Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Leadership and Management

It Starts With You: How to Mitigate Risks From the C-Suite

By Amanda Reed
workplace meeting

Photo by Rebrand Cities from Pexels

March 10, 2022

Top-down management is one of the most common management styles organizations take. And, it’s an approach that can help mitigate risks in your company. 

Forrester Consulting, a business and technology consulting firm, has covered this concept extensively. According to a 2021 report, 31 percent of executive management — out of a pool of 236 survey responses — said proactively managing critical events is a key goal. 

Here’s how you can act to prevent reactive strategies, new risks, stifled progress and more. 


Be Proactive, Not Reactive

“Cross that bridge when you get there,” although a wonderful idiom for living life, is not a sound method of thinking for your company’s risk management plan. A reactive plan — acting in-the-moment and on-the-fly — can lead to intensified problems in the future, with more frequent disaster events. Only 31 percent of risk and security executives say that a key goal in the company is becoming more proactive in their critical event management plan. A lack of understanding and prioritization from the top has present and future consequences. 

Acting proactively allows all members of the company to make better, quicker, more effective decisions when faced with a risk. Additionally, it helps with technology and resource investments.  


Understand Your Company’s Risks

Risk management is crucial in organizational resilience. However, many organizations find themselves unprepared to respond. And, with the chance of risk higher than before thanks to remote work, natural disasters and cloud architecture. That risk, however, is only set to rise: 48 percent of security executives say risk management will be more complex two years from now. Fifty-seven percent of risk and security executives say that their organization does not proactively mitigate risk. This could mean there are gaps in your risk preparedness plan.

With incidents varied, universal and inevitable, it’s important to know your risks and put plans in place to mitigate them. 


Prevent Stifled Progress With Proper Risk Management

A poor response to a critical event can lead to a tarnished reputation and lower employee morale. Sixty-one percent of risk and security executives say that the pandemic — a large disruption in business organization for many companies — negatively affected their company’s reputation; around half say the same about shooter or terrorist incidents. Improved employee confidence and morale, reduced negative impact on operations and stronger reputation are just a few benefits of effective critical event management.


Respond Holistically to Critical Events

Having an interconnected plan allows for a holistic response to a critical event. Risks can impact horizontally in the company, meaning a silo-ed approach will not lead to proper risk mitigation. 18 percent of security and risk executives say their organization uses enterprise risk management to manage critical events. Hiring business continuity or information security can help manage critical events, but proper technology is needed as well. 

In fact, some technology lacks key components that can affect ROI. More than half of security and risk executives say their organization lacks incident management technology, technology for risk, governance and compliance and technology for supplier risk and management. Proactivity can’t happen if the technology to identify and prepare for incidents is not there.

KEYWORDS: COVD-19 critical event management risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amanda reed 250x250

As SDM Staff Editor, Amanda Reed was responsible for managing the news department in the digital edition and on the website. Amanda manages the SDM E-News and Today’s Systems Integrator e-newsletters and was the person behind SDM’s social media posts on Facebook, Twitter and LinkedIn. She received bachelor’s degrees in communication/rhetoric and nonfiction writing from the University of Pittsburgh.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • pixels

    How to Use Data, AI & the Cloud to Change Your Building Operations

    See More
  • AI security

    How AI Will Influence the Future of Smart Buildings

    See More
  • digital

    Are You Utilizing Big Data in Your Building Security?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing