Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Strategic Security

The issue of corporate risk and reputation

How can a security leader build resilience and internal risk management programs to protect an organization’s reputation and, ultimately, operational continuity?

By James Blake
reputation
profile
reputation
profile
September 9, 2022

The issue of corporate risk and reputation for the C-suite is among the most pressing concerns for many multinational companies. After all, the impact of an issue or event to the organization — depending on the type of incident — could mean large regulatory fines, reputational damage linked to the loss of clients, damage to company share price, disruption or closure to business, and in some cases, criminal charges of negligence against executives and/or the organization.

The Enron scandal is a worst-case example of what can happen to a company if risk management is not prioritized within organizations which, in 2001, resulted in the bankruptcy of the company with more than $63.4 billion in assets, along with damage to shareholders and board members.  

But, of course, there are other examples that have caused companies to collapse, the C-suite to resign or be fired, or companies to shut down.

The BP oil spill from 2010 — which led to 172 million gallons of oil dumped into the Gulf of Mexico, followed by an explosion that killed 11 workers at the Deepwater Horizon drilling rig off the Louisiana coast — is a notable example in terms of impact to an organization. BP pleaded guilty to 12 felony counts from the accident and Transocean, the other company involved in rig operations, pleaded guilty to a misdemeanor violation of the Clean Water Act. BP’s share prices dropped by billions of dollars and caused a considerable drop in the price of crude oil.

The current and emerging risks to multinational, global enterprises or any size organization include cyber, natural disaster, and physical risks, which means that the potential impact can have far-reaching implications. Of added concern is that these risks are often not contained to a specific geography, given the transnational nature of work, the ability of different threat actors to operate remotely, but seek to exploit vulnerabilities, and the more frequent cases of natural disasters.

The issues of the “return to work;” how to manage international travel and the risk impacts of travel on employees; and the changing risk landscape due to COVID-19, all mean that the issue of managing an array of strategic risks will likely become more important in the coming months and years.

It is increasingly likely that technology companies bear legal risks or implications from compromised personal data or the potential for disinformation on their platforms — particularly if they operate in the U.K. and Europe and must follow the General Data Protection Regulation (GDPR) and data privacy restrictions. Incidents can result in huge fines, the restriction of a company’s ability to operate in some countries, and the loss of confidence in other platforms elsewhere in the world.

In other words, the current threat environment has changed the importance and balance of risk mitigation from a company’s reputation and branding protection perspective — and the evolving threat landscape highlights the importance of building resilience and internal risk management programs to protect an organization’s reputation and, ultimately, operational continuity.


How Can Security Executives Reduce Exposure and Protect Their Organization’s Reputation?

  1. To more efficiently manage risk and minimize risk exposure, security executives can take seven practical steps:
  2. Adhere to ISO frameworks and specific additional mitigation measures within more specific sectors, such as ISO 31,000 and ISO 27,000.
  3. Establish clear policies for an acceptable residual risk level, which is often communicated to board members, shareholders and interested stakeholders.
  4. Ensure that there is sufficient training and communication in terms of how specific risk issues are likely to cascade across different components of an organization. In the event of an incident, the impact on different components or branches across an organizational structure is often not clearly considered or understood. This further emphasizes the need for organizational training and planning ahead of incidents, in an attempt to ensure that the full impact of risks is considered.
  5. Invest in internal corporate security teams conducting horizon scanning, stress testing of worst-case scenarios, emergency planning and measuring potential impact of various likely risks.
  6. Build crisis management teams to reduce the impact of threats on an organization and ensure events are handled effectively. Put solid communication plans in place and involve relevant stakeholders early in the process.  
  7. Focus on effective travel security risk management programs and solutions by understanding up-front risks and any subsequent changes in the threat environment where employees and travelers are going.
  8. Conduct incident reviews and ideate changes to the existing security framework to manage issues more efficiency, as well as ensure that various internal systems become more resilient in terms of skill sets and use of relevant technology to reduce apparent vulnerabilities.

For more articles on reputation protection, business resilience and operational continuity, visit:

Countering disinformation: An essential new role for CSOs

Data security is critical to your organization’s reputation strategy

Cyber resilience is crucial to maintaining brand reputation

KEYWORDS: business continuity corporate protection risk management security management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Linkedin

James M. Blake has worked in corporate security, emergency risk management and conflict risk analysis for over 10 years. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Reimagine the corporate security team

    Reimagine the corporate security structure

    See More
  • Frank Figliuzzi talks on security insider risk and brand reputation

    Spend 60 minutes learning to protect your corporate brand & reputation in the digital age

    See More
  • SEC0921-Edu-Feat-slide1_900px.jpg

    Technology ownership and risk management: The critical step corporate security professionals are making

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
  • January 16, 2025

    Preparing for the 2025 Threat Landscape

    ON DEMAND: In 2024, businesses faced a barrage of critical events with far-reaching impacts. From record-breaking storms and costly infrastructure failures to contentious election cycles and sophisticated cyberattacks, companies are navigating an increasingly complicated threat landscape.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing