Front Cover -- Becoming a Global Chief Security Executive Officer -- Copyright -- Contents -- About the Author -- 1 - Business Operations Protection: The Future of the Security Executive -- THE TERM AND THE FUTURE OF YOUR PROFESSION -- The Complexity of Protecting a Business -- Service Ownership -- EFFECTIVE RISK MANAGEMENT -- CSO=Risk Execution -- Measurement of Accountability -- Complex Mechanisms and Complex Algorithms -- THE IMPERATIVE OF OPERATIONAL EXCELLENCE -- Equity and Efficiency -- Being a Business Leader versus a Security Person -- TRANSPARENCY -- Transparency of Operations -- Understanding the Importance of a Value Chain -- Root Cause Management -- Truth in Services -- THE POWER OF DATA -- Intelligence -- Decision Support -- PEOPLE, PROCESS, TECHNOLOGY -- The Importance of All of It -- Practitioner Pipeline Management -- 2 - Converged Security: The What and the Why -- OPERATIONAL AND ACTION TRANSPARENCY -- The Single Most Important Attribute -- Creating Business Simplicity from Issue Complexity -- THE BUSINESS OF THE FUTURE -- Technical -- Technology in Business -- Technology and the Human Process -- Technology in Crime -- Technology and Multidisciplinary Security, Risk, and Privacy Operations -- Global By Default -- Regulation -- Interconnected Business Ecosystems -- THE COST OF GOODS SOLD -- Efficiencies to Drive Investment -- LEADERSHIP -- Capabilities and Diversification -- Talent and Succession -- OVERSIGHT AND GOVERNANCE -- Focus from Executive Committees and Boards -- CONVERGED TECHNOLOGY AND ARCHITECTURE -- Leveraged Infrastructure Equals Smart Business -- Tactics, Techniques, and Procedures -- Creating Intelligence -- TIME TO RESOLUTION -- Accountability and Decision Ability -- Action and Oversight -- THE TWO-HEADED POLITICAL MONSTER -- METRICS TO THE RESCUE -- 3 - The Job of the Senior Security Executive
REALITY: THE STATE OF SECURITY RISK AND PRIVACY TODAY -- Reliance of the Global Economy on Computer Infrastructure -- Human Capital -- Intellectual Property -- The Impact of Crime, Terrorism, and Violence on a Business -- The Who and the Why -- The Changing Privacy Climate and Its Effect on Sustainable Business Operations -- The Business Ecosystem and the Critical Impact of Trust -- Technology as a Lever, Not a Solution -- Market Opportunity and the Supporting Role of Security -- THE CSO AND THEIR ROLE -- To Protect -- To Respond -- The Business Principals -- Technical versus Nontechnical -- The Converging Paths of Disciplines -- Chief "Sales" Officer -- The Basics -- Actions That Walk the Walk -- The Sexy Side of Security -- CREATING YOUR MISSION -- Your Mission, Not Theirs -- Mission and Motivation -- Creating a Compass -- Creating the Story -- Transparency Through Facts -- You Are the Expert -- Becoming a Learned Person -- Confident Leadership -- 4 - Execution Assurance -- TIME TO RESOLUTION -- REMOVING LAYERS -- EFFECTIVE COMMAND AND CONTROL -- 5 - Concepts of Organization -- ENABLING ORGANIZATIONAL SUCCESS -- Development (Individual and Organizational) -- Instilling a Sense of Mission -- A Services Philosophy -- CONCEPTS IN SECURITY ORGANIZATION -- How We Got Here -- Stigmas and Dogmas -- There Is No Overlap -- It's a Totally Different Skill Set -- Technologists Can't Manage the Physical Side of the House -- Cops Can't Possibly Understand Business and Technology -- Classic Organizational Design Principals -- Convergence: The Future of Your Profession -- Industry and Vertical Considerations -- Critical Infrastructure Protection -- Multinational Organizations -- Data Protection -- Privacy and Consumer Protection -- Data Movement -- Data Processing -- Reporting -- Operational Requirements -- Prohibited Acts -- Governments and Government Contractors
