Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Leadership & Management

Four Strategies to Fill the Resource Gap

By Brad Brekke
March 1, 2010

Over the last several decades, security professionals have watched risks increase due to factors such as globalization and technology. At the same time, shrinking budgets have limited access to security tools. Dealing with the resulting resource gap is a challenge for all security professionals today, but they can close this gap by focusing on four key levers: talent, technology, information and partnerships.

Talent. Security professionals have historically transitioned from the military and law enforcement fields, and these are still great sources of new talent. But hiring employees with experience in disciplines such as finance, marketing and communications helps diversify the talent base in the corporate security industry. Seeking a wider variety of talent from other disciplines can expand the collective skill set while ensuring the broadest possible view of the security mission. Security departments cannot afford a “siloed” view of the world in a day when the functions and missions in a corporation are so closely linked. Combining educational paths, degree levels (including MBAs) and technical expertise strengthens the entire team.

Technology. Our security teams may be smaller, but we have learned to accomplish more with less through effective use of technology. Digital video helps us combat theft and fraud and manage crowds. Virtual burglar alarms tell us when someone is outside a building even before they break in. And beyond applications in corporate security, expanded technology now provides enterprise-wide support, including operational and customer service capabilities. For example, technology enabled Target management to virtually visit stores from the East Coast to Hawaii on “Black Friday” last November. This allowed for real-time communication with store team staff about priorities ranging from crowd management to instocks and customer service. 

Information. Some people say we are all drowning in data, but for a large enterprise, detailed analysis of data and metrics is a wonderful tool. We can now understand – operationally and strategically – the cost and return on our investments. We know the actual cost of shortage and how much margin we lose. We know which products are hot with thieves, and therefore can design merchandise protection strategies around those items that pose the greatest theft risk. Information is a key tool to help us make critical business decisions more quickly and with greater impact.

Partnerships. At Target, community engagement is a passion. We have long partnered with local, state and federal law enforcement professionals to help keep our stores and surrounding communities safe and secure. Our focus includes innovative philanthropy, which extends beyond writing a check, and it reaps huge benefits. For example, in 2009, we introduced a program that provides corporate-style training to high-ranking law enforcement officials to expand their skills in finance, management, communication and personnel issues. As part of this program, Target leaders in areas such as HR and Communications provide expertise on opportunities such as recruiting, training and retaining diverse talent as well as building relationships with the media. 

For many years, Target also has served as a sponsor of National Night Out to strengthen relationships between police and communities. And across the country, we have helped launch Safe City projects in more than 20 cities, building partnerships between businesses and police in these communities to share best practices and collectively leverage cameras and communication devices. These efforts support healthy communities, and healthy communities benefit us all.


Links

  • www.securityexecutivecouncil.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brad Brekke is vice president of Assets Protection at Target and a member of the Security Executive Council, a problem-solving research and services organization that involves a wide range of risk mitigation leaders. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How Cybersecurity Education Aims to Fill the Talent Gap

    See More
  • cyber security employees

    Strategies for closing the cybersecurity skills & leadership gap

    See More
  • Top 4 Reasons to Fill Out the Security 500 Survey

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing