Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Sponsored Content

Reboot Your Security Program with an Enterprise Security Risk Management (ESRM) Approach

By Joe Young
900x550_G4S_ESRM_0005_Rebooting_Program.jpg
March 2, 2020

Content Provided By G4S

Businesses across the globe face all kinds of risks on a daily basis, and these risks are constantly evolving. That’s why proactive security and business leaders are always seeking to improve the solutions and programs they have in place to mitigate those security risks.

Rethinking your security program using an Enterprise Security Risk Management model (ESRM) helps you build, customize and develop security programs that are ideally suited to your organization’s individual needs and environments, whether you are in critical energy infrastructure, a bank, a hospital, the retail space, a manufacturing environment or an office.

Before your business can determine what security solutions are right to protect your assets — be it the number of security officers posted at a site, the amount of cameras surrounding a perimeter, or the level of identity and visitor management required — you need to ask and answer some fundamental questions:

  • What do I need to protect?
  • What do I need to protect it from?
  • How can I best, and most efficiently protect it?

These three questions are the essence of a risk-based approach to managing security in your organization. With this in mind, adopting a security risk management model allows you to follow a roadmap through the entire risk management process: identifying your critical assets, understanding the risks to those assets and determining how to best align mitigation solutions to protect those assets in line with your business’s tolerance for risk.

 

Asset Identification

The first step to rebooting your security program using an ESRM approach involves sitting down with your business leaders (the “asset owners”) and identifying all of the critical assets they want to protect.

The partnership approach to identifying which assets are most critical for protection is the key to ensuring that you are making the best use of your organization’s security budget and that you are placing your resources where they can provide the most value to the business. Assets can be many things, including people, property, information and reputation.

“People” may include internal employees and other dedicated personnel, as well as  customers, contractors or guests.

“Property” consists of both tangible and intangible items that can be assigned a value. Intangible assets include reputation and proprietary information. 

“Information” includes databases, software code, critical company records, personnel knowledge and many other intangible items.

While considering assets that are important, don’t forget to explore external assets that are critical to the company to protect. Your organization may have a key goal of protecting the local community it operates in, or a need to protect a non-owned supplier or material source.

Once you have created your list of assets, assign a value to that resource based on how impactful the loss of the asset might be to completing the overall mission of the organization.  It is important to partner with internal asset stakeholders to help you understand the true value of all assets to your business. 

 

Risk Identification

Now that you understand what you are trying to protect, the next step in the ESRM model is to look at the likelihood of those assets being harmed by particular security risks. A “risk” identifies the likelihood of a threat causing actual harm to a valued asset. When you are exploring potential risk, don’t forget to explore the following potential avenues of harm.

  • Human Threats: These are intentional, often malicious, actions or attacks by human actors that could harm your valued assets, including activities such as theft, violence, vandalism or unethical actions.
  • Accidents and Natural Hazards: These can be man-made or natural and are typically unintentional, and can be natural or accidental industrial disasters, safety issues or accidents such as  vehicle or personal accidents.
  • Social and Political Hazards: These are harder to mitigate, but don’t forget to include issues that are externally driven by systemic change. These could include changes in regulations, political climate or social climate that need to be considered by a holistic security risk management program.

To understand the actual risk of an asset being harmed by one of those threats, look at your history and records to see how frequently incidents like them have happened. Or look at records from industry-wide resources, such as public crime statistics or other security databases. This will help you  establish a clear and well-informed picture.

 

Planning Solutions to Mitigate Risk

When rebooting your security program to take a risk based approach, one key piece of the change will be to ensure that there is no security activity that is happening in your program without a clear reason. In the ESRM model, that reason is to mitigate a risk to specific assets. In a risk-based approach to security, every security expense can be tied to the risk it is mitigating and the asset it is protecting. This shows the chain of value to the organization from cost to return on investment. Looking at your solutions in this way enables you to focus your company resources in the best way to manage and tackle risks and assets in the order of importance defined by the asset owners. Putting the right technological and human resources in the right place for the right reason results in a truly risk-based security program.

Depending on your organization’s desire and needed level of protection for each kind of asset, you can choose solutions to help prevent incidents as much as possible — to help contain and reduce impact if an incident does occur, to recover to a steady state after an incident impacts your asset or a combination of all three types of mitigation level.

Preventive solutions, such as carrying out background checks on all visitors to a site or having perimeter protection in place, aim to stop an incident from happening in the first place. Containment resolutions, such as having intrusion detection or fire safety systems installed, help reduce harm during an incident. Recovery solutions, such as investigations or security forensics, are designed to alleviate impact after an incident, ensuring that business operations recover quickly and that damage is as minimal as possible.

 

A Constantly Evolving Security Program

As a whole, approaching your security program with a, ESRM model allows you to work with your business leaders to monitor their assets, understand the risks they face, and, together, come up with the most appropriate, efficient and effective solutions. You can also make clear ties in the model to work out the total cost of ownership — based on asset exposure to certain risks — as well as the ROI of the various solutions that you put in place.

Once you have your program defined and in place, you can continue to monitor the progress of the security program, using incident tracking and data analytics to create reports to show the efficacy of the program. This way, you ensure the program is consistently working at its best and is in line with the business’ requirements, which can change over time. This is the heart of the risk management lifecycle.

Embracing an ESRM model can change the way your business thinks about security, for the better, with a view to the value security provides, not just the “overhead cost” of the program.

 

 

KEYWORDS: asset protection enterprise risk management ESRM risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joe Young is a contributing wirter and the SVP of Innovation for G4S.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing