Yes, ladies and gentlemen, according to the Institute of Internal Auditors(IIA), “there is no such thing as ‘IT Risk'”. There are those, however, who define the risk landscape solely from a technical perspective. After closing a semester of teaching web application security, I wanted to share my observations and concerns regarding the understanding of “risk” among the next generation of security professionals.Most of the 11 students in the class had technical backgrounds. The balance received prior technical training on Cisco and Microsoft. Their focus on technical security controls became evident within the first two weeks. Given the nature of the material, I created a business scenario to frame my discussion of secure software development. The class reaction was revealing.While the students appreciated a perspective of how the technical controls were used in a business environment, discussion of risk issues consistently focused on those controls. For most of the students, the business was of little import. As the class progressed, I was able to persuade all but two of the students of the critical role the business driver play. These student held to their conviction that a secure infrastructure is all that is required and that the business should give technical personnel more authority in driving policy concerns.As an auditor, I evaluate technical controls that are associated with a business risk. To do the opposite invites chaos and poor audit results. However, my experience as an instructor gives me cause to consider that some security professional will enter the market with a control-centric definition of risk. I pose a question to my readers — in what ways have you encountered this perspective in your roles? What have been the implications of this view? What has been done to address it? Related content opinion Positioning the Security Team Through Influence Part 1 Influence styles are a reflection of the influencers and, by extension, their team. Thus, they must understand the situations to which different styles are applicable. This series explores the common influence styles and their application. By Steven Fox Apr 21, 2012 3 mins Technology Industry IT Jobs opinion From Obstacle to Ally - Repositioning the Security Team Pt 1 By Steven Fox Apr 08, 2012 3 mins Technology Industry IT Strategy opinion Key Sessions at CISO Executive Summit 2011 By Steven Fox Dec 03, 2011 3 mins Business Continuity Data and Information Security Careers opinion Securing User Credentials On Mobile Devices By Steven Fox Nov 15, 2011 4 mins Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe