SlideShare a Scribd company logo
1 of 19
Download to read offline
Security Trends…
From “Silos” to Integrated
Risk Management
Career Highlights
❖ Walt Disney World Security
❖ US Department of State
(Diplomatic Security Special Agent)
❖ Center for Personal Protection & Safety
(CPPS)
❖ DJ Benson & Associates, LLC
❖ Securing Souls Ministries, LLC
❖ Vice President, ATAP Fla. Board of Directors
❖ Certified Threat Manager (CTM)
Career Highlights
Overview
Security Challenges – State of Play: Are We…
• Safer…Worse off…About The Same?
• What Are The “Challenges” We Face?
Moving from Traditional Risk Management Models…
• “Hybrid” Approach
• Inter-Disciplinary & Behavioral Based
What’s Next… Reliable Analytics
• Predictive
• Performance
Security Challenges…
Security
Challenges…
• Is Our World Safer?
• Worse Off?
• About the Same?
• Why is That?
A Broader View…
Environments Are Converging…
A Broader View…
Due to Advances In Technology & Social Media…
A Broader View…
Higher Potential For Risk Exists In All Environments
Result
Risk Prevention and
Response require hybrid
solutions, which
consider all
environments
Security Challenges
❖ Life environments are converging
❖ Synergistic effect of increased violence with
convergence of life environments
❖ Need for broader, more-encompassing definitions of
“Workplace Violence…”i.e. “Work Environment”to
respond to changing world environment
❖ Increased regulatory, legal and compliance scrutiny
demand greater planning, prevention and response
❖ What is the “WORKPLACE” today?
❖ “Mobile workforce”
❖ Traveling on business
❖ The WAY and WHERE of work is changing
❖ WORK “ENVIRONMENT” impacted by:
❖ Place or location where work conducted
❖ Personal & Social lives of the workforce
❖ What constitutes VIOLENCE?
Security Challenges
Specific
Challenges
We Face
• Crime
• Cyber – Social Media & Insider
Threat
• Extreme Violence (Active Threat)
• Domestic and International Terror
• Work “Environment”
Risk Management
Transitions
“Hybrid” Risk
Management
Solutions…
Transition from Traditional “Silo” Approach Based
Upon…
• Expertise
• Responsibilities
To Multi-Functional Approach
• Behavioral Based…Focused upon
• What…Then Who
Resulting in
• Inter-Disciplinary “Consensus” Strategies
• More Effective
• Less Liability
Incident Management
The Complete Picture
So What’s Next?
Reliable Analytics…
Analytics…
Risk Versus
Threat
Integration of Program Data
❖ One Size Does NOT Fit All…Analytics should be Broken
out into two Categories to be useful in Risk
Management Process
❖ Predictive
❖ Performance
Thanks!
Any questions?
@DavidJBenson1
dave@securingsouls.com
t: 407-361-2821

More Related Content

What's hot

Risk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanRisk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru Nagappan
BCM Institute
 

What's hot (20)

An Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management ApplicationAn Intro to Resolver's Incident Management Application
An Intro to Resolver's Incident Management Application
 
What cybersecurity risk management entails
What cybersecurity risk management entailsWhat cybersecurity risk management entails
What cybersecurity risk management entails
 
Risk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru NagappanRisk 101 – Know the Unknown by Nehru Nagappan
Risk 101 – Know the Unknown by Nehru Nagappan
 
Taking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business ContinuityTaking a Data-Driven Approach to Business Continuity
Taking a Data-Driven Approach to Business Continuity
 
An Intro to Core
An Intro to CoreAn Intro to Core
An Intro to Core
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Countering Cyber Threats
Countering Cyber ThreatsCountering Cyber Threats
Countering Cyber Threats
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Spreadsheets vs Software for SOX Compliance
Spreadsheets vs Software for SOX ComplianceSpreadsheets vs Software for SOX Compliance
Spreadsheets vs Software for SOX Compliance
 
Modern Security Risk
Modern Security RiskModern Security Risk
Modern Security Risk
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
An Intro to Resolver's Risk Application
An Intro to Resolver's Risk ApplicationAn Intro to Resolver's Risk Application
An Intro to Resolver's Risk Application
 
Ballot: Risk Assessments Made Simple
Ballot: Risk Assessments Made SimpleBallot: Risk Assessments Made Simple
Ballot: Risk Assessments Made Simple
 
Bay Dynamics
Bay DynamicsBay Dynamics
Bay Dynamics
 
Security Compliance Tackled by Taylor Hersom
Security Compliance Tackled by Taylor HersomSecurity Compliance Tackled by Taylor Hersom
Security Compliance Tackled by Taylor Hersom
 
Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)Security vulnerability assessment & liability(li)
Security vulnerability assessment & liability(li)
 
Risks and TCoR
Risks and TCoRRisks and TCoR
Risks and TCoR
 
Risk Management Case Study - Applied Concepts
Risk Management Case Study - Applied ConceptsRisk Management Case Study - Applied Concepts
Risk Management Case Study - Applied Concepts
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 

Similar to Security Trends: From "Silos" to Integrated Risk Management

Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Resolver Inc.
 
Risk Assessment About Building And Risk
Risk Assessment About Building And RiskRisk Assessment About Building And Risk
Risk Assessment About Building And Risk
Faheem Ul Hasan
 
A public health approach to preventing malware propagation
A public health approach to preventing malware propagationA public health approach to preventing malware propagation
A public health approach to preventing malware propagation
UltraUploader
 
Pursuing Zero Harm: A Powerful Platform for Embedding Lean Capability
Pursuing Zero Harm: A Powerful Platform for Embedding Lean CapabilityPursuing Zero Harm: A Powerful Platform for Embedding Lean Capability
Pursuing Zero Harm: A Powerful Platform for Embedding Lean Capability
KaiNexus
 

Similar to Security Trends: From "Silos" to Integrated Risk Management (20)

Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
Risk Reimagined! Series- The Importance of People and Culture to Effective Ri...
 
Risk management models - Core Consulting
Risk management models - Core ConsultingRisk management models - Core Consulting
Risk management models - Core Consulting
 
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptxCapTech Talks Webinar April 2023 Joshua Sinai.pptx
CapTech Talks Webinar April 2023 Joshua Sinai.pptx
 
Chicago risk reimagined
Chicago risk reimaginedChicago risk reimagined
Chicago risk reimagined
 
Health and Safety on Mission: Mitigating Safety Risks: A Personal and Profess...
Health and Safety on Mission: Mitigating Safety Risks: A Personal and Profess...Health and Safety on Mission: Mitigating Safety Risks: A Personal and Profess...
Health and Safety on Mission: Mitigating Safety Risks: A Personal and Profess...
 
David Hancock - Risk Leadership in a world of Uncertainty and Ambiguity
David Hancock - Risk Leadership in a world of Uncertainty and AmbiguityDavid Hancock - Risk Leadership in a world of Uncertainty and Ambiguity
David Hancock - Risk Leadership in a world of Uncertainty and Ambiguity
 
Cybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and CommunicationCybersecurity Risk Perception and Communication
Cybersecurity Risk Perception and Communication
 
Risk Assessment About Building And Risk
Risk Assessment About Building And RiskRisk Assessment About Building And Risk
Risk Assessment About Building And Risk
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
Risk And Threat Assessment
Risk And Threat AssessmentRisk And Threat Assessment
Risk And Threat Assessment
 
DeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSODeepSec 2014 - The Measured CSO
DeepSec 2014 - The Measured CSO
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Ethics_Seminar_Uday.pptx
Ethics_Seminar_Uday.pptxEthics_Seminar_Uday.pptx
Ethics_Seminar_Uday.pptx
 
How to Secure America
How to Secure AmericaHow to Secure America
How to Secure America
 
A public health approach to preventing malware propagation
A public health approach to preventing malware propagationA public health approach to preventing malware propagation
A public health approach to preventing malware propagation
 
Pursuing Zero Harm: A Powerful Platform for Embedding Lean Capability
Pursuing Zero Harm: A Powerful Platform for Embedding Lean CapabilityPursuing Zero Harm: A Powerful Platform for Embedding Lean Capability
Pursuing Zero Harm: A Powerful Platform for Embedding Lean Capability
 
Intro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security DefenseIntro to a Data-Driven Computer Security Defense
Intro to a Data-Driven Computer Security Defense
 
6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence6 Keys to Preventing and Responding to Workplace Violence
6 Keys to Preventing and Responding to Workplace Violence
 
Carrot stick-consequences-app secdc-2010
Carrot stick-consequences-app secdc-2010Carrot stick-consequences-app secdc-2010
Carrot stick-consequences-app secdc-2010
 
#corpriskforum2016 - Julia Graham
#corpriskforum2016 - Julia Graham#corpriskforum2016 - Julia Graham
#corpriskforum2016 - Julia Graham
 

More from Resolver Inc.

