Budgets are under scrutiny. Worse, the resources to meet the risk are hard to find or afford. And the technology road-map is evolving so fast, that you might be missing innovations that could solve the very problems that you cannot afford to address. This article starts the conversation.
The Great Conversation on March 5 & 6 will feature a conversation around culture and security by the security executive of a Fortune 100 organization. In this column, by Phil Aronson, published by Security Magazine, we get another perspective on why culture, as Drucker once said, trumps strategy for breakfast.
As a Security Risk Management Services (SRMS) provider, we understand that most security programs will be underleveraged or undervalued if there is not an assessment of the organization’s culture.
The bottom line: Culture is another way of saying “This is how we do things around here.” In most cases, what is written down or hung on the wall does not align with “how we do things around here.” People will perform their roles, work within their processes and utilize technology to get things done; but the values that under-gird their behavior and the ability to understand them and leverage them is one of the keys to unlocking the value of security.
We know from the subject matter experts in the industry that there are tools that can be leveraged to self-assess as well as form the basis for a collaboration with a consulting firm that has a practice in organizational change management.
One self-assess tool is on the Australian Government’s Organizational Resilience website. Thank you to Ray Bernard, one of the best security minds in the industry, for referring us to the site: www.organisationalresilience.gov.au. This graphic from the site (above) is a compelling reminder of the leverage the culture has in the outcome from a serious event.
However, the culture also can be used proactively to provide a force multiplier in the reach and practice of mitigating risk.
Phil Aronson's December column in Security Magazine called The Corner Office can be fully viewed and read by following the link here. We have provided a preview of the column below As well, you can review all the columns from 2017 by clicking through to the Security Magazine Corner Office library here.
The Corner Office
Recently, Microsoft announced their definition of intelligent communications: “Highly scalable, functionally rich, enterprise grade communications and collaboration solutions that adapt to changing business conditions with the ultimate goal of providing clear directional communication at the time of need.”
Our Strategic Advisor recently attended a global technology conference held by a leader in intelligent communications. Their CTO provided some insights on how our expectations of technology have changed throughout the years.
In 1995, we were led to believe that our scorecard for communications was limited to silos of excellence. In 2002, the age of IPBX, we witnessed a change in the PBX world. Servers and devices began to be connected within an IP/IT infrastructure.In 2012, we were introduced to a new term, Unified Communications. Suddenly we had a service platform connecting mobile, PBX and Intercom with their associated devices connected through an IP/IT infrastructure backbone. Public Address and Radio systems began to provide servers with connected devices on the same network.
And now we are in 2017, moving toward an Intelligent Communications world that will connect all the communication silos together. Business models will adapt to take advantage of this new world, with systems integrators investing in the development of business solutions across multiple vertical markets to add more value to an increasingly commoditized device market.
Security System News (SSN) conducts an event called Cloud+. This year it featured subject matter experts in technology, integration and consulting. One panel focused on how the industry is coping with the skills shortage in the security industry especially given the changing nature of a sensor-driven IT architecture.
Data Centers can be a business with an underlying value proposition of trust. Their brand is uniquely tied to their ability to protect their client's assets. It begs the question: Are you taking your organization's brand seriously? Andy Barclay, ASG Program Manager for many data center clients, addresses the value equation of this unique market.
Phil Aronson is featured monthly in Security Magazine with a column called "The Corner Office". The June column, below, featured his conversations at ISC West. We all agree we will be continuing the conversations at ASIS 2017 in September. Perhaps Mark Cuban, the ultimate shark, will be investing in companies pursuing these innovations. If you are interested in meeting with us, please send us a line at firstname.lastname@example.org.
My company hosted The Great Conversation in Security in March and quickly followed up with a trip to Las Vegas for ISC West 2017. I have assembled a list of conversations we had at both events. I think they will help to shape 2017-2018 for us and the industry.
The Power of the 360º Program. There is no question that vendors are moving quickly to create a holistic real-time visualization of the entire risk, resilience and security program from situational risk to continuous quality improvement through the management and measurement of key performance indicators.