Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Leadership & ManagementSecurity Leadership and Management

Why Risk Intelligence is the Key to Successful Security

Risk intelligence is one of the most important of the core elements which must be established when building a successful and effective enterprise risk management program.

By Lynn Mattice
July 1, 2013

Risk intelligence is the final and probably one of the most important of the core elements which must be established when building a successful and effective enterprise risk management program. A comprehensive risk intelligence program is not only critical to the success of ERM programs, but it is vital to the viability, survivability and resilience of the entire enterprise. 

Most folks in the past may have referred to this type of program as Business Intelligence, but the software industry has pretty much stolen that term and has applied it to mining the vast amounts of information housed in internal company databases.

Risk intelligence programs encompass the entire spectrum related to the collection and analysis of intelligence from the expansive environment of internal and external sources.  It is vitally important to examine all of the risks, threats and hazards that may be encountered in the various environments in which the enterprise may operate. But, it is also just as important to maintain a holistic view and examine the opportunity risks that present themselves along the way. 

Few intelligence programs exist in industry today that provide management with the depth of intelligence which allows them to make truly informed decisions. This void exists for a number of reasons. Most intelligence programs in industry are highly fragmented with no single point that collects and analyzes.

Industry shouldn’t feel like the forgotten step-child,  however, as government intelligence agencies are themselves highly fragmented into what many refer to as “silos of excellence.” Inter-agency intelligence sharing has improved somewhat due to highly publicized past incidents of glaring intelligence failures. Those intelligence failures, in most cases, were traced directly back to agencies not sharing intelligence with other agencies or not grasping the relevance and importance of intelligence data they already had in their grasp.

Any form of real intelligence sharing by the government with the private sector is still virtually non-existent, in spite of the fact that industry has been listed as a legitimate consumer of intelligence in the government’s National Intelligence Policy since the early 1990s. The only truly notable exception has been the Overseas Security Advisory Council that has evolved as an effective partnership between the State Department and the private sector since being established in 1985. Most government agencies continue to balk at providing any form of meaningful intelligence to industry, despite policy guidance and Presidential Executive Orders that require them to do so.

So how does one go about establishing an effective risk intelligence program?  The first step in developing a program requires an analysis of the corporate culture. Is the company structured as a centralized or decentralized enterprise? Is it an environment that is highly collaborative and cross-functional or are functions and business units operating in a highly stove-piped structure? A solid risk intelligence program can operate effectively in any of these environments, and its success is not dependent on one approach or another. 

A truly successful risk intelligence program will only evolve, however, if the program has top-down support as well as bottom-up support. The program requires a leader who is highly collaborative, innovative, analytical and respected. It can operate as a standalone function within the enterprise or be staffed by representatives of key functions and business units from throughout the enterprise. Establishing a group of highly qualified analysts is absolutely vital. The next step is to gather requirements from within the organization…what information do business leaders need to effectively manage risks in their operations?

A world-class risk intelligence program gathers data on risks to people, assets and markets in its operations around the world. Intelligence can be gathered through social media, deep-dive Internet searches, news clipping services, conferences and trade shows, academic and research institute publications, industry publications and more.

The bottom line: It is one thing to gather data, but an entirely different thing to turn that data into meaningful and actionable intelligence. Intelligence must provide information that can be acted upon, if it is going to be deemed of value. 

 

About the Authors:

 Jerry J. Brennan is the founder and Chief Operating Officer of Security Management Resources (SMR Group), the world’s leading executive search firm exclusively focused in corporate security. Lynn Mattice is Managing Director of Mattice and Associates, a management consultancy focused at the development and alignment of Enterprise Risk Management and Business Intelligence Programs, as well as Intellectual Property Protection and Cybersecurity. 

KEYWORDS: data collection security metrics security risk management successful security best practices

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mattice 2016 200px

Lynn Mattice is Managing Director of Mattice & Associates, a top-tier management consulting firm focused primarily at assisting enterprises with ERM, cyber, intelligence, security and information asset protection programs. He can be reached at: matticeandassociates@gmail.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Lynn Mattice, Leadership & Management

    Who’s The Boss? Where Security Reports is Truly All Over the Map

    See More
  • Lynn Mattice, Leadership & Management

    New Thinking Is Required to Support Security End Users

    See More
  • Founding Security on Enterprise Risk Management

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing