Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Navigating the Path to ESRM

By Maggie Shein
4b3ab5f0-340d-11eb-badb-a0369f103266
December 1, 2020

First released in 2019, the ESRM Guideline on Enterprise Security Risk Management (ESRM) from ASIS International is meant to be a strategic tool to elevate security as a function of a business and encourage partnership between security professionals and other departments and business leaders, while reducing the silos that exist in many enterprises.

ESRM is not an abstract concept, but rather, can give security professionals (and enterprises as whole) a tangible plan that will allow corporate security leaders to keep up with their industry peers, meet executive expectations and mitigate risk.

The road to ESRM is long and takes hard work. It often involves a change in culture, a reduction of silos, and visibility of security within the company. 

“ESRM goes and takes a holistic view of security. It takes all security elements and opens a door by breaking down old silos and moving it from a ‘lone wolf’ operation into making a ‘wolf pack,’” says Thomas Berkery, Enterprise Security Investigations & Reporting, Discover Financial Services.

 

So how can security professionals begin taking an ESRM approach to risk within their organizations?

Arguably the most important key to a implementing a successful ESRM strategy is fostering a risk management culture across the entire organization. This automatically removes silos and remove overall responsibility for security and safety from just one person or one department. Security professionals can begin by building those relationships across the organization and keeping security from being siloed.

At the same time, however, though ESRM takes a holistic view of overall security risk, one of the major elements of the strategy is defining who is responsible for what. With the ESRM approach, whoever owns the asset in an enterprise, owns the risk.

 

But where do you begin?

Well first and foremost, enterprises must look at workflows and establish very clearly defined workflows, according to Berkery. Speaking at a webinar titled The Path to ESRM in late September, Berkery says that building out workflows, allow security professionals and the enterprise to bridge gaps in terms of ownership of assets. In other words, identifying who exactly is responsible for what allows all parties to build workflows and bring them together for a better response.

Bridging the gap between departments, between employees and between locations, allows organizations to clearly see who is responsible for what and encourages working together. Indeed, working together is essential for the success of an ESRM model. If one party isn’t willing to take ownership of their role, then the model can’t succeed. Here, communication is key and strong leadership is at the tip of the sphere, says Berkery.

Once risks are identified and determined, a proper gap analysis enables efficient response.

Another key to the ESRM approach is proper identification of risks, Berkery says. “Proper identification of risks is the only way to work toward a solution. [In this regard] asset ownership is so important.” Berkery adds that if the same risk or issue keeps surfacing again and again within a company, this shows the enterprise that proper remediation, asset ownership or co-partnership is missing.

Having a proper culture in place and buy-in from the entire organization are the starts of implementing ESRM. But one of the other keys to ESRM strategy, particularly in regards to its long-term effectiveness, is continual assessment and communication. Of course, this goes back to fostering a culture of risk management. ESRM is a continual approach and one that must be backed by regular assessments and communications as part of the daily life in an organization, says Brad Rooke, CPP, Senior Solutions Consultant, Customer Success at Igloo Software.

 

How can organizations ensure success?

Rooke says traditional risk assessments should be done quarterly or annually. But that’s not the end of it, he cautions. “They shouldn’t be reactionary,” he says. When processes or plans change within an organization – at any level, in any department – risk must be reassessed and addressed. The only way to achieve this, of course, is through communication (one of the pillars of ESRM that we talked about earlier).

Risks may be small or large scale, and the question to address is, how risky is this, and if not addressed or not communicated properly when something changes, how will it impact the overall business or enterprise? “It takes time to do this and it can’t just be one person,” Rooke says.

If organizations can successfully introduce a collective culture of risk management, then there’s no need for a lone wolf. “Everybody then has skin the game and everyone also has a concept of their territories,” Rooke says.

KEYWORDS: business corporate culture professional security tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing