Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Exclusive: Witt on Risk, Business and Security

June 5, 2006


I recently interviewed James Lee Witt, director of the Federal Emergency Management Agency (FEMA) during the administration of President Bill Clinton. During his tenure, Clinton elevated FEMA to cabinet status, and Witt overturned FEMA’s previously poor reputation. Witt is now president of James Lee Witt Associates, Washington, D.C., consulting on emergency and disaster preparedness to local and state governments. Witt also serves as CEO of the International Code Council, which sets international standards for building construction. This March, GlobalOptions Group, a provider of domestic and international risk management services, acquired James Lee Witt Associates.

In an exclusive interview on risk management, James Lee Witt stresses a proactive approach, solid communication and involvement inside and outside enterprises.

Q: Give Security Magazine readers your best advice on solid communications during a disaster.

A: You must have a backup plan and backup system in place. Great examples include “vendor on call” relationships. For example, mobile cellular phones and communication towers that can be moved into a disaster area immediately to restore lost communications and speed disaster recovery are vital.



Q: Preparation to better handle a crisis is important. What are your best strategies for preparation?

A: We have been working with very proactive groups, the governors of the western states, for example, to inventory and assess all of the available resources in the area. Most disaster planning focuses on “our resources” and that is a mistake. It is important to recognize “what’s missing” and look outside your domain (organization, city, state) while planning. Having contingency plans in place and knowing where to find needed resources when your own resources are not available are critical for preparation.



Q: How best should enterprise security executives approach the involvement of their CEOs in disaster management?

A: The best way to get the top-level decision-makers to buy in is by getting them to focus on what they need to do. They need to care about protecting their business and that means caring about their employees because they are the business. The security executive should focus on “how to do it” vs. “why to do it” and show what the organization will achieve by moving forward -- namely securing its business.



Q: What types of training are necessary and who should be involved in that training at agencies and enterprises?

A: Training is very important. Wal-Mart, as an example, is interesting. All security and emergency management personnel should be trained. There are bachelor and master degree programs emerging across the country. Wal-Mart’s has a placement program for these professionals. I had the opportunity to speak with some of their employees and they are bringing knowledge, skill and the use of technologies to Wal-Mart and adding great value to their security programs.



Q: What role does technology play in disaster management?

A: Well, its role is increasing. We encourage government agencies to reach out to the private sector for solutions. Technology is increasing the rate of change for security solutions. These new solutions are more efficient and increase readiness, thereby mitigating risk. We have solutions in place that identify when someone is out of contact, where they are located and we are able to send a response team. I have seen new technology applications save lives. Those involved in disaster management need to stay abreast and consider the possible contribution of new technology.



Q: What’s coming over the horizon relative to risk management and disaster management?

A: We did a cost analysis study and found that for every dollar spent on risk mitigation, five dollars are saved on disaster recovery. That’s pretty significant. It saves lives, too. For any government or business not to realize that it’s an investment and not just a cost is important. Those economics mean you have to take risk mitigation very seriously by investing in emergency planning, disaster recovery and security. Many universities, municipalities and states are now aggressively seeking risk management strategies and solutions and we see this proactive planning continuing, even increasing.



Q: You are a key player with the International Code Council. Is new construction reflecting the new threats, especially with commercial buildings?

A: I have been the CEO for three years and the International Code Council is a proponent of stronger building codes. The I-Codes are adopted at the state or local level in 48 states making them the code of choice in more than 15,000 communities. New adoptions are being reported to us all the time. New York City is in the process of adopting the International Building Code and International Fire Code with implementation expected next year. California also is in the process of adopting I-Codes with a target date of 2008. It has been noted in Florida, and other hurricane-prone areas, that newer buildings built to I-Codes, or codes based on the I-Codes, withstand the storms with much less damage than older buildings built to older codes. The Code Council’s code development process, which is public, allows for all interested parties to contribute to the development of safer buildings for the future.



Q: Public safety is really a matter of diverse private and public organizations working together. How is that cooperation working out?

A: Eighty-five percent of the critical infrastructure is in the hands of the private sector. More private sector involvement is needed than in the past. Public leaders and elected officials should be reaching out to the private sector to collaborate and seek solutions.



Q: What are the positive synergies of the bringing together of JLWA and GlobalOptions?

A: Global Options provides an investment into our company that allows us to broaden our services and work more quickly on risk mitigation issues. It allows us to provide all types of services and partner with other security firms that are part of GlobalOptions. So it allows us to operate as James Lee Witt Company and leverage the benefits of being a bigger company.



Q: What have we learned so far from the Katrina event?

A: First, as a result of Katrina, disaster planning is being taken far more seriously than before it struck. We learned that contingency planning -- not one level of contingency but many levels -- are necessary to save lives and speed recovery. I also feel strongly that FEMA’s ability to respond was impaired under Homeland Security and that it should be repurposed as its own organization. v

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Blog Download Exclusive: Violence on Campus Report from Secret Service, FBI, Education Dept.

    See More
  • Airport at Sunset

    How Female Business Travelers Face Greater Risk on the Road

    See More
  • spotlight

    Intelligence and business risk integration in corporate security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing