Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

The Canary in the Mine

By Phil Aronson
Canary
February 1, 2011
 
Phil Aronson
Phil Aronson

Canaries can have a short but significant life in a coal mine. Significant because, in their traditional role, they were used to identify the dangerous and costly fumes known as methane and carbon monoxide which could cause the loss of the business of the mine, the brand of the mine owners, and the skilled human assets of their workers.

Since canaries are extremely sensitive to small traces of the costly fumes, if they were singing, the business of the mine was okay. If they were dead, then it was a strong critical indicator that your business assets would be impacted with the degree of impact determined by the process and actions of the people to the data.

Although canaries are no longer used, the metaphor has lived on. And how it is expressed has powerful meaning to the state of our industry.

The phrase “Living like a canary in a coal mine” usually is expressed as the ultimate harbinger of a future event that can have meaningful opportunity or risk implications.

We have been collecting information and receiving feedback from the security industry through our strategic partners and our clients. Through this input they have acknowledged that there is meaningful and measurable data that they may not be able to collect. However, that data could help them recognize opportunities to improve the performance of the business and security’s role in it. By carefully observing these ‘canaries’ we believe organizations can avoid major failures down the road or capitalize on opportunities for their business.

We have been told by CSOs and security managers the following:

1.   Security’s value is difficult to measure

2.   The Performance metrics related to their people, process and tools are difficult to acquire

3.   Budget demands are increasing pressure to deliver services at less cost and to know which services really add value

4.   Technology is changing the operation of business, and, by extension, security. New tools can disrupt old processes and roles.

5.   Security is part of the IT architecture for delivering critical services to the
company.

6.   The balancing of old and new risks. The tools that are described in #4 and #5 create new risks as well. Those risks may not be able to be mitigated or contained with traditional approaches.

7.   And, finally, finding intelligent, savvy partners to help navigate the change, provide tools to help measure and provide strategies to take the measurements and build a strategy and business case are not readily available or obvious. There are too many niche players that a security executive must evaluate and then manage in context of their strategy, which only incurs time and cost, both of which are increasingly difficult to bear.

All of these are ‘canaries’ in the coal mine, pointing to a deep need for a new coalition working under a unified definition of value and risk. A coalition that can provide:

•  The deep domain knowledge of existing and emerging technology,

•  The due diligence around effective benchmarking of those technologies both directed (in a lab) and applied over time (through experience),

•  The identification of the business mission and goals (the language and business model of the organization) with the quantification of risk,

•  The vertical market knowledge to identify regulatory mandates and how to manage them toward the mission of the organization,

•  Authentication of their competencies and practices so that the outcomes from their services can be measured, managed and predictably assured.

The challenge our industry faces from your questions and needs clarifies our purpose. Every tool you buy, every service you engage, must create a performance value that can be measured. And that value premise must have a tangible outcome to the business.

If you are an ‘integrator’ then it is no longer enough to be a certified installer of a particular product. Nor is it enough to look at your client as a ‘project’. You must earn the right to be heard as an advisor. To do that you must have the knowledge base to move from product knowledge to business process and metrics knowledge. And you better know their business. As well, you better be as comfortable with the IT executives as you are with physical security executives.  In most cases, integrators have failed to do this.

If you are a manufacturer, you must determine your long term product roadmap through better communication with your end users and the new integrators described above. Some of you will be out of business in the next few years or marginalized because you frankly are not listening.

If you are a security executive, you must enhance your professional status by going beyond your traditional methods for professional certification by participating in new knowledge communities that have emerged over the last few years.  For example: the Security Executive Council has several membership programs that provide a disciplined approach to organizing, leveraging and syndicating knowledge from some of the leading security knowledge leaders in the industry. And they are advocating new coalitions as described here. One of them is The Great Conversation™: a coalition of security integrators, security executives and manufacturers that is envisioned to act as an aggregator and syndicator of the most prominent issues and answers of the day.

Canaries are singing and dying across our security industry. Tread carefully and work diligently to find the ‘seams’ of value while navigating the signs of failed business models,  ideas, systems and tools.  


About the Author:

Phil Aronson is CEO of Aronson Security Group (ASG), an independent integrator of enterprise security solutions. Building on a strong reputation for engineering and service for over 45 years, ASG provides engineering excellence, world-class service, and security expertise to premier regional and national organizations. This year ASG’s annual Security Summit & Expo is a qualified Great Conversation Event providing both physical and logical security leaders from virtually all industries including healthcare, government, retail, transportation, manufacturing and critical infrastructure the opportunity to leverage and learn from the knowledge and experience of industry thought leaders as well as their own peers. Backed by the Security Executive Council, a global network of security executives, and PSA, the largest community of security integrators in the world, The Great Conversation™ brings together a global security network in a series of events anchored by an online conversation platform. These events facilitate the sharing of ideas and experience between security practitioners, integrators and manufacturers that enhance the value of security in participating organizations. To become a part of this organization or learn more visit their website at www.greatconversationevents.com.

KEYWORDS: canary essential indicators

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aronson 2016 200px

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Defining the Next Generation of Security Services in the C-Suite's Language; security technology, security services

    Defining the Next Generation of Security Services in the C-Suite's Language

    See More
  • Stranger in a Strange Land: Finding the New Normal of Security Culture - Security Magazine

    Stranger in a Strange Land: Finding the New Normal of Security Culture

    See More
  • The Mind of the CSO

    The Mind of the CSO

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!