Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementMost Influential People in SecuritySecurity Leadership and Management

Special Report

Jacqueline Lopour | Most Influential People in Security

Director of Trust & Safety Intel | Google

By Jordyn Alger, Managing Editor
Jacqueline Lopour

Rawpixel / iStock / Getty Images Plus / via Getty Images
Bio image courtesy of Lopour

September 5, 2024

The power of being a newcomer

After graduating with her Bachelor of Arts Double Major in English Literature and History, the last place Jacqueline Lopour expected to take her career was into the field of security.

“I went to UCLA to study English Literature in History in college, and my goal was to become a professor of English literature. I wanted to focus on Oscar Wilde in Victorian literature.” Humorously, Lopour adds, “I've definitely not done that.”

Although her journey into the field of security was unexpected, it was far from unfitting. Lopour reflects on the start of her career in security, recalling the fortuitous moment it all began.

“I would say that security found me,” she says. “I was at a career fair at UCLA, and the CIA recruiter heard my elevator pitch at another booth, and he motioned for me to come over.”

That pivotal moment began Lopour’s journey into security, landing her a role as a Multi-Disciplinary Security Analyst with the CIA. In the beginning of her career path, Lopour felt as though her educational background wouldn’t support her professional roles. However, she soon learned that was not the case.

“It felt like my background in English Literature wouldn’t be useful,” Lopour explains. “It actually ended up being quite useful.”

Lopour’s educational background taught her how to investigate characters and their motivations. It also trained her to seek historical, cultural and social contexts for every situation she examined. These skills transferred into the world of security and have served her well.

“Security is fundamentally about bad actors or adversaries,” Lopour says, “and what in their environment motivates them or provides them with the resources they need to attack whatever target they're looking at — or even how they choose their targets and how they operate.”

Lopour gained valuable experience in both the private and the public sector. She transitioned to a Political and Leadership Analyst at the CIA, then moved to the Centre for International Governance Innovation (CIGI) as a Senior Research Associate. She then moved to Google, where she rose through the ranks to Director of Trust and Safety Intel, where she remains today.


Use the power of being the new kid on the block. Use the power of being new to the field and say, ‘Why are we doing this?’


Summarizing her current role, Lopour remarks, “I kind of joke when I tell family or friends, my job is fundamentally trying to keep the internet a safer place for everybody.” She continues, stating, “As the Director of Trust & Safety Intel, I’m looking at emerging risks, whether it’s a new type of abuse or adversary activity, or whether it's some sort of geopolitical or external event.”

Lopour’s position requires foresight and proactive risk mitigation. By observing the evolution of tactics, techniques and procedures (TTPs), she can warn the company about potential threats that may rise.

Lopour describes her proactive mentality, expressing, “This threat is coming down the pipeline. Let's not wait for it to land, it'd be a problem for us. Let's take proactive mitigations to prevent it.”

Throughout Lopour’s extensive career in security, she has obtained many achievements. When asked to share her greatest accomplishment, she chose to elaborate on her systems design and operational scaling.

“As I've grown in my career, I’ve become increasingly interested in systems design and operational scaling. I used to say that my forte was spinning up pilot programs in response to crises, like getting a tiger team together and figuring out how to solve the crisis in the moment,” she recounts. “But it's even harder, I think, to convert those efforts into mature, predictable operations that run effectively, efficiently and don't require sustained heroic efforts by the team. So, when I look back on what I've accomplished, it's that transition. It's converting these scrappy tiger teams into well-oiled operations that continue to deliver to this day. That is deeply, deeply satisfying.”

She elaborates on the satisfying aspect of transitioning her crisis efforts into mature operations, stating, “It impacts people on their day to day lives. It gets people out of the heroism approach and into something where they can step back and think strategically, which I think is incredibly good for people's lives and their careers. It’s good for the company. It’s good for the world.”

Looking back on her remarkable career journey thus far, Lopour offers the following advice to budding security professionals.

“The power of being a newbie is incredible. Don’t worry about asking questions, because chances are if you’re asking a question because something is not clear, 15 other people have the same question,” she says. “Use the power of being the new kid on the block. Use the power of being new to the field and say, ‘Why are we doing this?’”

Lopour elaborates on the “power of being a newbie,” asserting that asking clarifying questions is a gift to the entire team. “When people ask these questions, the team will articulate their reasoning. They will refine the story, refine the approach and identify gaps.”

To Lopour, no academic background or career path can exclude a person from the security field. She declares, “A lot of people think that there's certain academic backgrounds or certain career paths you have to take to start a career in security. I have not found that to be the case in my career. And as long as folks stay open and are willing to take risks, I think they can have an incredibly rewarding career.”



The Most Influential People in Security 2024

KEYWORDS: Central Intelligence Agency (CIA) Google intelligence security leaders threat landscape

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Edward M. Levy

    Edward M. Levy | Most Influential People in Security

    See More
  • Greg Wurm, CPP

    Greg Wurm, CPP | Most Influential People in Security

    See More
  • Anthony Canale

    Anthony Canale — Embedding Service and Responsibility into Security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing