Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Transportation/Logistics/Supply Chain/Distribution/ Warehousing

It’s All about Value

By Larry Mays
February 1, 2009
It’s necessary to identify how and where technology can assist in providing better risk reduction results.


In this new millennium, our desire to tap into the overwhelming potential of a global economy plus our need for greater access and speed further compounds our need for better controls. And with that desire for more speed and market liquidity, we must remain vigilant to the ever-present complex security challenges we face.

The transportation and logistics market is valued at about $250 billion with an estimated $18 billion in losses. Companies are hiring global and regional security directors and moving towards centralized procurement and standardization of security requirements. This is good. But they also need to centralize security decision-making. They need to consider creating a more senior role within their organizations, such as a chief security officer who reports directly to the chief executive officer. This gives priority and adds visibility to security issues.


What Are Our Future Security Challenges?

Thieves have become more organized and sophisticated. Many gangs can “steal-to-order” digital cameras, athletic shoes or any other category of goods, depending on what “customers” want. Add to this trend the fact that there is always the looming threat of terrorism.

Glenn Nilsson, Hewlett Packard’s global supply chain security manager and chairman of TAPA Americas, the Transported Asset Protection Association, said, “Theft cannot be measured solely by the value of goods, but also by the cost of lost market share, unhappy customers and making claims. It has been calculated that the overall loss is on average five times the value of goods stolen.”

The bottom line is that security must be built into the supply chain from the beginning. Specific incidents can have a major impact on transportation and logistics companies.

According to a 2006 PricewaterhouseCoopers study, when asked about the two most serious financial losses that affected their organizations, 20 percent of transportation and logistics companies worldwide indicated that crime was a key concern, compared with only nine percent of companies in other industries.


Decision-Making for Security Investments

The bottom line for investment into a new or replacement security system lies in clearly understanding the current security risk. This is as much about people and process change as it is about technology. To accomplish this, one might want to bring in outside consultants. In any event, a company needs to analyze the current situation in terms of meaningful metrics and resource utilization.

To develop the desired security system and solutions, it is necessary to identify how and where technology can assist in providing better results. It is essential for vendors to serve as active listeners in a collaborative role and help customers to solve today’s security challenges while looking at ways to solve tomorrow’s challenges through thought leadership and innovation. Investments in emerging technologies may promise lower short-term margins, but might lead to true innovations and provide customers with a competitive advantage and longer-term market potential.

Value is ultimately determined by the customer. Vendors have to continue to find ways to add value in the marketplace. Either you add value or you become irrelevant.


Road Map for the Future

In the movie Minority Report, in the year 2054, actor Tom Cruise is a member of the Washington, D.C. pre-crime police force that can predict and intervene on crimes before they happen. I’d like to say we are developing solutions capable of predicting a crime before it occurs, but this is 2009 and we live in the real world – not Hollywood. However, we are optimistic about the convergence of IP-based smart security devices. With these devices security professionals can be more proactive in their fight against crime via data-driven, predictive security models. They can design loading patterns and processes using predictive security models to reduce the probability of risk or determine what levels of vulnerability are acceptable so goods are not left exposed. We’re looking at a layered approach that includes redundancy, where if one deterrent fails another will kick in to catch, alert or lock-down. We’re looking into tighter integration of security software solutions that can make some predetermined decisions without human intervention.

What’s changing is the intelligence in our devices and the ways we can integrate them or provide more analytical capabilities that can provide pattern recognition of freight movements.

We need to increase the priority of security within the corporate boardrooms and tie these initiatives into the overall IT strategies. Chief information officers need to be included in the security conversation as our devices become smarter and we leverage existing IT infrastructure and projects.

In today’s world, transportation security is a major concern. There is strong pressure from Washington to provide more security to prevent terrorists from disrupting our global transportation network and companies looking to reduce their cost of inventory shrinkage. Our mission is to clearly define the problems, understand our customer’s issues and develop innovative security solutions that will meet the challenges ahead.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Larry Mays is group director for transportation and logistics for ADT Security Services. He brings 31 years of transportation information management experience to this position.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • It’s All About What You Say and How You Say It

    It's All About What You Say and How You Say It

    See More
  • Robotics arm in manufacturing

    Manufacturing Security: It’s All About the Details

    See More
  • SEC1121-talk-Feat-slide1b_900px.jpg

    It’s all about the metrics

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing