Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Enterprise Services

How Can Security Risk Management Services Drive Technology Roadmaps?

By Phil Aronson
Risk Management Services
July 1, 2016

An often overlooked risk for CSOs is the security technology management process. Security technologies present risks to the enterprise that must be managed. Security applications aren’t inherently secure; installation practices due to standards deficiencies can open up holes; lax logical security practices and proprietary, end-of-life components are all risks to the enterprise. The bottom line: managing security technology is a complex problem for security leaders today. Mobile technology, cybersecurity concerns, dynamic and disruptive technology being introduced into the security technology stack are factors that warrant technology planning. Our industry is coming to the conclusion that security technology planning should be enabled by, and conducted within, a framework we call Enterprise Security Risk Management (ESRM). And the vendor community needs to respond to this by aligning their services. We call this emerging ecosystem and best practices Security Risk Management Services (SRMS)

 As an example, video surveillance is a tool within the security program. It is often left to age into neglected and legacy technology that can lead to a “no longer supported” position by the manufacturer. This situation is common and poses a variety of risks to the enterprise: increasing capital and operating expenses as break-downs occur more frequently, diminishing parts availability coupled with fewer qualified engineers and technicians to service the system and non-correctable security flaws exploitable by a growing number of bad actors.

Within the SRMS context, this situation would be addressed by the development of a Security Technology Roadmap, a tool that provides a business case with the following objectives:

 Provide a framework to migrate the video system from its current technology stack (the end-to-end video system components), and provide an approved security technology management process that ensures system security and performance are maintained across the video system life-cycle and components are updated within a structured framework.

 For example, an SRMS process would not just superficially consider replacing an analog system with an IP-based system, but would encourage each discipline to bring their unique perspective to bear with the presumption that it aligns with the CSO’s definition and measurement of risk. For example, the Information Security leader ought to mandate the application security scorecard for the video management system. The Network Architect should set the network standards. An Enterprise Application analyst would be focused on the hosting and application performance management program to support the VMS. An SRMS approach brings the best in-house and third party expertise to bear and focuses on the ideal systems design and performance measures.

 An SRMS roadmap for video surveillance generally includes four phases:

1. Planning and Preparation: Forming an SRMS-based guiding coalition, defining the scope and roles, selecting key stake holders across the entire ecosystem and creating an inventory baseline of the existing system and its performance.
2. Envisioning: Developing a common understanding of the mitigation and management of risk and then applying the desired video technology infrastructure and stack, taking into account the broad interests of all key stakeholders.
3. Roadmap Development: Developing the strategy and operational plan to migrate from the current video system to the envisioned one.
4. Roadmap Implementation and Management: Executing against the plan, including an SRMS evaluation of performance-to-metrics and modifying the implementation as warranted.
 Following these four phases with the right partners measuring the right things orchestrated by an experienced SRMS program manager, will help drive efficiency into your security program and, ultimately accelerate your program value and performance.

KEYWORDS: security risk management security services security technology SRMS

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aronson 2016 200px

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Defining the Next Generation of Security Services in the C-Suite's Language; security technology, security services

    Defining the Next Generation of Security Services in the C-Suite's Language

    See More
  • The Corner Office - july 2018

    The Best Technology Ever Created

    See More
  • Culture First, Technology Third, Security Magazine October 2017 Corner Office

    Culture First, Technology Third

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing