Feature

Security 7 Award winners tackle important information security issues

Ezine

This article can also be found in the Premium Editorial Download "Information Security magazine: Security 7 Award winners sound off on key information security issues."

Download it now to read this article plus other related content.

 

convergence and information sharing
Convergence Model by Marc S. Sokol
 

Integrating operational risk and sharing vital information serve the greater good.
 

 

 

Marc S. Sokol
  • TITLE Vice president, chief security officer and head of operational risk
  • COMPANY The Guardian Life Insurance Company of America
  • INDUSTRY Financial services
  • KUDOS
    • Successfully converged operational and security risk management services.
    • Provides a single risk management resource for business and support units.
    • Chairs Guardian's operational

    Requires Free Membership to View

    • risk management subcommittee.
    • Program reports to Guardian's risk management committee and audit committee of the board.
    • Developed and instituted a building permit process, in conjunction with the corporate project management office, that evaluates risk in IT and business projects.
    • Active member of the Financial Services Information Sharing and Analysis Center.

 


A prominent executive, inspirational leader and mentor I know tells me time and time again that successful business, like life, means taking calculated risks, overcoming challenges and obstacles, and maximizing new opportunities. In many cases, this means embracing new ideas and charting new territories.

Security organizations need to enable, not inhibit, these opportunities, fortify the road they take and ultimately build confidence in the country's critical financial services infrastructure. Just as we insure our families to protect their future, we must also insure the financial services infrastructure in order to be strong and resilient in the face of growing threats for generations to come.

We can realize this vision in two steps: integration with operational risk and information sharing.

Through these two steps, we position our organizations to maximize performance and productivity, take calculated risks that are in the best interest of shareholders and customers, and more efficiently adapt and respond to our changing environment and the threat landscape.

 

 

This was first published in October 2008

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: