Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Well, Whadda Ya Know?

By Mark McCourt
October 1, 2009

Now back from the ASIS show, how are you going to convince the C-suite crowd to sign off on your plan? Well, more to the point, to sign off on you? Have you had that hard stare with the mirror and asked the person staring back:      
  • How can you communicate a clear business case for investments in security?
  • How can you present your strategy so the C-suite will listen and approve your recommendation?
  • How can you manage your own resources to make the most impact for your organization?
The folks at ASIS, in concert with the Aresty Institute of Executive Education at the Wharton School, have asked these questions. Through the ASIS/Wharton Program for Security Executives, many of your peers have been provided answers. Dr. Mario Moussa, academic director of the program, shared his thoughts about security management’s challenges and opportunities.
     
Security: What do you think of the fact that a person can earn an MBA and never take a security management course?
     
Moussa: It underscores a potential blind-spot in many organizations. In fact, a security executive has an important role to play in influencing the C-level mindset. CEOs tend to be focused on growth and performance. The CSO needs to focus on business resilience and continuity. Security needs to be involved in overall organizational performance and avoid being viewed as a narrow, technical function.
     
Security: How do you frame the security function so it aligns with the values and beliefs of the entire organization?
     
Moussa: We have identified career barriers that limit most security leaders from successfully reaching the C-suite. We work to help people reframe their focus and contribution.
     
Security: How do you overcome those career barriers?
     
Moussa: First, we work with participants to help them establish credibility by properly exhibiting expertise and competence. Often, people do not know how to properly develop trust and position themselves as a competent business person rather than a functional specialist.
     
One key way is to adopt business language instead of technical security language. Avoid talk about reduction in shrinkage or loss prevention terms. Talk instead about impact on earnings as a result of reduction in shrinkage. Then we focus on relationships. The security executive should actively find ways to get involved with senior management. Join committees, task forces, etc. If the other executives don’t know you, that’s a problem.
     
Credibility and relationship building are critical. Of course, you need to work through formal reporting relationships, but you also have to pay attention to the “informal organization” – the web of relationships that exist in the “white spaces” on the official organizational chart.
     
Once relationship barriers are removed, then you should focus on the biggest barrier to the success of the security function: negative beliefs. Simply stated: Does senior management view the security function as a strategic asset or a cost? Being viewed a cost is a problem, since costs tend to get managed downward.
     
Security: Many of our readers get stuck knowing what to measure, and presenting it in a meaningful way. What do you suggest?
     
Moussa: That really goes right to our next barrier. The security leader must understand what the organizational value drivers are and define security’s value in those terms. So, you should not only use business rather than security language, but also use business rather than security measures. For example, concentrate on inventory turns, customer relationships, or employee retention. And it all ties together, because to get the attention of senior management in the first place, the security leader has to have credibility and the right relationships.
     
We work with our students to see a situation from the senior leadership’s perspective and goals. You want the C-suite to see security as a business driver. Too often, security leaders are focused on advancing security’s goals, and they reach this fourth barrier – interests – and fail.
     
Security: It seems that the organizational maze is a challenge for many of the security leaders you work with. Have you found a core reason for this?
     
Moussa: Yes, and it is our fifth barrier. Often, security leaders come from very hierarchical organizations (such as police or military) and need to learn a whole new set of ideas and language. We focus on unlearning what they know and then teaching them how to “speak the language” of a complex and non-hierarchical organization.
     
Security: How does Maureen Rush, VP public safety at the University of Pennsylvania and the top ranked University security and safety executive in North America, exemplify your program’s vision?     
     
Moussa: Maureen understands the credibility, relationship and language issues and has mastered them. She frames security’s contribution to senior leaders in terms of organizational goals and speaks at a business level.
     
Security: What is the big “Aha!” for your graduates?
     
Moussa: They think they will get answers to technical questions in our program, but the light bulb goes on when they realize they need a broader organizational understanding to be effective. They learn that both large and small organizations are facing similar problems and that most management and leadership issues are universal. They tend to be surprised to learn from other classmates that their position is not unique and that they have significant control over their own success and future. They begin to see themselves as empowered.
     
Dr. Mario Moussa is a principal and member of the Management Committee at CFAR, Inc, a strategy and leadership consulting firm that spun off from the Wharton School of Business in 1987. Dr. Moussa teaches in the Wharton Executive Education Programs and is the Academic Director for the ASIS/Wharton Program for Security Executives.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Know Your Disruptions

    See More
  • It's Time to Change Your Perception of the Cybersecurity Professional

    Attack surface management is critical but few organizations do it well

    See More
  • coronavirus

    How Well are you Social Distancing? Smartphone Location Data Ranks US States

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing