Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementMost Influential People in SecuritySecurity Leadership and Management

Special Report

Jacqueline Lopour | Most Influential People in Security

Director of Trust & Safety Intel | Google

By Jordyn Alger, Managing Editor
Jacqueline Lopour

Rawpixel / iStock / Getty Images Plus / via Getty Images
Bio image courtesy of Lopour

September 5, 2024

The power of being a newcomer

After graduating with her Bachelor of Arts Double Major in English Literature and History, the last place Jacqueline Lopour expected to take her career was into the field of security.

“I went to UCLA to study English Literature in History in college, and my goal was to become a professor of English literature. I wanted to focus on Oscar Wilde in Victorian literature.” Humorously, Lopour adds, “I've definitely not done that.”

Although her journey into the field of security was unexpected, it was far from unfitting. Lopour reflects on the start of her career in security, recalling the fortuitous moment it all began.

“I would say that security found me,” she says. “I was at a career fair at UCLA, and the CIA recruiter heard my elevator pitch at another booth, and he motioned for me to come over.”

That pivotal moment began Lopour’s journey into security, landing her a role as a Multi-Disciplinary Security Analyst with the CIA. In the beginning of her career path, Lopour felt as though her educational background wouldn’t support her professional roles. However, she soon learned that was not the case.

“It felt like my background in English Literature wouldn’t be useful,” Lopour explains. “It actually ended up being quite useful.”

Lopour’s educational background taught her how to investigate characters and their motivations. It also trained her to seek historical, cultural and social contexts for every situation she examined. These skills transferred into the world of security and have served her well.

“Security is fundamentally about bad actors or adversaries,” Lopour says, “and what in their environment motivates them or provides them with the resources they need to attack whatever target they're looking at — or even how they choose their targets and how they operate.”

Lopour gained valuable experience in both the private and the public sector. She transitioned to a Political and Leadership Analyst at the CIA, then moved to the Centre for International Governance Innovation (CIGI) as a Senior Research Associate. She then moved to Google, where she rose through the ranks to Director of Trust and Safety Intel, where she remains today.


Use the power of being the new kid on the block. Use the power of being new to the field and say, ‘Why are we doing this?’


Summarizing her current role, Lopour remarks, “I kind of joke when I tell family or friends, my job is fundamentally trying to keep the internet a safer place for everybody.” She continues, stating, “As the Director of Trust & Safety Intel, I’m looking at emerging risks, whether it’s a new type of abuse or adversary activity, or whether it's some sort of geopolitical or external event.”

Lopour’s position requires foresight and proactive risk mitigation. By observing the evolution of tactics, techniques and procedures (TTPs), she can warn the company about potential threats that may rise.

Lopour describes her proactive mentality, expressing, “This threat is coming down the pipeline. Let's not wait for it to land, it'd be a problem for us. Let's take proactive mitigations to prevent it.”

Throughout Lopour’s extensive career in security, she has obtained many achievements. When asked to share her greatest accomplishment, she chose to elaborate on her systems design and operational scaling.

“As I've grown in my career, I’ve become increasingly interested in systems design and operational scaling. I used to say that my forte was spinning up pilot programs in response to crises, like getting a tiger team together and figuring out how to solve the crisis in the moment,” she recounts. “But it's even harder, I think, to convert those efforts into mature, predictable operations that run effectively, efficiently and don't require sustained heroic efforts by the team. So, when I look back on what I've accomplished, it's that transition. It's converting these scrappy tiger teams into well-oiled operations that continue to deliver to this day. That is deeply, deeply satisfying.”

She elaborates on the satisfying aspect of transitioning her crisis efforts into mature operations, stating, “It impacts people on their day to day lives. It gets people out of the heroism approach and into something where they can step back and think strategically, which I think is incredibly good for people's lives and their careers. It’s good for the company. It’s good for the world.”

Looking back on her remarkable career journey thus far, Lopour offers the following advice to budding security professionals.

“The power of being a newbie is incredible. Don’t worry about asking questions, because chances are if you’re asking a question because something is not clear, 15 other people have the same question,” she says. “Use the power of being the new kid on the block. Use the power of being new to the field and say, ‘Why are we doing this?’”

Lopour elaborates on the “power of being a newbie,” asserting that asking clarifying questions is a gift to the entire team. “When people ask these questions, the team will articulate their reasoning. They will refine the story, refine the approach and identify gaps.”

To Lopour, no academic background or career path can exclude a person from the security field. She declares, “A lot of people think that there's certain academic backgrounds or certain career paths you have to take to start a career in security. I have not found that to be the case in my career. And as long as folks stay open and are willing to take risks, I think they can have an incredibly rewarding career.”



The Most Influential People in Security 2024

KEYWORDS: Central Intelligence Agency (CIA) Google intelligence security leaders threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Edward M. Levy

    Edward M. Levy | Most Influential People in Security

    See More
  • Greg Wurm, CPP

    Greg Wurm, CPP | Most Influential People in Security

    See More
  • Security's Most Influential People in Security

    Security's Most Influential People in Security 2024

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing