Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Reshaping an Image

March 1, 2005
Security consulting was flourishing by the mid-1980s as an integral, necessary discipline within the security industry. Professionals engaging in consulting prior to the 1980s were few and far between. Notable among this group were such pioneers as Timothy Walsh, Philip Schiedermayer, Don Darling, Bob Curtis, Thad Weber, David Berger, Roy Wesley and Steve Carlson.

The practice of consulting came of age in 1984 through the International Association of Professional Security Consultants. The organization defined consulting, set certain standards and developed a professional code of ethics. The principles of a speech I delivered at that organization’s first meeting on Feb. 11, 1985 in Clearwater Beach, Fla., still apply.

From my minutes of that meeting: “In attendance were nine practicing consultants. They developed a constitution and came up with a name: the American Academy of Protection Consultants. They had expectations, but for whatever reasons, the Academy didn’t fly. The time just wasn’t right. But the time now is right. We are re-gathered here, and we, too, have expectations, and we are already airborne. And we will grow. As the security industry continues in maturation and sophistication, so will the needs grow for professional guidance and counseling.”

Looking forward

Let me take a look down the road, to focus on two long-range goals and one new opportunity.

The first goal is to reshape the image and reputation of the security consultant. We must take positive steps to legitimize that term and discourage abuse of that title by anybody who merely wants to call himself or herself a security consultant without earning the title.

The second goal is to create a better understanding among ourselves as to our real role as consultants. One of our problems, believe it or not, is that very title of security consultant. Why? Too much emphasis is placed on the word security.

It should go without saying that we have expertise in the security field. But our orientation should be as professional consultants; we should be consultants first and security experts second. How many have hung out their security consultant’s shingle, only to fail? Many failures could be attributed to a lack of consulting skills, not a deficiency in security knowledge.

A new opportunity exists in forensic consulting, which includes expert eyewitness testimony. There’s a growing demand for security experts to assess the adequacy or inadequacy of security in a given setting and subsequently provide testimonial support for that assessment. No one other than a qualified expert is permitted the privilege of expressing an opinion in our judicial system.

And so, the time for the security consultant finally has come. We are few, but we are of good quality and we follow the highest standards. To live up to our worthy goals and new opportunities, we must at all times be responsible professionals.

Consultants and their organizations such as the International Association of Professional Security Consultants follow certain best practices. One example: the Security Survey the IAPSC encourages in typical premises security cases. With reasonable variations, the survey has three parts – personnel, program and equipment.

In the personnel section, information should be gathered on security officer actions, staffing levels, post orders, duty hours, equipment provided, tours, evaluations, training and hiring practices.

In the program section, solid forensic methodology should review security policies and procedures, risks assessments prior to the incident, manuals and training materials as well as reviewing of officer logs, job descriptions, incident reports and appropriate internal correspondence.

In the equipment section, a review of building design and site plans is helpful. An inspection of security devices related to the incident and structural security features are importance as well as the need to determine the position, function and maintenance status of the relevant security equipment and features.

The bottom line is a report that stresses foreseeability, preventability and causation.

About the Book

Security Consulting, Third Edition, was written by Charles Sennewald, independent security consultant, Escondido, Calif., and published by Butterworth-Elsevier. It includes updated and expanded information on marketing, fees and expenses, forensic consulting, the use of computers and the need for professional growth. For information, visit www.books.elsevier.com.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • id-card-access-control-freepik

    How visitor management, access control and security innovations are reshaping the look and feel of work in enterprises

    See More
  • computer

    Reshaping cybersecurity in the Remote Work Era

    See More
  • Smart city

    How the Internet of Things is reshaping video surveillance

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing