Security Technology Executive

APR 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/118926

Contents of this Issue

Navigation

Page 38 of 59

encing and cost avoidance for return-on-investment and operating results. 6. Manage information protection, breaches and situational intelligence: Brand stakeholders require confidence. Information ranging from intellectual property assets to personal identifiers must be protected from persistent physical and cyber threats. Practitioners need to roadmap protection architecture and manage information crises. Additional areas identified include managing extreme risks; evolving operational excellence; assessing next generation executive(s) and service organization(s); achieving all-hazard preparedness for resilience; compounding value beyond mission; and managing uncertainty for confidence. Embracing and building corporate security programs around these core areas is not only critical for security executives working today, but also to the emerging leaders of tomorrow. Providing this type of security business education to tomorrow���s leaders before they hit the workforce has huge implications for our industry���s ability to continue to respond and remain current with corporate risk. And it will be up to the next generation of security leaders to seize upon the opportunities facing them, the industry and the organizations they work for. Unified risk oversight is no longer just a practitioner concern or a senior management concern, it is an enterprise-wide concept impacting all levels and units within an organization. There is no longer a single point of failure ��� there are lots of players and moving parts. Who will lead the effort? It will take a new type of security leader. ��� Bob Hayes is Managing Director of the Security Executive Council (SEC); Kathleeen Kotwica, PhD, is EVP and Chief Knowledge Strategist; and Francis D���Addario is the former CSO of Starbucks Coffee and Emeritus Faculty. The SEC (www.securityexecutivecouncil.com) is a problem-solving research and services organization focused on helping businesses build value while improving their ability to effectively manage and mitigate risk. Hit a security ���Home Run��� with CyberLock. CyberLock �� Ensure your facility is ���safe��� and secure with the CyberLock system of electronic locks and programmable keys. Monitor and manage your system, administer emergency access, and receive IQEMP RSXM��GEXMSRW RS QEXXIV [LIVI ]SY EVI Learn more today! www.cyberlock.com/lock15 CyberLock, Inc. ��� 541-738-5500 ��� sales@cyberlock.com Request information: www.securityinfowatch.com/10215538 www.SecurityInfoWatch.com SECURITY TECHNOLOGY EXECUTIVE ��� April 2013 39

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - APR 2013