It's a straight line in the evolution of security into a cooperative, business-enabling function I’m big on cooperation. I’ve been part of organizations large and small, from companies to churches to chess clubs, and have observed lots of different leadership styles. The style that resonates with me, and the one that seems to get the most out of the most people, is one that fosters collaboration and mutual support. People pitching in across multiple disciplines can help each other solve problems faster and more creatively. Crush your competition, but collaborate with your co-workers. One plus one equals three.So there’s my bias, right up front.With that noted, here’s the view from my chair:Convergence was a step on the road to enterprise risk management (ERM). ERM is a step on the road to true business enablement. There was a period around 2004-2005 when I firmly held the belief that the information security and corporate and physical security departments should report to one CSO, categorically and without exception. The idea of cooperation made too much sense for this to be a fad.Well, cooperation yes; cohabitation, not necessarily. I’ve long since dropped the dogmatic, org-chart-based view; if you look at our Basics of Physical and IT Convergence article, you’ll see that by 2006 we had already shifted our use of “convergence” to explicitly mean “formal cooperation between previously disjointed security functions.” More on Enterprise Risk Management and security convergenceERM: Get started in 6 stepsTurning ERM strategy into specific systems projectsThe CISO’s new focus: IT riskTo security convergence (and back): Dismantling a departmentNo dictates about how that’s accomplished, just the insistence that bridges must be built to serve the business. One plus one equals three.Over the next several years, ERM gained more currency in security discussions, or perhaps vice versa. ERM demands even broader communication and connection across functions, including HR, finance, continuity, and marketing.It’s not fundamentally different from convergence. It’s convergence-plus. The trajectory that led from convergence to ERM is crystal clear.And ERM has the huge advantage of being a term accepted by mahogany row. (Whereas “security convergence” means absolutely nothing to anyone outside of security.) The economy’s meta-infrastructure—Boards of Directors, the Securities and Exchange Commission, things like that—may define risk management differently, but they increasingly accept its necessity.Security has to seize on this opportunity. Squabbling about who reports to whom or who makes more or who’s a geek or who’s an ex-cop (this argument is old and tired) is pure drag on the momentum within your own organization and across the entire profession. It’s wonderful and productive to see the Information Systems Security Association and (ISC)2 collaborating with ASIS. It’s most excellent to see security professionals expanding their knowledge and their LinkedIn connections totals. Great to see service providers on both sides of the coin taking a more complete view of their customers’ challenges.Let’s engage with our colleagues in ERM and see how it ultimately connects us to business enablement, the mature phase of security leadership’s evolution. Related content news Okta launches Cybersecurity Workforce Development Initiative New philanthropic and educational grants aim to advance inclusive pathways into cybersecurity and technology careers. By Michael Hill Oct 04, 2023 3 mins IT Skills Careers Security news New critical AI vulnerabilities in TorchServe put thousands of AI models at risk The vulnerabilities can completely compromise the AI infrastructure of the world’s biggest businesses, Oligo Security said. By Shweta Sharma Oct 04, 2023 4 mins Vulnerabilities news ChatGPT “not a reliable” tool for detecting vulnerabilities in developed code NCC Group report claims machine learning models show strong promise in detecting novel zero-day attacks. By Michael Hill Oct 04, 2023 3 mins DevSecOps Generative AI Vulnerabilities news Google Chrome zero-day jumps onto CISA's known vulnerability list A serious security flaw in Google Chrome, which was discovered under active exploitation in the wild, is a new addition to the Cybersecurity and Infrastructure Agency’s Known Exploited vulnerabilities catalog. By Jon Gold Oct 03, 2023 3 mins Zero-day vulnerability Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe