Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Most Influential People in Security

By Diane Ritchey
secfeaturestory
December 1, 2010

Cities, Counties, States Security

 

Leroy BacaLeroy Baca,

Sheriff, Los Angeles County, California

 

Since becoming Sheriff of Los Angeles County in 1998, Lee Baca and his command staff have developed and implemented a number of strategies to positively impact residents. The Community Oriented Policing Services Bureau (COPS Bureau) finds long-term solutions to crime trends impacting neighborhoods in the unincorporated areas of Los Angeles. COPS Bureau deputies use a face-to-face approach to remove barriers that have formed over time between law enforcement and the neighborhoods they patrol. Another strategy is the VIDA (Vital Intervention and Directional Alternatives) Program designed for at-risk youth between ages 11 and 17, which is operated by the COPS Bureau from eight sites. Since its inception, more than 6,000 families have participated in the program, which involves students in 10 hours of supervised activity each week, eight hours on Saturdays, and two-hour midweek counseling sessions. Also, the Parolee Monitoring Program collects and disseminates information regarding some 30,000-plus inmates placed on Non-Revocable Parole status. The Department’s technology-based strategies include a law enforcement information sharing program that involves COPLINK, a tactical, line-level analytical solution designed to address common problems in law enforcement information systems.

 

William J. BrattoWilliam J. Bratton,

Chairman, Kroll; Former Commissioner New York City Police Department and

Former Chief, City of Los Angeles Police Department

 

William Bratton is one of America’s premier police chiefs and the only person to have led both the two largest police forces in the United States – the New York Police Department and the Los Angeles Police Department (LAPD). Bratton is now chairman of Kroll, a risk consulting company, which he joined in November 2009 after serving as LAPD chief for seven years. Bratton revitalized police morale and significantly cut crime in each of the four law enforcement leadership positions he has held, which also include New York City Transit police chief and Boston Police Commissioner. In the process, he established an international reputation for re-engineering police departments and fighting crime. In the New York Police Department, Bratton led development and deployment of CompStat, an accountability process and management program based on comparative statistics that is similar to Six Sigma and Total Quality Management (TQM) programs. In 1999, before returning to public service as LAPD chief in 2002, Bratton formed his own company, The Bratton Group LLC, as a consultant on safety and security throughout the United States and on four continents, including extensive work in South America. 

 

Cathy LanierCathy Lanier,

Chief, Washington, D.C.

Metropolitan Police

 

Cathy Lanier was named Chief of the Metropolitan Police Department by D.C. Mayor Adrian Fenty in 2007. She was 39 at the time and the first woman to take on one of the most high-profile, demanding jobs in law enforcement. Lanier’s management style is to listen, build consensus and create specialized teams around her. Her priorities include making police more visible on the street, improving department efficiency and lifting morale by empowering officers and supervisors. Lanier had spent her entire law enforcement career with the department, most of it on the front lines. Since joining the department in 1990, Lanier has displayed her inclusive management style and tireless work ethic in a rapid rise through several positions, including Commander of the Fourth District, one of the largest and most diverse residential patrol districts in the city. She also served as the commanding officer of the Department’s Major Narcotics Branch and Vehicular Homicide Units. More recently, Lanier served as Commander of the Special Operations Division (SOD) for four years. During her tenure as SOD Commander, she established the agency’s first Homeland Security/Counter-Terrorism Branch and created an agency-wide chemical, biological, radiological response unit known as the Special Threat Action Team.  

 

Defense Industrial Base Security

 

Arthur CummingsArthur Cummings,

Executive Assistant Director for National Security Branch, FBI

 

When Arthur M. Cummings II was named executive assistant director of the FBI’s National Security Branch in 2008, it was the culmination of a 20-year FBI career. The job involves overseeing the FBI’s Counterterrorism, Counterintelligence, Weapons of Mass Destruction and Intelligence programs, as well as the Terrorist Screening Center. Cummings is also the lead FBI official responsible for coordination and liaison with the U.S. Director of National Intelligence and the rest of the Intelligence Community. At every level, from street agent to field supervisor to headquarters executive, Cummings’ career has concentrated on investigating and managing counterterrorism and counterintelligence operations. He has served in five field offices and in three different positions in the Counterterrorism Division at FBI headquarters. In the field, he investigated and managed counterterrorism, counterintelligence and various criminal programs. He also deployed overseas to support major counterterrorism investigations. Following the Sept. 11, 2001, terrorist attacks, Cummings was assigned to the Counterterrorism Division at FBI Headquarters. He played a key role in the reorganization of the counterterrorism program and established the position of Chief of the National Strategic Assessment and Warning Section. He served as chief of the Counterterrorism Operational Response Section, charged with developing and overseeing FBI operations in foreign theaters such as Afghanistan. 

 

Edward HalibozekEdward Halibozek,

Vice President and Chief Security Officer, Northrop Grumman

 

Edward Halibozek’s career in industrial security spans more than 30 years. In 1985, he joined Northrop Grumman and has been the corporation’s senior security executive since 1995. Halibozek works from the company’s Los Angeles headquarters, where he is responsible for oversight of all company-wide security programs. Northrop Grumman is a global defense company with approximately 120,000 employees and operations in all 50 states and 25 countries. Halibozek chairs the Northrop Grumman Security Council, working to develop a common, company-wide approach to addressing security strategies, processes, issues and problems. The Security Council is the key deliberative body for security, fire, contingency planning, and investigative issues and opportunities facing the company. In addition, Halibozek is responsible for developing and implementing security processes that protect the people, information and property at the corporate office locations. Halibozek has contributed to security as a security professional, an author and a teacher. He has co-authored five books on security, including the broad-based “Manager’s Handbook for Corporate Security” and “Introduction to Security” (eighth edition). Halibozek also teaches a course on security management at California State University Fullerton.

 

Ray MusserRay Musser,

Staff Vice President Security,

General Dynamics Corp.

 

Ray Musser directs global security operations for General Dynamics, an aerospace and defense company with $32 billion in annual revenue in 2009 and 91,000 employees worldwide. He is responsible for all aspects of security activities including the company’s information security operations and compliance programs. Since joining General Dynamics in 1984, he has led efforts to foster and encourage partnership and information sharing among law enforcement, the intelligence community and the private sector. He continues to be a champion of this approach in his leadership roles as co-chair of the FBI’s National Security Business Alliance, where he helps to tailor and advocate the FBI’s outreach initiatives to industry. Musser was an early proponent of combining the traditional security discipline and cyber security discipline under one umbrella. Highlights of Musser’s 30-year career in security and law enforcement also include development and implementation in 2002 of General Dynamics’ global security operations, named the Global Incident Response Center. Musser identified the need to have worldwide situational awareness of employees when they were on company travel or working offsite for a customer program. He led the effort to implement a reporting and tracking system, combined with a security staffing model that allowed the company to have key expert staff available 24/7 worldwide. 

 

Steven ShirleySteven Shirley,

Executive Director,

DoD Cyber Crime Center (DC3)

 

Steven Shirley’s first tour of duty as a special agent with the Air Force Office of Special Investigations involved him in counterintelligence and security support to national space systems. It also introduced him to collaboration between the government and the Defense Industrial Base (DIB), which includes tens of thousands of companies and their subcontractors who contract with the Department of Defense. Later at the Office of the Secretary of Defense, Shirley worked to protect sensitive programs of defense contractors during arms control treaty inspections. Since 2004, Shirley has created a model for sharing cyber threat data with the DIB. Shirley was a principal participant in discussions with senior officers of defense contractors, beginning in 2005, which led to a Deputy Secretary of Defense decision in 2007 to create an unprecedented public-private sharing model to exchange cyber threat data. Under the DoD Cyber Security/Info Assurance Program, Shirley organized the DoD/DIB Collaborative Information Sharing Environment at the DC3, which began pilot operations in February 2008 as the operational “front door” for cyber threat sharing with defense contractor companies. The network DC3 built for this purpose, now migrated to the Defense Information Systems Agency (DISA), at maturity will be a conduit to the defense contractor community for other multi-disciplinary threat and security data.

KEYWORDS: department government organizations Homeland Security Security security associations security intelligence security metrics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Previous 1 2 3 4 Next
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • sec1210featureonedoor

    One Door at a Time

    See More
  • MarkMtrends

    New Threats Demand New Alliances

    See More
  • secweeklogo2

    Introducing: Security Week

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!