Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Leadership and Management

Defining the Next Generation of Security Services in the C-Suite's Language

By Phil Aronson
Defining the Next Generation of Security Services in the C-Suite's Language; security technology, security services
Phil Aronson, The Corner Office
Defining the Next Generation of Security Services in the C-Suite's Language; security technology, security services
Phil Aronson, The Corner Office
April 1, 2016

I am the CEO of a risk, resilience and security company that is redefining the services required to provide a 360-degree view and understanding of an organization’s risk strategy, plan, processes and metrics. We are in the emerging Security Risk Management Services (SRMS) market.

At one time we were called an integrator or a Value-Added-Reseller (VAR). We were known by our program management methodology called the ASG Path to Value, our consultative approach to the organization and our engineering. Those qualities in themselves would have distinguished us. But one of our core values is innovation and change: our ability to adapt our organization to the dynamics of a changing risk landscape, an accelerated technology wave and the unique demands of a virtual managed services business model.

There are many inputs that we must receive and understand before we invest in innovation and change. Being invited into your suite has allowed us to understand your program in the context of your business as well as the unique challenges you face navigating the mission of your organization while helping you confront and mitigate those risks.

Because of those challenges, the emerging risk leader needs to harness the power of a network of service providers that understand Enterprise Security Risk Management.

If you ask enterprise security executives what their greatest concerns are, you won’t be surprised to hear that violence in the workplace, property theft, data loss and terrorism are at the top of the list. But you might not expect to hear that the economy, competition, long-term shareholder value and regulatory pressures also rank high.

As an enterprise security executive, you are recognizing that whatever security risks your enterprise faces, you need to collaborate across the business to ensure that the goals of the company are met while mitigating risk. This is Enterprise Security Risk Management (ESRM).

This is not to be confused with Enterprise Risk Management (ERM), which has typically been associated with the financial side of business such as credit risk and commodities-pricing risk. ESRM highlights the protection of assets and activities such as physical security, investigations, crisis management, business continuity and data protection. Any disruption in one of these areas could be harmful to an organization’s profit or reputation. And, unlike a physical security lapse, a bad trade is not likely to put an employee in harm’s way.

Between the moment you recognize the need to act and the moment you actually start to address the problem, there exists a knowledge and resource gap. This gap creates risk, impedes the time it takes to address risk and multiplies cost within the enterprise. This strategic gap has serious risk implications for any organization, but remains largely unaddressed by service vendors.

This gap also can dilute the leverage and significance of technology deployment. Technology can ultimately collapse the time-to-value of a security executive’s actions. But first you have to understand how your current people perform roles in a process using technology to adequately respond to risk conditions.

We are finding that ESRM provides the methodology, the philosophy, the language and the foundational values to create a culture of predictive and proactive risk management.

If translated to technology deployments, this provides the framework to articulate a clear roadmap for innovation and change that can cross any knowledge domain from cybersecurity and building management system security to physical security.

We believe it is critical to begin to track services and products against this framework. With metrics from our learnings, we can begin to understand impact as well as continuous improvement of each participating vendor who leverages the discipline of ESRM.  So we would like to propose a name for this category of services: Security Risk Management Services or SRMS.

SRMS vendors would be subject to a scorecard to understand their ability to deliver on a segment of ERMS or act as the hub in orchestrating a program of services across the organization.

In my next column I will provide an example of how such a vendor would interact with a CSO and their team to move through a proscribed methodology for mitigating risk, driving organizational value and creating the context for a leveraging a new category of service vendors in SRMS.

KEYWORDS: enterprise security management security services security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aronson 2016 200px

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Next Generation Risk, Resilience and Security Provider

    The Next Generation Risk, Resilience and Security Provider

    See More
  • Stranger in a Strange Land: Finding the New Normal of Security Culture - Security Magazine

    Stranger in a Strange Land: Finding the New Normal of Security Culture

    See More
  • SEC0818-cyber-feat-slide1

    Is Voice the Next Stage for your Enterprise Security Program?

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing