Security Leadership and Management

Proud to be Security

December 1, 2011
/ Print / Reprints /
ShareMore
/ Text Size+
Jeff Karpovich

Jeff Karpovich, CPP, CHPA, is proud to be Chief/Director, Security and Transportation for High Point University (HPU) in High Point, NC. Not only is he affiliated with an outstanding university: it was named number three among Regional Colleges in the South in “America’s Best Colleges” 2011 edition, published by U.S. News & World Report, and has been ranked as one of the top 610 colleges and universities across the country in the list, “America’s Best Colleges,” created by Forbes.com. In addition, Parade Magazinehas listed High Point University as one of the top 25 large private schools in the nation in the magazine’s annual “College A-List.” But Karpovich truly enjoys his role. Securitymagazine is also thrilled to have Karpovich as a member of our editorial advisory board.

 

How and why did you get into the security industry?

I became interested in public safety as a teen. I shared a bedroom with my older brother who became a police officer at 19, and I admired the pride he took in his profession/appearance.

 

What do you like about your position?

The diversity. Since I am responsible for so many facets (security, transportation, executive protection, emergency management, safety and parking), no two days are alike. Couple these responsibilities with the dynamic, meteoric campus growth, I am challenged each day. But it’s rewarding, because I am able to draw upon more than 30 years experience to not only tackle issues, but to share my knowledge with my staff.

 

What are the elements of your leadership style that you help make you successful?

My ability to multitask is definitely a plus. I can switch gears on a dime; a must at HPU. Also, I enjoy teaching verses telling, and most folks prefer that.

 

Who in your organization do you respect and take time to interact with and why?

The top two, not surprisingly, are my boss, VP & Chief of Staff, Chris Dudley, and his boss, the President, Dr. Qubein. Both are very intelligent with an acute attention to detail. They are great motivators because, in part, they have a powerful work ethic, plus they are visionaries.

 

What’s a typical day like for you? How do you start and end your day?

A typical day hopefully begins with a well-organized schedule, though rarely the case. My day starts around 6:15am with a check of my Droid for the night’s incidents and emails. I triage those, and then I get moving. My office is no longer on main campus, so I try to keep enough room on my calendar to get to main campus, to see and be seen, and to ride our mass-transit buses. Once I accomplish most of what needs to be done that day, I head home, generally around 6:00-6:30 pm. After my girls are in bed, I get on the home PC and remote into my office PC. I work another 30-60 minutes, then try to read or watch a little TV. Then just before sleep, I check the Droid again, handle those emails, then try to go to sleep while pondering the day’s events along with tomorrow’s expectations.

 

What do you like to do in your spare time?   

I have several investment properties, so that takes up some of my “spare” time. And, we have two young girls, so I try to devote most of my spare time to them.  

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Diane Ritchey

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+