This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This month we will discuss the advantages and disadvantages of reporting to the General Counsel (GC). Most enterprises combine a number of functions under the Office of the General Counsel... the most common include Chief Legal Officer, Chief Compliance Officer, Secretary of the Board of Directors and, in many enterprises, Chief Administrative Officer.
Where within the enterprise the corporate security department reports is often more form over function. It may be personality driven, power driven or simply a corporate culture thing. Many companies have a hard time deciding where corporate security should report.
Throughout my career as a CSO, I have had the opportunity to manage proprietary and contract security forces, as well as having had a very large hybrid operation that was a mix of both proprietary and contract security officers.
The four previous columns in this series were designed to help prepare you for collecting vital insights into the views of senior executives and key leaders across your enterprise.
The previous three columns have laid the groundwork for establishing yourself as an effective influencer. In this month’s column, we will explore gaining the unique insights necessary to establish a program that will truly provide value to the enterprise.
In last month’s column, we provided background on what the term “Influence” really means. This month we will explore what you need to do to lay the foundation to become an effective influencer.
There are significant opportunities for security and risk executives to be influenced as well as to be the ones that are acting as the ones that are influencing others.