Security Leadership and Management

Eleven Areas for Improvement

In our July column, we discussed the dangerous gap in the transfer of knowledge between visionary security leaders and the next generation of leaders who will have to take up the mantle after them. Then in August, we laid out a roadmap for a new type of training that would help to close that gap. But what topics do up-and-coming leaders need to know more about?

For six years, the Security Executive Council has worked with top-tier security leaders to develop research, track industry trends and solve problems. In the course of this work, these Tier 1 Security Leaders have shared with us their thoughts on the skills that are lacking in the deputies and other potential leaders they are grooming. Most often they are concerned with the lack of strategic thinking and planning skills in these individuals. This shouldn’t be surprising; many deputies have to work 10 hours every day on critical operational issues and have little time to devote to strategy.

We’ve identified 11 key strategic areas in which Tier 1 Security Leaders would like to see their direct reports take on.

     • Aligning Board-Level Risk and Business Unit Mitigation Strategy.The next generation of leadership will need to know how to line up their programs with the risk categories most important to the Board. 

   • Communicating Hazards and Risks, Mitigation and Performance Metrics.Management and board members make critical decisions based on a host of spreadsheets, graphs and trend lines. Effective, actionable risk management requires disciplined analysis. Security leaders who want to show their business-based contribution to the organization must know how to a) understand the data they’re collecting to identify risks, and b) use that data to tell a compelling story of performance and value to the organization.

   • Influencing Community Preparedness and Resilience for Emerging Global Risks.Catastrophic manmade and natural risks will continue to threaten organizations and communities, making crisis and continuity management ever important. Security leaders need to be versed on the latest global requirements for preparedness compliance, and they must take steps to create community alliances to help build resilience and protect brand.

   • Managing Information Protection, Breaches and Situational Intelligence. Brand stakeholders require confidence. Information ranging from intellectual property assets to personal identifiers must be protected from persistent physical and cyber threats. The next generation of security leaders needs to know how to roadmap protection architecture and how to manage information crises at the speed of the Internet.

   • Adding Business Value with Mission Assurance and Profit & Loss Performance.The successful security leader of tomorrow must understand both how to add value and how to show it. Security leaders need to demonstrate security’s revenue influence and cost avoidance in return-on-investment calculations and operating statement results. 

   • Researching Next Generation Organizations, Programs and Leadership Style.Security leaders who understand their organization, its employees and their own leadership development are in a strong position to accurately benchmark and gauge program success. They must learn the steps to evaluate themselves and their organizations against industry research to inform their role and corporate readiness.

   • Governing Compliance and Social Responsibility for Brand Equity.The connection between ethical performance – including compliance and community care – and market performance is increasingly relevant. How can security leaders play a role in stronger ethical performance?

   • Conducting Assignment, Contract, Hire, Incident and Transaction Diligence.With estimated global fraud exceeding $2.6 trillion (ACFE) and identity theft at epidemic levels, organizations need multi-factor authentication of persons, cargo, conveyances and information. Errors, omissions and fraud are increasingly discoverable with well integrated and layered security solutions that will likely be required by evolving compliance.

   • Transferring Risk Mitigation Competence.Risk mitigation has become increasingly cross-functional; it’s important for security leaders to know how to identify, develop and retain talent all levels for sustainable results. Ongoing risk assessments must be included in project and program management along with continuous education and training.

   • Building Strategic Brand Alliances and Community.Public and private community partnerships with clients, governmental agencies, peer organizations and trade associations can augment the in-house resources. Security leaders need to know how to build these partnerships and to sustain them for the greatest benefit to all.

   • Applying Proven Practices and Solution Innovations. Innovative solutions can lend confidence to common risk situation management? Solution evaluation should include pilots that allow for the measurement of cost savings, loss avoidance and opportunity improvements. Proven solutions should optimize core organizational processes and outcomes.

Do you agree that these 11 topics are the areas the next generation needs a firm grasp on? Do you think other issues are more important than these? Contact us at to tell us about it.   

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Bob Hayes

You must login or register in order to post a comment.



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security June 2015 issue cover

2015 June

In this June 2015 issue of SecurityIs the security director business’s new “corporate rock star?” Find out how CSOs can become the new leaders of their enterprises through mentorships, partnerships and creatively adding business value. Also, learn how security professionals are training employees in cyber security through games. And why are deterrence and detection so important when it comes to thwarting metal thieves? Find out in this issue.

Table Of Contents Subscribe

Body Cameras on Security Officers

Body cameras are being used increasingly by police in cities across the U.S. Will you arm your security officers with a body camera?
View Results Poll Archive


Effective Security Management, 5th Edition.jpg
Effective Security Management, 5th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.