided facts and action steps for participants to follow to create a successful approach to right-sizing your security program for the current economy. Some of the critical questions they posed and that readers might think about answering include:
  • Will investigative requirements for the company increase or decrease with reduced sales and revenue?
  • If there is a business contraction strategy in place in your company, does it include a risk assessment process around the potential for theft, sabotage or other risky actions by disgruntled employees?
  • How effective is the level of workplace violence risk awareness, planning and collaboration between security, human resources and business units?
  • Do you develop special plans associated with employee or vendor terminations or reduction in force actions in business units possessing highly sensitive or critical business applications or processes?
  • How well known are the vulnerabilities in IT infrastructure to an insider or trusted vendor population who may be targets of reductions in force?
Among the summary statements from the presentation:
  • All security programs and their costs must be aligned with your organization’s goals.
  • The ranking of risks in a changing economy determine the value of security programs as mitigation strategies.
If you would like the presentation and speaker notes that guide the thought process for recession management or information about other SEC Live events, please visit the Security Executive Council Web site at the link below.


Links

  • www.securityexecutivecouncil.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • risk-management-freepik1170x658v568.jpg

    How to make third-party risk management recession-proof in 2023

    See More
  • Is the Recession your Ticket to IP?

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing