Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementSecurity & Business ResilienceSecurity Education & Training

Special Report

Building Bridges: Overcoming Silos to Bring Organizations to the Next Level

Silos limit not just the security team, but the entire organization.

By Jordyn Alger, Managing Editor
Overcoming Silos
Stocknroll / DMP / gzorgz Antonio_Diaz / mathisworks / via Getty Images
October 2, 2025

The issue of silos is one brought up often in the security world, and for good reason — the presence of silos can limit not just the effectiveness of the security team, but of the organization as a whole. Let’s take a deeper look at the impact of silos, their historical entrenchment, how to bridge them and the resulting benefits that will accrue to your organization and its external partners.

Chief Security Officer and Executive Vice President of HSSE and Enterprise Quality at Jacobs, Joe Olivarez, warns that when silos are present, organizations “miss opportunities to scale resources and drive true operational efficiencies.” Furthermore, those that operate in silos lack the full picture of the risks they face.

“Risk does not move up and down,” Olivarez states. “It moves across your organization.”

Poor visibility can leave an organization vulnerable. Tara Dunning, Vice President of Global Security at Wesco, elaborates on these risks, saying, “As security disciplines converge, silos create dangerous blind spots that leave organizations vulnerable. When rapidly evolving physical and cyber systems are managed separately, or don’t share a common decision framework, gaps emerge that hackers can exploit.”

These gaps aren’t just problems for security teams — they can have impacts that resonate through the entire company.

“These silos lead to three major risks,” Dunning explains. “First, disconnected decision-making slows responses during crises, as teams scramble without a unified plan. Second, scattered data across systems obscures critical insights, making it hard to spot threats or optimize operations like building management. Finally, inconsistent policies heighten compliance risks, especially with regulations around privacy and ethical AI. For instance, a company neglecting to align its physical and cyber protocols might fail an audit, facing hefty fines. In today’s hyper-connected world, siloed systems aren’t just inefficient — they’re a recipe for disaster.”

At GSX this year, Bruce McIndoe shared his insights on the subject in an educational session titled “From Silos to Synergy: A Team-of-Teams Approach to Joint Operations Tailored to Your Organization.”

Tara Sunning
Tara Dunning, Vice President of Global Security at Wesco. Image courtesy of Dunning


Bruce McIndoe
Bruce McIndoe, President of McIndoe Risk Advisory LLC. Image courtesy of McIndoe


Joe Olivarez
Joe Olivarez, Chief Security Officer and Executive Vice President of HSSE and Enterprise Quality at Jacobs. Image courtesy of Olivarez

As the Founder of iJET/WorldAware (now Crisis24) and President of McIndoe Risk Advisory LLC, McIndoe has experienced how silos can negatively impact an organization. Particularly, when parts of an organization are sectioned off from each other, they lose the ability to approach issues with the proper perspectives, information and tools to solve them.

McIndoe jokes, “If you’re a carpenter and all you have is a hammer, then every solution uses a hammer — or every problem looks like a nail, even if it’s a screw.”

Without multiple departments or disciplines working together, problem-solving within the organization can be ineffective at its best, and nearly impossible at its worst. This is especially the case when confronted with the increasingly complex and interconnected threats we see today.

“That's the problem when you don't have multi-disciplinary expertise looking at an issue, because there may be different ways of approaching and solving it,” McIndoe states. “The other problem that we have, I call ‘the fragmented data problem.’ This is where the supply chain might have its data in one section, the physical security people will have theirs in another, the cyber team has theirs somewhere else, and so on. Without a single data hub, you miss those interconnections.”

Why Are Siloed Disciplines So Common?

McIndoe laments, “People always ask me, ‘How did we end up here?’”

Part of the reason is due to the differences in discipline development, Dunning explains.

“Historically, disciplines like physical security, cybersecurity, and crisis management evolved separately, each shaped by distinct technologies and expertise. In the pre-digital era, physical security relied on guards and locks, while cybersecurity was a niche IT function,” Dunning says. “The evolution of physical security from low voltage alarm systems on analogue lines to IP based solutions on rapidly expanding SMART edge networks, necessitates the bridging of silos. The explosion of connected devices and the use of IP cameras as ultimate sensors has blurred the lines between operational and information technology, making these disciplines interdependent. Proactively developing integrative processes and ongoing decision making with these vital disciplines is critical to staying secure in a hyper-connected world.”

Ultimately, it seems the answer is simple: this is just the way it’s always been done.

Olivarez notes that it's not just security teams that operate in silos — entire organizations often have siloed structures, and security teams simply adapt to that environment. He explains, “Security teams frequently fall into the pattern of doing things the way they've always been done. But as a leader, you have the opportunity to break down those silos by driving outcomes, rather than passively accepting the status quo.”

How Can We Bridge the Silos?

When it comes to bridging these silos, the first step is to reach out a hand across the gap.

“Focus on relationship building from all angles,” Olivarez recommends. “A focus on relationship building does not mean you do all the talking — listen.”

Olivarez encourages security leaders to be intentional about their silo-bridging goal, approaching conversations with a partnership in mind.

“Come from the perspective that it’s not about territory or remit,” he says. “It’s about delivery excellence, enhanced risk understanding, talent development, and the ability to support the business in an expedited and informed manner.”

McIndoe shares his perspective on bridging silos, highlighting what essential foundations must be laid.

That's the problem when you don't have multi-disciplinary expertise looking at an issue, because there may be different ways of approaching it and solving it.”

“If you don’t have senior executive buy-in to pull this together, you’re not going to get the whole organization working together,” he points out. “So that’s a mandatory requirement.”

By proving the value of bridged silos to executives, security leaders can take the first fundamental step in building that bridge. Once that’s accomplished, it’s time to bring the whole organization together under one combined mission.

“You’ve got to establish a shared mission and a vision of what you're trying to do with the program, so that all the disciplines that are involved are aligned,” McIndoe states. “This approach can be used at the organizational level and systematically down to the team level. But at the organizational level, if you don’t have a shared mission tied to the board & leadership organizational objectives, you’re going to go off the rails.”

One mistake McIndoe often sees is the compulsion to appoint someone to be in charge of the entire program.

“Rather than appointing hierarchical chiefs, embrace Gen. McCrystal’s Team-of-Teams model where autonomous, cross-functional teams operate with shared consciousness and empowered execution.” he says. “Each team maintains its own leadership while staying connected through transparent information sharing and aligned purpose. This preserves existing structures while enabling rapid adaptation and bridging of territorial silos. The key is fostering horizontal connections between teams while giving each authority to act quickly, creating an organic network that responds to complex challenges more effectively than rigid command-and-control structures."

Building Bridges

Though silos may seem daunting to overcome, the bridges can be built. And once they are made, it’s important to maintain them.

“It’s a journey, and it does not happen by itself,” Olivarez insists. “You should be intentional in your leadership presence, you should be clear in your expectations, you should communicate often, and you should celebrate all that help in the success. It’s not about one person; it’s about the collective good.”

Dunning declares that by bridging silos, “organizations can close security gaps, boost efficiency and build a resilient future where threats have nowhere to hide.”

McIndoe adds, “In a world of accelerating complexity, our greatest competitive advantage isn't technology or capital — it's our ability to connect, adapt, and act as one interconnected force.”

KEYWORDS: collaboration organizational resilience vulnerability management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Stacks of currency laid together

    Report suggests organizations sacrifice client privacy to save money

    See More
  • Cyber professionals collaborating in office

    How to Prepare for the Shifting Talent Landscape

    See More
  • person playing chess in suit

    Tone at the top: It’s time to bring security to the board level

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing