Are we moving toward simplification or complexity in our implementation of Physical Security Solutions? Perhaps the answer is "Yes". Read how one consultant is reading the market trend "tea leaves" and Phil Aronson's response.
Data Centers can be a business with an underlying value proposition of trust. Their brand is uniquely tied to their ability to protect their client's assets. It begs the question: Are you taking your organization's brand seriously? Andy Barclay, ASG Program Manager for many data center clients, addresses the value equation of this unique market.
Phil Aronson is featured monthly in Security Magazine with a column called "The Corner Office". The June column, below, featured his conversations at ISC West. We all agree we will be continuing the conversations at ASIS 2017 in September. Perhaps Mark Cuban, the ultimate shark, will be investing in companies pursuing these innovations. If you are interested in meeting with us, please send us a line at email@example.com.
My company hosted The Great Conversation in Security in March and quickly followed up with a trip to Las Vegas for ISC West 2017. I have assembled a list of conversations we had at both events. I think they will help to shape 2017-2018 for us and the industry.
The Power of the 360º Program. There is no question that vendors are moving quickly to create a holistic real-time visualization of the entire risk, resilience and security program from situational risk to continuous quality improvement through the management and measurement of key performance indicators.
Security Risk Management Services providers are creating "scorecards" or evaluation criteria for categories of technologies such as access control, video surveillance and critical communications. At PSA TEC, Aronson Security partnered with Setracon and Zenitel to explore the scorecard for critical communications.
By Phil Aronson
Originally published in Security Magazine’s April Issue – The Corner Office
I have been given the opportunity to be a member of a few security executive forums. These are trusted communities. It is understood that some information cannot be shared or, if shared, not attributed. I am honored and humbled to be a part of these leadership associations.
When you walk away from such meetings, you realize the world is very complex and not one of us in the room have all the answers. I also remind myself that although the world can be a frightening place, there is hope when people of integrity, vision and faith work together to make it safer for generations to come.
From these groups, I attempt to take the learnings and apply them to our clients, our employees and, ultimately to the strategic direction of my company. I know others are doing the same.
Here are some of the paths of knowledge I am taking because of these meetings to see a little farther down the road.
- We must be a trusted advisor. But now trust is more than a relationship; it is a responsibility to build the competencies needed to construct a highly resilient and valuable risk mitigation program for our clients. This will include the security of security technology itself and the sustainable practices to keep it secure.
We live in an evolving security business landscape. Without having a core discipline around innovation and change, we will be slow to adapt. Given this, a new definition of ‘‘trusted advisor’’ is needed; one that can help the client see the reality of their situation. This would include identifying the waste and the opportunity as well as the strategic imperatives that will create value for the organization.