Personnel Security -- Cyber Security -- Fraud Industries -- Retail and Supply Chain -- Remote Security Management -- Nonpremise Security Assurance -- Converged Technology Service Leverage -- Organizational Design Basics -- Five Functional Program Elements -- Executing -- Design Well -- Flexibility -- Build versus Operate -- 30-60-90 -- Maturity and Expectations -- Your Multiyear Plan -- MODELS FOR ORGANIZATIONAL ADVANCEMENT -- LIFE CYCLE ORGANIZATIONAL ASSURANCE -- Strategy Alignment -- Mission Effectiveness -- Service Maturity -- Organizational Efficacy -- RE-PLANNING -- Strategic Business Alignment -- Over-the-Horizon Planning -- Opportunity Creation -- Fiscal Considerations -- Services Alignment -- The How To -- Business Input -- Revisiting Service Commitments and Maturity -- Gap Analysis -- Prioritization and Financial Planning -- Stakeholder Buy-in -- OPTIMIZATION -- Creating Efficiencies -- Automation -- Outsourcing -- Maintenance→Not Status Quo -- 6 - Advance Program Development -- SITUATIONAL AWARENESS: UNDERSTANDING THE BATTLEFIELD -- The What -- The Business -- KNOW YOUR BUSINESS -- Go to Market -- Functional Makeup -- Executive Committee -- Divisional and Business Unit Makeup -- Corporate Functions versus BU Ownership -- Policy -- Technology -- Security Program -- Politics -- KNOW YOUR INDUSTRY -- Maturity Model -- Competition -- Business Models -- Protection Models -- Senior Security Leaders -- KNOW YOUR CLIENT -- THE THREAT SURFACE -- What Are You Protecting? -- Where Are You Protecting? -- Regulatory Considerations -- Threats -- RESPONSIBILITIES VERSUS MISSION IMPERATIVES -- Contractual Considerations -- Third Parties -- The Adversary -- How to Get That Information and Why It's Important -- The Risk -- The Technology -- YOUR CAPABILITIES -- YOUR TEAM -- RELATIONSHIPS -- Road Maps and Strategic Planning -- Strategic Thinking
Strategic Security Planning Components -- Why Tactical Can Be Strategic -- Over-the-Horizon Thinking -- Document -- Innovation -- The Importance of Innovation -- Enabling Company Innovation -- WHY SECURITY ORGANIZATIONS INNOVATE -- 7 - Your Five-Step Section to Operational Execution -- INFORMATION SECURITY AND CYBER -- Prevent, Deter, Detect, and Respond -- Security Ecosystem -- Authentication, Authorization, and Audit -- Critical Asset Protection Program (CAPP) -- Intelligence-Led Security -- Critical Incident Analysis and Response -- Platform Sustainability -- CORPORATE SECURITY -- Public and Workforce Protection -- Facilities Security -- Fire Protection -- Active Shooter Protection -- Criminal and Civil Investigations -- Fraud Prevention -- Travel Security -- Kidnap and Ransom Operations -- Executive Protection -- Business Resilience -- Specialties -- OPERATIONAL RISK MANAGEMENT -- Risk Life Cycle -- Governance Risk and Compliance -- Accountability -- Enterprise Risk Management -- CONTROLS ASSURANCE -- CLIENT FOCUS -- Delivering Trust -- Chief Sales Officer and Market Impact -- Field Enablement -- EXECUTING -- Being the Rock -- Continuous Momentum -- Obsessively Devoted to Outcome -- Delivering Trust through Action -- Creating Your Wake -- 8 - A Focus on the Business -- SUSTAINABILITY -- PARTNERSHIPS IN DELIVERY -- Employees -- Information Technology -- General Counsel -- Human Resources -- Enterprise Risk Management -- Executive Committee -- The Board -- YOUR NEW JOB: A MARKETING GURU -- Your Presence and Presentation -- Changing Corporate DNA through Human Behavior -- Media Is Your Friend -- Developing Your Skill Set -- 9 - Your Career as a Chief Security Officer -- CREATING YOU AS THE CSO -- Your Road Map as a Total Person -- Family -- Your Moral and Ethical Compass -- Mind, Body, and Soul -- The Executive Road Map -- Practitioner -- Manager
Entry-Level Leadership -- Expanded Responsibility Leader -- Executive -- As a Practitioner -- Technical -- Risk -- Converged -- Privacy -- CONTINUOUS LEARNING -- YOUR BRAND -- ESTABLISHING YOUR BRAND -- Conclusion -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Back Cover