More from Resolver Inc. (19)

How to Prove the Value of Security Investments
How to Prove the Value of Security InvestmentsHow to Prove the Value of Security Investments
How to Prove the Value of Security Investments
 
ERM Benchmarking Survey Results
ERM Benchmarking Survey ResultsERM Benchmarking Survey Results
ERM Benchmarking Survey Results
 
Best Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability ManagementBest Practices and ROI for Risk-based Vulnerability Management
Best Practices and ROI for Risk-based Vulnerability Management
 
Terrorism in a Corporate Setting
Terrorism in a Corporate SettingTerrorism in a Corporate Setting
Terrorism in a Corporate Setting
 
Reporting to the Board on Corporate Compliance
Reporting to the Board on Corporate ComplianceReporting to the Board on Corporate Compliance
Reporting to the Board on Corporate Compliance
 
Information Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data SafeInformation Security Best Practices: Keeping Your Company's Data Safe
Information Security Best Practices: Keeping Your Company's Data Safe
 
Modelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver CoreModelling your Business Processes with Resolver Core
Modelling your Business Processes with Resolver Core
 
How Resolver Uses Resolver
How Resolver Uses ResolverHow Resolver Uses Resolver
How Resolver Uses Resolver
 
Scammed: Defend Against Social Engineering
Scammed: Defend Against Social EngineeringScammed: Defend Against Social Engineering
Scammed: Defend Against Social Engineering
 
A Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management StrategyA Peek at adidas Group's Integrated Risk & Security Management Strategy
A Peek at adidas Group's Integrated Risk & Security Management Strategy
 
An Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience ApplicationAn Intro to Resolver's Resilience Application
An Intro to Resolver's Resilience Application
 
Keeping Your Data Clean
Keeping Your Data CleanKeeping Your Data Clean
Keeping Your Data Clean
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Leveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM ProgramLeveraging Change Leadership to Find Success in your IRM Program
Leveraging Change Leadership to Find Success in your IRM Program
 
Risk Intelligence: Threats are the New Risk
Risk Intelligence: Threats are the New RiskRisk Intelligence: Threats are the New Risk
Risk Intelligence: Threats are the New Risk
 
How to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with ExecutivesHow to Use Storytelling to Communicate with Executives
How to Use Storytelling to Communicate with Executives
 
Lessons Learned in the Aftermath of Hurricanes Harvey & Irma
Lessons Learned in the Aftermath of Hurricanes Harvey & IrmaLessons Learned in the Aftermath of Hurricanes Harvey & Irma
Lessons Learned in the Aftermath of Hurricanes Harvey & Irma
 
Integrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: BenchmarkingIntegrated Security & Risk Management: Benchmarking
Integrated Security & Risk Management: Benchmarking
 
Planning a move from GRC Cloud to CORE
Planning a move from GRC Cloud to COREPlanning a move from GRC Cloud to CORE
Planning a move from GRC Cloud to CORE
 

Recently uploaded

Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Riyadh +966572737505 get cytotec
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
alinstan901
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
Nimot Muili
 

Recently uploaded (15)

Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...Call Now Pooja Mehta :  7738631006 Door Step Call Girls Rate 100% Satisfactio...
Call Now Pooja Mehta : 7738631006 Door Step Call Girls Rate 100% Satisfactio...
 
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTECAbortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
Abortion pills in Jeddah |• +966572737505 ] GET CYTOTEC
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...Dealing with Poor Performance - get the full picture from 3C Performance Mana...
Dealing with Poor Performance - get the full picture from 3C Performance Mana...
 
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
Call now : 9892124323 Nalasopara Beautiful Call Girls Vasai virar Best Call G...
 
Intro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptxIntro_University_Ranking_Introduction.pptx
Intro_University_Ranking_Introduction.pptx
 
internal analysis on strategic management
internal analysis on strategic managementinternal analysis on strategic management
internal analysis on strategic management
 
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 99 Noida Escorts >༒8448380779 Escort Service
 
Reviewing and summarization of university ranking system to.pptx
Reviewing and summarization of university ranking system  to.pptxReviewing and summarization of university ranking system  to.pptx
Reviewing and summarization of university ranking system to.pptx
 
Agile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptxAgile Coaching Change Management Framework.pptx
Agile Coaching Change Management Framework.pptx
 
Strategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal AnalsysisStrategic Management, Vision Mission, Internal Analsysis
Strategic Management, Vision Mission, Internal Analsysis
 
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607GENUINE Babe,Call Girls IN Baderpur  Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Baderpur Delhi | +91-8377087607
 
Safety T fire missions army field Artillery
Safety T fire missions army field ArtillerySafety T fire missions army field Artillery
Safety T fire missions army field Artillery
 
Beyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable developmentBeyond the Codes_Repositioning towards sustainable development
Beyond the Codes_Repositioning towards sustainable development
 
International Ocean Transportation p.pdf
International Ocean Transportation p.pdfInternational Ocean Transportation p.pdf
International Ocean Transportation p.pdf
 

Security Trends: From "Silos" to Integrated Risk Management