Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Possessing the GAD Factor

August 1, 2009
Larry Midland has the GAD Factor – do you?


Security Magazine: Where do you see the security industry going in the next 5-10 years?
     
Midland: For years, and in some cases decades, I’ve been hearing that next year would be the year of this or that technology. Well, my bet is, we are now at a major inflection point with respect to security, and the next 2-3 years will bring major changes. For instance, smart cards, biometrics, digital certificates and IT convergence will come together and change the way we look at almost everything.
     
Longer term, say ten years from now, I don’t think you’ll even be able to recognize the industry as it exists today. Security will simply become part of the fabric of the business environment, not just something that was bolted on after the fact.
     
Physical and cyber security will be tightly coupled, enabling a more holistic and productive approach to security. A wider range of behaviors will be monitored, and anomalous activities will be flagged as users conduct company business; accessing not only areas of the building but also network resources. Data collected by physical security, network access control, personnel management, video surveillance and other systems will be aggregated; presenting a more complete view of people, activities and operations.
     
Almost everything will be encrypted. Organizations in many industries will routinely encrypt hard drives, e-mail traffic and use electronic signatures for documents. And all devices that communicate or store sensitive information will become far more secure through various trust-based authentication systems.
     
Smart cards will morph to smart chip-based devices, and they will be ubiquitous.


Security Magazine: What do you believe will be the next product category to significantly impact the physical security industry in the short term?
     
Midland: Smart cards. There’s really little question now: smart cards, contact or contactless, can dramatically increase security – individually or used in combination with biometrics. I believe this will lead to a paradigm shift in identity management that enables logical and physical access to finally live up to the hype of “convergence.”
     
Due to technology advancements, international smart card initiatives, and the U.S. government’s HSPD-12 program, smart cards now can play a critical and essential role in successfully securing both physical and digital assets.


Security Magazine: Many security executives have to tighten the budget and do more with less: Do you have any tips on defending ROI (return on investment) and/or the business case for security during tough economic times?
     
Midland:
The costs of a single facility or information systems breach – the remediation, litigation, penalties, intellectual property compromise, customer loss and reputational costs – can put a company completely out of business. So, positive ROI for a security system is actually quite an easy case to make. Besides the “big ticket” cost avoidance savings, like securing intellectual property, there are numerous other ways a security system can help save money. Automated data links between the security and human resources systems eliminates costly errors and reduces data entry. Automating certain security functions might reduce costly personnel requirements as another example.
     
We’ve even had customers make money – actually generate revenue – using the security system. So the ROI case is there. You just have to be strong enough to deliver the message appropriately and the solutions that deliver on the promise.


Security Magazine: What are the blind spots in the industry?
     
Midland: We still think and act in silos. Everyone is afraid to give up any of their turf, so they often impede progress rather than enhance it. People are afraid of change, but change is inevitable. The biggest blind spot is looking only at the way we have done things in the past. We need to look outside of that to determine how we should do things in the future. We need to find the few leaders who can then guide the rest.


Security Magazine: What is one thing you learned that you apply to your career? Or, what is your catchphrase or mantra?
     
Midland: In dealing with people through-
out my career, and in trying to build a quality company, I have developed what I refer to as the GAD Factor™. Of course you always look for the brightest and most energetic people; you want those with a positive attitude rather than a negative one; and you want people with a high sense of integrity. But there is one other intrinsic value that is essential: Employees and partners alike must ‘Give a Damn’!
     
If you don’t deal with people with a passion; if you aren’t willing to do whatever it takes to make something right, then you are condemned to mediocrity. You can tell that I’m passionate about this. It’s because I’ve found that those who really care are the only ones you can trust to do the right things. It makes life easier for me if I surround myself with people that have the GAD Factor and then give them the authority to do what is right.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Hotel hallway

New Malware Campaign Targeting Hospitality Sector

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • E-gad! E-mail Security Gets More Complex

    See More
  • password

    What is Two-Factor Authentication? The Tip of the Security Spear

    See More
  • The Corner Office - july 2018

    Cyber Incidents: The Human Factor

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • The Complete Guide to Physical Security

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing