Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

What You Don’t Know Could Get You Fired

By Kevin Coleman
July 21, 2016

As if all the risks associated with protecting an organization’s physical and digital assets weren’t challenging enough for CSOs and CISOs, new trends are making them far worse. Multiple times in the past year this issue came up. Once aware of the issue, multiple other incidents were discovered. All this combines to make another extremely challenging security situation for CSOs and CISOs.

Business units, functional departments and other divisional entities within the organization are going outside and funding their own initiatives. Many times these initiatives involve data and systems that are not just outside the organization, but totally unknown to the IT department and the offices of the CSO and CISO. Many of these services are cloud based with a substantial amount of data (some sensitive - proprietary, confidential, PII and PHI) collected, stored, and used in and by the cloud applications/services.

Top 3 questions the CSOs and CISOs must work quickly to answer and respond to appropriately.

  1. Has any of these outside services been breached resulting in the theft of data?
  2. Are these outside services compliant with the requirements of your organization?
  3. Are these outside services and data properly protected from physical and cyber threats?

Example: An organization contacted me and told me that they had detected a third-party operating an online service that appeared to be performing a service in their name. A check with purchasing could not find any purchase of such services by the organization. Given that fact, the legal and security departments worked together and decided to contact law enforcement before contacting the outside service provider. As the situation progress it was determined that an internal department had contracted with the third-party services provider. Given the fees were small, the service provider had been paid out of their general budget and did not involve regular procurement, IT or security. Given the third-party service provider was outside of their industry, they were unfamiliar with some of the unique regulations that were required by the organization using their services. So, there was no way they were compliant. It is unclear if the organization was permitted to examine their systems to see if a breach of the data the organization collected, processed and stored had been compromised. Perhaps the most interesting aspect of this example was that the use of the outside service was discovered by a simple Google search of the organization’s name. Basically, there were no policies, procedures or rules that prohibited the business unit from doing this.

I am sure that you can see the risks associated with this example. Many believe that data breaches by vendors and their-party service providers are more-costly than in-house occurrences. In addition, many IT departments and security departments feel that managing regulatory compliance and data risks are much more problematic. Many IT and security departments have expressed supply-chain (vendor) concerns. That being said, these unknown systems fall outside of their efforts to address that issue.

Stat: One survey found that 23 percent of those asked were not concerned about third-party risks at all.

As a security professional this is an issue that requires your attention. Policies must be crafted, put in place and properly communicated to get control over the unknown use of third-party that involve systems and data. It is recommended that a manager level and above annual survey be conducted asking if they have contracted with any third-party services provider. Heavy wordsmithing is needed so that they understand what you mean by third-party and what you are looking for and equally and important why. If nothing else, at least annually conduct and online search using your organization’s name and name that may be used by operational units and divisions to see if you can detect any third-party services under your organizations name or names. How hard is that?

Kevin Coleman is a dynamic speaker, author, advisor, and visionary with Independent Software.  He provides riveting insight on strategy, innovation, high velocity technologies and the issues an opportunities they present. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.


 

KEYWORDS: Chief Security Officer (CSO) CISO security risk management

Share This Story

Kevin Coleman is a dynamic speaker, author, advisor, and visionary that provides riveting insight on strategy, innovation, and the high velocity technology. He was Chief Strategist at Internet icon Netscape and at another startup that grew to be BusinessWeek’s 44th fastest growing company. He has spoken at some of the world’s most prestigious organizations, including the United Nations, the U.S. Congress, at U.S. Strategic Command, and before multiple Fortune 500 organizations and briefed executives in 42 countries around the world.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing