Trends Column

The Security 500: Leveraging People-Processes-Technology

Welcome to the fifth annual Security 500 Survey, Benchmark and Trends report, recognizing both our profession’s best security leaders and their outstanding organizations as well as identifying the biggest challenges and targets for where billions of dollars will be invested to manage enterprise risk and improve security.

Congratulations to the 500 biggest security organizations and best business-minded leaders and their entire teams for achieving recognition and position on the 2010 Security 500.

I was fortunate to interview and profile leaders across seven critical sectors who generously shared their time and expertise. The profiles offer an in depth look at how today’s best leaders contribute to their overall organization’s culture, goals and successes. My personal thanks to:

• Mark Cheviron, Vice President, Security and Corporate Services, Archer Daniels Midland Company (Agriculture/Farming/Food Manufacturing)
• Jim Hutton, Director of Global Security, Proctor & Gamble (Industrial/Manufacturing)
• Jack Sullivan, Director of Security, Dunkin’ Brands (Retail/Restaurants)
• Jeff Ward, Chief of Police, San Antonio Unified School District (Education: K-12)
• Richard Gunthner, Vice President of Global Corporate Security, MasterCard (Finance/Banking/Insurance)
• Maria Chadwick, Director of Surveillance,
The Las Vegas Wynn (Hospitality/Casinos)
• Steve Colo, Chief Security Officer, SAIC
• Mike Ennis, Vice President International Security and Senior Risk Manager, SAIC (Business Services)

What did we learn from this year’s profile subjects? First of all, they are proven as both accomplished security executives and exceptional business leaders. But the key to their personal success is that they are outstanding people whose leadership and people skills are to be admired and (if possible) copied. It was an honor and a pleasure to be told their stories and entrusted to share them in the 2010 Security 500 report.

Their tremendous career success, beyond their enviable smarts and personable manners, can be attributed to their leveraging People-Processes-Technology combined with being the Subject Matter Expert at the junction of enterprise risk management and their organization’s unique culture, goals and circumstances. This is a recurring success factor among the best CSOs in the 2010 report and especially among those profiled.

An important improvement in this year’s Benchmarking Survey is the coaching we received from business leaders to refine the data collected and the benchmark reports provided to all participants. The survey consists of a general section of questions and then steers participants to unique questions for their specific sector. This will allow all participating organizations to use the benchmark report across all participating companies (for example, security budget as a percentage of total employees) and then measure within their unique sector (for example, security officers as a percentage of college students).

We also work toward confidentiality. The unique and detailed information collected and benchmark report data is not published and is only shared with participating organizations. Each participating organization’s report shows other participating organizations data but not the organization’s name.

The 2010 Security 500 coaches greatly improved our process and the resultant reports we are able to share with all survey participants. We thank the following organizations for graciously offering their time, expertise and direction to the Security 500 Survey:

• Agriculture/Farming/Food Production: Richard Ryan, Archer Daniels Midland
• Business Services: Ted Almay, Deloitte
• Diversified: Jerry Meade, Loews
• Finance/Banking/Insurance: William Phillips, CNA Financial
• Education: College-University Robert Beach, Longwood University
• Hospital/Medical Center: Leonard Sullivan, Medical City Dallas
• Hospitality/Casinos: Chad Callahan, Marriott
• Hospitality/Casinos: Maria Chadwick, The Wynn Las Vegas
• Industrial/Manufacturing: Chad Wehrman, Proctor & Gamble
• Media/IT/Communications: John Honovic, Viacom
• Retail/Restaurants: Paul Stone, BestBuy
• Stadiums/Arenas: Dr. Lou Marciani, NCS4
• Transportation/Supply Chain: Dennis Treece, Massport
• Utilities & Energy: Timothy Rigg, Progress Energy
• Overall Guidance: George Campbell, Security Executive Council

Some sectors were not “coached” and are up for adoption for the 2011 Survey. The better refined the questions asked, the more valuable the benchmark reports provided to participating organizations. Please let me know if you are interested in further developing the Security 500 Benchmark Survey for your specific sector. 

While many people coached, researched, edited and helped make this year’s Security 500 the best it can be, all questions and errors should come my way. Or, to request the complete report contact me at mccourtm@bnpmedia.com.

Please note the Security 500 Conference on November 9 in New York City (FREE to all Security 500 Member companies) and the Security 500 Webinar *Live* on December 1. You can register for both at www.securitymagazine.com.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Mark McCourt

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security magazine March 2015 issue cover

2015 March

In this March 2015 issue of Security check out our product preview of ISC West 2015. Also, learn how to make the best use of your security technology by working with your security integrator, get info on penetration testing, and discover how white glove security can enhance bottom line real estate value.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive

THE SECURITY STORE

Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.