Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Navigating the Path to ESRM

By Maggie Shein
4b3ab5f0-340d-11eb-badb-a0369f103266
December 1, 2020

First released in 2019, the ESRM Guideline on Enterprise Security Risk Management (ESRM) from ASIS International is meant to be a strategic tool to elevate security as a function of a business and encourage partnership between security professionals and other departments and business leaders, while reducing the silos that exist in many enterprises.

ESRM is not an abstract concept, but rather, can give security professionals (and enterprises as whole) a tangible plan that will allow corporate security leaders to keep up with their industry peers, meet executive expectations and mitigate risk.

The road to ESRM is long and takes hard work. It often involves a change in culture, a reduction of silos, and visibility of security within the company. 

“ESRM goes and takes a holistic view of security. It takes all security elements and opens a door by breaking down old silos and moving it from a ‘lone wolf’ operation into making a ‘wolf pack,’” says Thomas Berkery, Enterprise Security Investigations & Reporting, Discover Financial Services.

 

So how can security professionals begin taking an ESRM approach to risk within their organizations?

Arguably the most important key to a implementing a successful ESRM strategy is fostering a risk management culture across the entire organization. This automatically removes silos and remove overall responsibility for security and safety from just one person or one department. Security professionals can begin by building those relationships across the organization and keeping security from being siloed.

At the same time, however, though ESRM takes a holistic view of overall security risk, one of the major elements of the strategy is defining who is responsible for what. With the ESRM approach, whoever owns the asset in an enterprise, owns the risk.

 

But where do you begin?

Well first and foremost, enterprises must look at workflows and establish very clearly defined workflows, according to Berkery. Speaking at a webinar titled The Path to ESRM in late September, Berkery says that building out workflows, allow security professionals and the enterprise to bridge gaps in terms of ownership of assets. In other words, identifying who exactly is responsible for what allows all parties to build workflows and bring them together for a better response.

Bridging the gap between departments, between employees and between locations, allows organizations to clearly see who is responsible for what and encourages working together. Indeed, working together is essential for the success of an ESRM model. If one party isn’t willing to take ownership of their role, then the model can’t succeed. Here, communication is key and strong leadership is at the tip of the sphere, says Berkery.

Once risks are identified and determined, a proper gap analysis enables efficient response.

Another key to the ESRM approach is proper identification of risks, Berkery says. “Proper identification of risks is the only way to work toward a solution. [In this regard] asset ownership is so important.” Berkery adds that if the same risk or issue keeps surfacing again and again within a company, this shows the enterprise that proper remediation, asset ownership or co-partnership is missing.

Having a proper culture in place and buy-in from the entire organization are the starts of implementing ESRM. But one of the other keys to ESRM strategy, particularly in regards to its long-term effectiveness, is continual assessment and communication. Of course, this goes back to fostering a culture of risk management. ESRM is a continual approach and one that must be backed by regular assessments and communications as part of the daily life in an organization, says Brad Rooke, CPP, Senior Solutions Consultant, Customer Success at Igloo Software.

 

How can organizations ensure success?

Rooke says traditional risk assessments should be done quarterly or annually. But that’s not the end of it, he cautions. “They shouldn’t be reactionary,” he says. When processes or plans change within an organization – at any level, in any department – risk must be reassessed and addressed. The only way to achieve this, of course, is through communication (one of the pillars of ESRM that we talked about earlier).

Risks may be small or large scale, and the question to address is, how risky is this, and if not addressed or not communicated properly when something changes, how will it impact the overall business or enterprise? “It takes time to do this and it can’t just be one person,” Rooke says.

If organizations can successfully introduce a collective culture of risk management, then there’s no need for a lone wolf. “Everybody then has skin the game and everyone also has a concept of their territories,” Rooke says.

KEYWORDS: business corporate culture professional security tools

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

Coding

Epstein File Data Security Update: Raw Code Found in Emails

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing