Executive Megatrends: National Security Survey

English: Risk management sub processes

English: Risk management sub processes (Photo credit: Wikipedia)

This year’s survey of senior-level IT and physical security professionals indicate that risk assessment and management are appearing with greater frequency on the C-Suite’s agenda, becoming a priority in driving security decisions for agencies and organizations across all sectors. Aligned with this prioritization, survey respondents report a rise in the number of new systems and technologies managed within their organization as well as the number of external agencies and organizations with which they coordinate.

Survey findings also reveal that, while budget continues to be the single largest obstacle to the advancement of security organizations, the financial woes of recent years slowly are receding, with fewer of this year’s respondents noting budgetary concerns as a stumbling block to the development of their security programs compared to years past.

Research Highlights

Organizations are Increasingly Focused on Risk Reduction

  • Respondents said the need to create a common operating picture across all security systems is the biggest driver of security plans for the next 12-18 months (22 percent), while the need to reduce risk to the organization is the second biggest (20 percent).
  • Eighty-one percent report that the ability to have a proactive, risk-focused approach that ensures greater overall security with a holistic view of the enterprise is important or extremely important to their organization.
  • More than 30 percent plan to invest in risk management technology in the next 12-18 months.
  • Fifty-four percent of respondents said risk management is a higher priority than 12-18 months ago, with more than 35 percent of organizations’ executive leadership viewing it as critical and 26 percent directly aligning it with their business strategy.

The PSIM Market is Experiencing Steady Forward Momentum

  • Seventy-three percent of this year’s respondents ranked integrating data from traditional physical security devices and systems (access control, video, etc.) as well as from operational devices and systems (RFID, GPS, building management systems, etc.) into one common operating picture as important or extremely important.
  • Sixteen percent cited a lack of a unified view of all security systems and operational technologies in place as the biggest technology obstacle to moving their security organization forward.
  • More than 30 percent said they plan to invest in physical security information management (PSIM) software over the next 12 to 18 months—a nearly 10 percent increase since 2010.

**Share the Magazine with your executive colleagues and friends!

Follow the Magazine:
https://businessleadershipmanagement.wordpress.com/subscribe-follow-the-magazine/
(After you have filled in your email address in the column at the right hand side of the screen, a confirmation email will sent to your email address. You will have to confirm it before subscription begins)

Follow us on Twitter:
https://twitter.com/BusinessLeaders

Like us on Facebook:
https://www.facebook.com/BusinessLeadershipManagement

**As part of the Magazine’s drive to reward subscribers/followers, we will be providing subscribers/followers special access to exclusive content which will not be otherwise available to normal visitors. Please be sure to subscribe to the Magazine. Many visitors have given us positive comments that they will be bookmarking the site, but as the system is unable to capture a working email address to which the passcodes for exclusive content will be sent, they will miss out on this content. Do note that passcodes are locked to each exclusive content, not a one-for-all access, so do provide a working email address that you check regularly so as not to miss out on them!

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s