Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Survey Says Key Risks Not Being Continually Monitored

June 28, 2012

A new Deloitte and Forbes Insights survey reveals that fewer than 25 percent of executives report that their organizations continuously monitor risk. While the majority of respondents anticipated that the global economic environment will remain the greatest source of risk through 2015, more than one in four (27 percent), predicted that risks posed by social media would play an increasingly important role.

Forty-one percent of respondents said that they saw the global economic environment as the most important source of risk over the next three years, and nearly one-third put government spending and budget into that category. Regulatory changes were of concern to 30 percent of respondents and both social media and financial risk were seen as a concern by 27 percent. The top areas of concern regarding increased volatility over the next three years included financial risk (66 percent of respondents), followed by strategic risk (63 percent) and operational risk (58 percent).

"Social media wasn't even on the radar a few years ago, and we're now seeing it ranked among the top five sources of risk, on the same level as financial risk," said Henry Ristuccia, partner, Deloitte & Touche LLP and co-leader of Deloitte's Governance and Risk Management services. "The rise of social media is just another contributor to the volatile risk environment companies are being forced to navigate. The current marketplace seems to require that organizations be nimble in their risk assessment approach, whether it's dealing with what employees post on social networks, or how they're coping with regulatory changes or taking advantage of the opportunities rewarded risks can create."

More than 50 percent of executives believe that regulatory, technological and geopolitical risk will increase in volatility, and 55 percent of executives surveyed reported that their organizations will revamp their risk approach within the next 12 months; roughly nine in 10 (91 percent) reported that they plan to reorganize their approach to risk management in some form or other over the next three years.

When asked how they planned to accomplish this, the majority (52 percent) said that they would elevate the profile of risk management throughout their organizations. Other areas viewed as key included reorganizing risk management processes (39 percent), additional training for staff (37 percent), incorporating new technology (31 percent) and integrating risk into strategic planning (28 percent).

Despite advances in risk-related technologies as well as concern about unstable risks, the survey found that automation tools and tools used for continuously monitoring risk are underutilized. Most monitoring is done periodically, on a monthly, quarterly, biannual or annual basis.

"Based on the findings of this survey, and our interactions with clients, we believe technology has the potential to play a breakout role in the management of risk, but many companies are still behind the curve in this area," said Mark Carey, partner, Deloitte & Touche LLP and leader of the U.S. Governance and Risk Strategies services for commercial and public sector industries. "It is encouraging, however, that more than half the respondents said their companies were planning to invest in continuous risk monitoring, and the tools that are available should not only help them with risk management overall, but also increase efficiency and decrease costs over time."

The companies that participated in the survey were from three sectors: life sciences and healthcare; consumer and industrial; and technology, media and telecom. When it comes to risk management, there is no "one-size-fits-all" model. Survey respondents disclosed varying perceptions of risk as well as diverse beliefs with regard to the allocation of resources and organization of the ERM processes.

Additional Survey Findings:

  • Risk viewed as C-suite issue. Risk management has become a C-suite issue. Twenty-six percent of those surveyed said that the main responsibility for overall risk management belongs to the chief executive officer, with 23 percent assigning this responsibility to the chief financial officer or treasurer. Interestingly, the chief risk officer or head of risk came in third place, with 19 percent.
  • Automated risk management systems and processes. Dashboard reporting for senior stakeholders, data analysis and self-assessment are most often a mix of manual and automated processes. Twenty-eight percent of respondents said that their companies were in the process of automating their risk reporting.
  • Budgeting for risk expected to remain stable. Respondents indicated that strategic risk and technology risk were the two areas where budgets will increase the most. Around 50 percent of respondents said they expect minimal change to risk management budgets across the board. Fewer than 15 percent of respondents across all risk areas said risk budgets would decrease over the next three years.
KEYWORDS: regulations security budget security risk management security training social media

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Report Says Risk Monitoring is Not Yet Being Widely Embraced

    See More
  • cyber6-900px.jpg

    Report Says Organizations Are Not Ready for Global Security Risks and Regulations

    See More
  • software as a service poses security risks to an enterprise

    Survey says Software as a Service model opens up risks

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing