Security

Control Security Correctly

Decisions instead of tools and measures

Why Security Is a Management Task
26.03.2026
Utilities
Healthcare & Life Science
Security
Sovereign IT

Cyber security today determines whether companies remain capable of acting in the event of a crisis. Nevertheless, security is often seen as a technical project. This article shows why real security arises only when risks are consciously assessed and responsibility is taken for them.

Cyber Security Is No Longer a Marginal Issue

It determines whether companies remain capable of acting in a crisis or spend months on damage limitation, legal issues, and loss of reputation. Despite this, security is still treated as a technical implementation problem in many organizations. Tools are introduced, guidelines adopted, and audits passed. On paper, you are "well-positioned." The reality is often different.

 

Security incidents rarely occur because there is a lack of technology. They occur because risks are not actively managed: Responsibilities are unclear, decisions are implicit, and deviations have no consequences.

  • The crucial question is therefore not: Which security solutions do we use?
  • But rather: How do we make decisions about risk - and who is responsible for them?

Those who reduce security to tools delegate risk. Those who understand security as a decision-making architecture retain control.

Compliance Without Control Is Self-Soothing

Compliance with standards creates order - but not necessarily security. Standards define minimum requirements, but do not answer the central question of who actively manages risks. Studies show that formal compliance and actual safety effectiveness do not correlate well unless compliance is translated into active risk management.

 

This is particularly evident in third-party relationships and supply chains. A significant proportion of security incidents are caused by external service providers, even if they are formally audited and certified. Audits check whether something exists - not whether it works.

 

With NIS2, the legislator is explicitly shifting responsibility to the management and the Board of Directors. The decisive factor is not policies, but comprehensible decisions on risks, measures, and priorities.

Risk Ownership: Security Starts with Decisions

Risks do not arise from a lack of measures, but from a lack of decisions. In many organizations, risks are known and documented - but no one explicitly decides how to deal with them. Living risk ownership means:

  • Business risks lie with the company management
  • Product and process risks for functional owners
  • Technical risks in IT and security - within clear guidelines

Without this classification, security remains diffuse.

Decision Logic Instead of a Catalog of Measures

Mature security organizations follow a clear logic:

  1. Risks are explicitly described
  2. Options for action made transparent
  3. Decisions made consciously
  4. Implementation and impact reviewed

Not every decision must mean maximum safety - but every decision must be conscious.

Why Tools Cannot Replace a Decision Architecture

Security tools do not solve security problems. They automate decisions that were previously made - or make it visible that they were never made. More tools often lead to more complexity, fragmented visibility, and less control. The decisive factor is not the tool itself, but how it is embedded in governance and decision-making processes.

 

Tools can make risks visible. However, they cannot assume any responsibility.

What Managers Need to Do Specifically

Security becomes controllable where leadership takes responsibility:

  • Establishing security as a governance topic
  • Request reports relevant to decision-making
  • Enforcing clear risk ownership
  • Making decisions verifiable

Control does not mean constant monitoring; it means conscious prioritization.

Conclusion

Security is not an IT project. It is an organization’s ability to remain capable of acting in the face of uncertainty. Compliance creates order, and tools provide visibility—but security only becomes effective through conscious decisions. We help organizations structure security as a matter of governance and decision-making—not as a project focused on tools or measures. Organizations that actively manage risks do more than react to incidents. They remain capable of acting.

Further Information on Cyber Security

Security Services

Cyber security services for businesses: Comprehensive protection with Arvato Systems – from advisory services to zero trust, we are your strong partner.

Security Operations Center

With our Security Operations Center, we offer professional managed detection and response for maximum IT security.

Written by

Kai_Korla
Kai Korla
Expert for governance, risk & compliance and security architecture

Kai Korla works at Arvato Systems at the interface between cyber security, governance and architecture. He is particularly concerned with the question of how security risks can not only be documented, but also actively managed through clear ownership and conscious decisions.