Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

A Teaching Moment

By Mark McCourt
February 1, 2010

It may seem like ancient history when you read this column, but it makes academic sense to focus on the attempted terrorist attack on Christmas Day 2009 on Northwest Airlines Flight 253. A Nigerian man named Umar Farouk Abdul Mutallab attempted to detonate an explosive device on the Airbus 330 carrying 278 passengers and a crew of 11.

Thus, the holidays turned from a traditionally slow news time period focused on football bowl scores to one of high energy debates on the weaknesses of current TSA policies, the ridiculous delay of Erroll Southers’ confirmation to head of the TSA (and a member of Security magazine’s 2009 Class of The Most Influential) and some competency questions about DHS Secretary Napolitano’s capabilities for her job. There was no shortage of experts that shared their opinions, discussed new technologies and pointed fingers.

For the non-security professional, this thwarted terror attack became a teaching moment. And maybe it did in your organization too, as the discussions and debates centered on some core issues that may affect your enterprise.

How can you use the information? One way is to present this as a case study to your CEO and your Board: show them how difficult your job is, because if government agencies and experts don’t know what they are doing, how can they expect so much from you? But I don’t advise that course of action. 

Rather, this is an opportunity to expand the “security culture” within your organization by:

•   Reintroducing the importance and reasoning for security policies and the value of compliance to reduce risk.

•   Demonstrating and/or applying new technologies and their use in securing people as well as your business to overcome privacy concerns by focusing on benefits.

•   Hammering the value of communication to expand security’s scope and ability to identify risk and prevent events by breaking down silos, information gaps and focusing on prevention.

•   Clarifying the advised actions of your stakeholders in an emergency situation so that liabilities are reduced and expectations clear.

Risk Mitigation: The attempted attack on Christmas Day renewed the debate between prevention and event response, with a focus from “stopping terror” to simply “tightening security.” 

Which led to a debate about privacy and profiling. As a result, your employees and other stakeholders may be more aware of these issues and are perhaps divided on whether you are invading their privacy, increasing their safety or both.

This is a good opportunity to place the benefits of safety and security policy front and center. As one passenger reflected about airport security: “What good is my privacy if I’m dead?” In fact, a recent Harris Poll shows 96 percent of Americans support uses of video surveillance to counteract terrorism. While your situation is (hopefully) not so dire, a similar statement linking policy to personal safety is valuable. 

Technology, as a valuable tool, not Big Brother: Since 9/11 there has been an unrelenting supply of new security solutions (80 pages of them follow this column) and many have been designed specifically for the air travel sector. While the air travel security program is clearly less than perfect, it has limited the size and scope of weapons that can bypass security. And while a weapon made its way onto Flight 253, there was sufficient time for an effective response.

Security technology is a two-edged sword that creates a high-tech détente. Access controls provide a balance: they prevent a person from going where they should not, but also protect someone from being in harm’s way. We give something up and we gain something, too. This is your opportunity to show security technology’s value.

Communications: Since 9/11, DHS has been created with the promise of a united approach to security and a focus on information sharing. But the silos and poor communications seem to persist in government today, according to former DHS Secretary Chertoff (see Jeffrey Rosen’s comments in the December 2009 issue of The New Republic). While many security leaders pledge to break down silos and collaborate across their organizations, they sometimes fail.   

This is a powerful time to reach out and identify appropriate communications programs that will help your organization. Is the information that you provide across your organization clear and sufficient? Is the information you are receiving adequate for securing your internal customer?   

Appropriate Response: The passengers acted immediately to extinguish the device and subdue Mutallab on Flight 253. Being aware, prepared and taking ownership for one’s own safety and security; being ready, willing and able to communicate concerns and err on the side of false alarms are known as key elements of a successful risk mitigation program by you and your peers, but it was eye opening to the general public on Christmas Day. It is being suggested by experts and pundits that John Q. Public take action into their own hands in times of threat. Is your company recommending to its employees that they become action heroes?   

Do you want your employees to evacuate the building when the fire alarm sounds or fight the fire? There is no clear playbook here, but when events unfold, there is a difference between an individual not following policy and not having a policy.   

We have not heard the last of this incident and its impact on how we travel. But if the recent mass-market exposure can be steered toward actionable change at your organization, thereby increasing both the economic and perceived value of your security program, then it has been a teaching moment.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • A ‘Codec’ Moment

    See More
  • Increase in Cybercrime Demands Fresh Attention to Employee Onboarding and Training

    When It Comes to Employee Security Awareness Training - Should You be Phishing or Teaching?

    See More
  • smb-cyber

    4 barriers to teaching employees good cybersecurity habits — and how to overcome them

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Physical Security and Safety: A Field Guide for the Practitioner

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing