Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

Why Reputational Risk is a Security Risk and What to Do About It

By Ra Tiedemann-Nkabinde, Daniil Davydoff
security leadership responsive default security
March 4, 2019

In 2007, Aon’s Global Risk Management Survey identified reputational risk as the top concern for global enterprises. A decade later, in the latest such survey by Aon, “damage to reputation/brand” retained its number one spot among more than 50 other categories of risks. Even though recognition of reputation’s importance has been high for years, preventive risk management efforts have not kept up. By narrowly focusing on prevention of security incidents or cybersecurity breaches as the main approach to warding off brand damage, corporate security is partially to blame. Security teams should instead recognize that reputational issues can cause security incidents themselves and that using intelligence teams to monitor and analyze reputational risk is much-needed by the leadership of most global organizations.

Reputational Issues with Impact on Security

Reputational risk is typically defined as the loss to a business or organization through reputational damage, with the term “loss” highlighting a threat primarily to finances. Insofar as security is connected, many sources suggest a one-way relationship, with security failures resulting in reputational problems. A 2018 CEO and board risk survey by Deloitte, for example, found that “security risks, including both physical and cyber breaches” were the most frequently noted cause for reputational risk.

While true, this portrayal is simplistic and security leaders must recognize the many ways that reputational risk can directly influence the threat environment for organizations. As a start, we recommend considering “the four P’s:” Products, Policies, People and Politics.

  • Products (and services) – Reputational risk is often centered on perceptions about products and whether, among other negative qualities, they are unethical, substandard, fraudulent or harmful. Such opinions, which can quickly shift and create threats, can easily trigger security incidents. Pharmaceutical companies that manufacture and sell opioids once thought of as innocuous, for example, are now facing a social backlash with severe security implications. In August 2018, more than 500 people protested outside the Stamford headquarters of Purdue Pharma, the manufacturers of OxyContin, as part of a campaign led by activists angered by the growing national opioid crisis.
  • Policies – An organization’s underlying corporate practices – on governance, employee relations, global strategy or manufacturing practices, among other issues – can also be seen as unethical or unfair. These factors can likewise have a tangible impact on security, as was the case with YouTube’s introduction of a new policy that resulted in some bloggers losing advertising revenue and having their content censored. In April 2018, this policy served as a triggering event for Nasim Aghdam’s subsequent shooting attack on YouTube’s headquarters that injured three employees.
  • People – People are a company’s main asset, but also a significant source of reputational risk. A controversial public statement or a case of sexual misconduct involving a senior executive can cause a scandal with widespread reputational ramifications. Other risks may stem from a wide range of factors related to an executive’s background or lifestyle. Of course, mid-level managers can also be a source of risk due to their actions within the workplace, as a brief glance at some of the lower-ranking company reviews on sites such as Glassdoor.com illustrate effectively.
  • Politics – Sometimes overlapping with the issues above is negative sentiment generated by the actions of companies or their employees that are politically motivated or impact the political sphere. At our current historical moment of heightened partisanship, explicitly or implicitly ascribing to a social or political stance is likely to draw ire from those with opposing views and can even serve as a rationale for demonstrations or violence. Just ask Uber. In early 2017, protestors chained themselves to the entrance of the company due to former CEO Travis Kalanick’s participation in President Donald Trump’s Strategic and Policy Forum.

Intelligence Analysis as a Reputational Risk Solution

As with other abstract and amorphous issues, managing reputational risk requires leveraging intelligence teams that can monitor and analyse threats before they get physical. The first step in creating an intelligence program that can track reputational risk is to conduct a risk assessment; that is, to identify which of the risks above (or any others) are most relevant to the organization. An open-source intelligence (OSINT) review of the organization should provide some answers, but a workshop with key stakeholders within the company can deepen understanding. Second, analysts need to determine where they will source relevant information from. In some cases, they may need to find specialized online review sites or forums; alternatively, most social media monitoring systems can be calibrated to track reputational issues.

Third, we recommend that intelligence teams find internal organizational allies that can serve as additional recipients of analysis or as potential partners on monitoring if a team does not have adequate resources. Within the corporate environment, such internal partners can include government affairs, communications or marketing, for instance.

This last point is especially important. Most companies have a fuzzy notion of reputational risk and who is responsible for it, so taking ownership of analysis can bring great benefits to intelligence teams and corporate security broadly. As the 2018 Deloitte survey mentioned above notes, only 50 percent of organizations can identify reputational risk events and only 53 percent have the capacity to analyze them and predict their impact. Intelligence teams should take advantage of this vacuum to make a value-added contribution while bolstering their own exposure and reputation.

The Risk Matrix is a monthly column on SecurityMagazine.com. Check in every month for new insights into international risk management strategies.

KEYWORDS: Brand Reputation risk management Risk Matrix risk mitigation

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ra tiedemann nkabinde

Ra Tiedemann-Nkabinde is a global security intelligence analyst at AT-RISK International. He earned his PhD in finance and religion at the University of Cape Town. His views do not reflect those of his company. He can be contacted on LinkedIn or at rtiedemann@at-riskinternational.com

Dan davydoff   pic1

Daniil Davydoff, CPP, is Director, Research Management and Operations at Eurasia Group and director of social media for the World Affairs Council of Palm Beach. He has been published by ASIS International/Security Management, Risk Management Magazine, The National Interest, The Carnegie Council for Ethics in International Affairs, Foreign Policy and RealClearWorld, among other outlets. His views do not reflect those of his company.

Daniil Davydoff can be contacted on LinkedIn or at davydoff@eurasiagroup.net

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Spy

    Why You Need TSCM Now More Than Ever

    See More
  • Ebola

    Aid Under Attack: What the DRC’s Ebola Crisis Teaches Us About Security and Local Perceptions

    See More
  • inge huijbrechts

    Leading at the Crossroads of Sustainability and Security Risk: A Discussion with Inge Huijbrechts

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!