This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Building AppSec in Enterprises
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Risk at High Velocity
Security Leadership and ManagementLeadership & Management

Risk at High Velocity

Marleah Blades
February 1, 2012
Marleah Blades
KEYWORDS Intellectual Property / online security / security risk management
Reprints
No Comments

In last month’s column, we argued that the next generation of security leaders will be challenged more than previous leaders to run their function as a business; they will be expected to align with the organization and build value through security. As they work toward these goals, they will also be faced with new risks, some of which have the potential to escalate at a stunning pace.

For example, communication on the Internet has been a boon to business, but it has created an online environment that can be dangerous to corporate reputations. Consumers, employees and often partners habitually share opinions and information through social media and viral posts to popular sites, which can turn a single person’s comment one day into a media firestorm the next.

At the time of this writing, news has recently broken that actor Alec Baldwin was kicked off an American Airlines flight for reportedly verbally abusing the flight crew after refusing to turn off his phone when asked. It’s interesting to note that within 30 minutes of Baldwin’s first notorious tweet about the incident, AA had tweeted a response stating they were looking into the incident, and within 24 hours their Facebook page had been updated with a refutation of Baldwin’s version of the events and a defense of AA’s actions. The book is still open on the incident, but at the moment it looks like Baldwin may have come out the worse in this fight. Not all companies are able to deflect socially driven bad press in the same way. The damage that harmful YouTube videos, tweets, or Facebook comments can do to an organization’s stock price can add up to millions of dollars in brand equity, and how these incidents are handled can either minimize or maximize that damage.

Of course, it will not do to focus on newer threats like online security while neglecting the basics. Burgeoning security leaders must remember that physical security remains critical in managing risk, and the increased value of information actually makes physical protection even more important than before in many cases. Information – intellectual property as well as private employee and customer data – is a high-dollar asset in itself. When the assets on which information resides are compromised, the damage is therefore compounded.

The healthcare industry may serve as a telling example. Privacy Rights Clearinghouse data recently showed that more publicly disclosed data breaches occur in the medical industry than in any other, and most of those are due not to hacking, but to loss or theft of portable data devices. The next generation security leader must be prepared to protect information and brand from cyber threats and physical threats to information assets.

Protecting not only information but the enterprise at large will also require a solid strategy for preparedness and resilience. “Brand confidence and loyalty are intrinsically tied to responsibility before a crisis,” says Francis D’Addario, emeritus faculty member of the Security Executive Council and former vice president of Partner and Asset Protection for Starbucks Coffee. D’Addario evangelizes for security leaders to build preparedness and crisis management capabilities by, among other things, enhancing the social responsibility initiatives of the organization. A company’s investment in social responsibility in the good times, enabled by strong security and risk management, allows the CEO to stand in front of the media and the community after a disaster and say with sincerity that the company cares about the community and is truly doing all it can to help. There is significant intangible value to that kind of sincerity, according to D’Addario.

Building local alliances and attending to global preparedness guidelines and regulations is also critical. Numerous partnerships and partnership organizations have arisen to assist individual communities in developing preparedness and response plans that leverage the resources and knowledge base of both the public and private sectors to better protect communities and the businesses that reside in them.

Threats and risks will continue to pick up speed, and the next generation of security leaders will need to be quick enough to build security functions that can match them – functions that rely on solid protection strategy as a foundation for nimble, resourceful and creative response.   

Subscribe to Security Magazine

Recent Articles by Marleah Blades

How Business and Risk Drivers Impact Mitigation Strategy

Communicating Accurate Expectations with Management

How Test Sites Can Decrease Incidents and Increase Buy-In

When the Unpredictable Occurs

Securing Cities: Can We Do It Better?

Marleah Blades is senior editor for the Security Executive Council, an innovative problem-solving research and services organization. The Council works with Tier 1 Security Leaders™ to reduce risk and add to corporate profitability in the process. To learn about becoming involved, e-mail contact@secleader.com or visit www.securityexecutivecouncil.com/sm. You can also follow the Council on Facebook and Twitter.

Related Articles

How Business and Risk Drivers Impact Mitigation Strategy

Do You Understand Risk Appetite?

Related Products

Risk Analysis and the Security Survey, 4th Edition

Effective Security Management, 6th Edition

Related Events

Effective Risk Communication: Theory, Tools, and Practical Skills for Communicating about Risk

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

Mark Hargraves

Security Industry Mourns Passing of Mark Hargraves

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

SEC1219-Cover-Feat-slide1_900px

Contracted vs. In-House Guarding: No Universal Right Answer

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe. Organizations need to be prepared through a unified and rapid response to these events.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing