Page 59 - Institute Quaterly 5 Final
P. 59
What are the key factors that make convergence effective? This is only a preliminary list of key factors. Right now I am
working with a panel of security professionals from converged
So what facilitates effective convergence? I have looked at two organisations to progress these further. The panel has been
sources of information to start to answer this question: the tasked with reviewing the list, suggesting edits, and additional
analysis of a series of interviews that I conducted, and the key factors for inclusion. They will also be rating each key factor
existing literature in the area. on how important it is for the effective implementation of
convergence. This is an iterative process and the panel will be
Last year, I interviewed senior security professionals in engaged over a number of rounds where they will get to see
converged organisations. I used my analysis of the interview each other’s ratings and comments. The aim is to see whether
transcripts to develop an initial list of key factors that facilitate they can reach a consensus on how important each factor is for
effective convergence. I then reviewed both the industry and the effective adoption of a converged approach. By early next
academic literature to identify any additional key factors. I year it is hoped that the panel will have produced a final list
thought it was important to include industry publications. of the key factors that need to be considered when converging
This is where the majority of literature on convergence can be security resources. This will enable me to run an interactive
found, and although there is often no empirical foundation to workshop next year to identify ways in which organisations can
such articles, the role of experiential information mustn’t be encourage and implement each of these key factors.
discounted in this area.
The concept of convergence has certainly sustained over
These two lists of potential key factors, from the interview the years, and would seem to be becoming ever more
transcripts and the literature, were then synthesised into a important. There is plenty of other research ongoing in this
single, preliminary list. This list indicates the range of areas area at undergrad and Masters level by security professionals
that need to be considered when implementing a converged themselves, for example Louisa Schneller a Security Institute
approach, over and above the organisational structure imposed member who frequently shares details of her research in this
to bring together the different security resources. For example: area. This demonstrates the continued interest in convergence
and each piece of published or shared research helps build the
Staff need opportunities for engagement with others across the evidence base, and provides organisations with guidance on
security domain, whether through regular meetings or more how to adopt the approach. -
informal opportunities to collaborate. Such engagements,
however, will only result in collaboration if it is encouraged and If you would like to know more about my research, or if you
facilitated by the culture of the security function. The success have any questions or comments, please contact me at emma.
of such engagements rests on non-technical aspects, such as [email protected].
the communication skills of the security practitioners, and their
attitude to learning about areas outside of their own remit and
taking onboard different perspectives.
One fundamental component that seems to glue together the
organisation’s convergence approach is the role of a key person
who has the vision for and leads the convergence effort. They
have the enthusiasm and determination to initiate the process,
the ability to sell the process across the organisation, and they
facilitate the collaboration necessary for convergence to work.
This vision drives a more holistic view of security across the
board which is reflected in communications, documentation
and also training.