Skip to content

How Your Influence Can Help or Hinder ESRM Maturity

The enterprise security risk management (ESRM) approach, though, flips that script by putting operational decisions about how to mitigate or accept risk in the hands of the asset owner and positioning the security leader as more of an internal consultant who can guide decisions that meet the asset owner’s needs and enable the business.

There’s a catch-22 in ESRM though: ESRM increases security’s influence in the organization, but security leaders need influence in order to advocate for an ESRM approach to risk management.

Read More

Featured Articles

Focus on ESG Initiatives

An Environmental, Social, and Governance (ESG) Primer for Security Practitioners

Each organization’s priorities around ESG will be different. Before security directors get involved, they should gain further understanding of their company’s goal.

More On This Topic
Where Does ESG Intersect with Security?
Integrating ESG into Security Management: Addressing the C-Suite Challenge
How ESRM Principles Can Help Security Leaders Support ESG Initiatives
5 Ways ESG Creates Organizational Value

Security Technology: Smartphones for Smarter Security

More than 86 percent of the world’s population has a smartphone. These pocket computers continue to change the way people work, socialize, and interact with their closest connections. Security practitioners are no exception, relying on mobile devices for authentication purposes, access control, and to conduct day-to-day tasks to move their organizations forward. In the August issue of Security Technology, contributors share the benefits of incorporating mobile devices into an organization’s security posture alongside practices for managing the risks this technology exposes users to.

Security Management Podcast

September 2023: Aim to Improve with Better Mentoring, Better Planning, Better Ethics

Alan Greggo, CPP, explains how situational leadership principles can help shape your workforce development and mentoring approach for each individual in your organization. Also in this episode of SM Highlights, learn about how to establish a clearer, more effective project management process for security system design with Mohammed Shehzad and John Hall. And Michael Bacon, CPP, joins SM Highlights host Brendan Howard to discuss the critical role of ethics in security management—and life overall.

Focus on Mental Health Hazards

How to Build a Trauma-Informed Workplace

Given the ubiquity of trauma in the world, some experts are calling on employers to develop “trauma-informed” workplaces. As a result, a number of training programs have popped up to help organizations through the storms.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: Modern Management and Leadership: Best Practice Essentials with CISO/CSO Applications

In Modern Management and Leadership, Best Practice Essentials with CISO/CSO Applications, author Mark Tarallo has written a valuable guide to help a CSO be successful in their role.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.


Hear what Security Management editors and guest speakers have to say about this month’s magazine.



View all of our past and upcoming educational webinars.


Media Kit

Learn more about opportunities to partner with Security Management for editorial, marketing, or research purposes. 



ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.