Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Well, Whadda Ya Know?

By Mark McCourt
October 1, 2009

Now back from the ASIS show, how are you going to convince the C-suite crowd to sign off on your plan? Well, more to the point, to sign off on you? Have you had that hard stare with the mirror and asked the person staring back:      
  • How can you communicate a clear business case for investments in security?
  • How can you present your strategy so the C-suite will listen and approve your recommendation?
  • How can you manage your own resources to make the most impact for your organization?
The folks at ASIS, in concert with the Aresty Institute of Executive Education at the Wharton School, have asked these questions. Through the ASIS/Wharton Program for Security Executives, many of your peers have been provided answers. Dr. Mario Moussa, academic director of the program, shared his thoughts about security management’s challenges and opportunities.
     
Security: What do you think of the fact that a person can earn an MBA and never take a security management course?
     
Moussa: It underscores a potential blind-spot in many organizations. In fact, a security executive has an important role to play in influencing the C-level mindset. CEOs tend to be focused on growth and performance. The CSO needs to focus on business resilience and continuity. Security needs to be involved in overall organizational performance and avoid being viewed as a narrow, technical function.
     
Security: How do you frame the security function so it aligns with the values and beliefs of the entire organization?
     
Moussa: We have identified career barriers that limit most security leaders from successfully reaching the C-suite. We work to help people reframe their focus and contribution.
     
Security: How do you overcome those career barriers?
     
Moussa: First, we work with participants to help them establish credibility by properly exhibiting expertise and competence. Often, people do not know how to properly develop trust and position themselves as a competent business person rather than a functional specialist.
     
One key way is to adopt business language instead of technical security language. Avoid talk about reduction in shrinkage or loss prevention terms. Talk instead about impact on earnings as a result of reduction in shrinkage. Then we focus on relationships. The security executive should actively find ways to get involved with senior management. Join committees, task forces, etc. If the other executives don’t know you, that’s a problem.
     
Credibility and relationship building are critical. Of course, you need to work through formal reporting relationships, but you also have to pay attention to the “informal organization” – the web of relationships that exist in the “white spaces” on the official organizational chart.
     
Once relationship barriers are removed, then you should focus on the biggest barrier to the success of the security function: negative beliefs. Simply stated: Does senior management view the security function as a strategic asset or a cost? Being viewed a cost is a problem, since costs tend to get managed downward.
     
Security: Many of our readers get stuck knowing what to measure, and presenting it in a meaningful way. What do you suggest?
     
Moussa: That really goes right to our next barrier. The security leader must understand what the organizational value drivers are and define security’s value in those terms. So, you should not only use business rather than security language, but also use business rather than security measures. For example, concentrate on inventory turns, customer relationships, or employee retention. And it all ties together, because to get the attention of senior management in the first place, the security leader has to have credibility and the right relationships.
     
We work with our students to see a situation from the senior leadership’s perspective and goals. You want the C-suite to see security as a business driver. Too often, security leaders are focused on advancing security’s goals, and they reach this fourth barrier – interests – and fail.
     
Security: It seems that the organizational maze is a challenge for many of the security leaders you work with. Have you found a core reason for this?
     
Moussa: Yes, and it is our fifth barrier. Often, security leaders come from very hierarchical organizations (such as police or military) and need to learn a whole new set of ideas and language. We focus on unlearning what they know and then teaching them how to “speak the language” of a complex and non-hierarchical organization.
     
Security: How does Maureen Rush, VP public safety at the University of Pennsylvania and the top ranked University security and safety executive in North America, exemplify your program’s vision?     
     
Moussa: Maureen understands the credibility, relationship and language issues and has mastered them. She frames security’s contribution to senior leaders in terms of organizational goals and speaks at a business level.
     
Security: What is the big “Aha!” for your graduates?
     
Moussa: They think they will get answers to technical questions in our program, but the light bulb goes on when they realize they need a broader organizational understanding to be effective. They learn that both large and small organizations are facing similar problems and that most management and leadership issues are universal. They tend to be surprised to learn from other classmates that their position is not unique and that they have significant control over their own success and future. They begin to see themselves as empowered.
     
Dr. Mario Moussa is a principal and member of the Management Committee at CFAR, Inc, a strategy and leadership consulting firm that spun off from the Wharton School of Business in 1987. Dr. Moussa teaches in the Wharton Executive Education Programs and is the Academic Director for the ASIS/Wharton Program for Security Executives.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Unlock the future of cybersecurity news with Security.
As a leader in enterprise security, we have you covered with the information to keep you ahead of the curve.

JOIN TODAY

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

Popular Stories

White board with the word audience written

From Fear to Action: How to Craft Cybersecurity Campaigns That Actually Change Behavior

Code

378 GB of Data From Navy Federal Credit Union Exposed

The Most Influential People in Security 2025

Security’s Most Influential People in Security 2025

Office

58% of Organizations Are Unprepared for Cyberattacks

Russian flag

Russia-Sponsored Cyber Attack Campaign Targets Networking Devices, Critical Infrastructure

Events

September 23, 2025

From Signal to Action in Seconds: How Nutrien Translates Early Warnings into Operational Confidence

When a threat emerges — how fast can your team respond? The ability to detect, validate and act with confidence can be the difference between a contained incident and a costly crisis.

September 25, 2025

Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Know Your Disruptions

    See More
  • It's Time to Change Your Perception of the Cybersecurity Professional

    Attack surface management is critical but few organizations do it well

    See More
  • coronavirus

    How Well are you Social Distancing? Smartphone Location Data Ranks US States

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!