Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Rebuilding Influence after Corporate Restructuring

By Bob Hayes, Kathleen Kotwica
May 1, 2011
SEC column inbody

Company reorganizations are a fact of business that may have grown more frequent as our economy has changed in recent years. If your organization is going through one, or you believe there may be cause for changes in its governance and reporting structures, it is critical for you to think about the impact these changes may have on security’s influence.

Will there be any personnel changes at the senior management level? If previously supportive people leave, all of the ground you covered and trust you earned while gaining support for your program may be walking out the door. Hopefully, you already have a metrics program in place so you can show new senior management an objective view of your program goals and accomplishments. Remember: Brief and to-the-point presentations are crucial for this audience.

If you will be reporting to a new boss, there are several questions you should ask yourself. Have you taken steps to educate him or her about your program, the value it brings, and the results you have achieved? Are you able to effectively and quickly communicate the services the organization finds valuable, including the view from your boss’ peers? Can you clearly articulate who the primary customers are of each security service? Can you demonstrate how each area of the company (audit, sales, comptroller, marketing, R&D, etc.) utilizes security? Can you demonstrate the cost, head count and results of each program/service?

Get yourself to the place where you can answer “yes” to all of these questions. Then, after doing that, discuss with your new boss what he or she feels should be changed or modified. Consider reinventing or restructuring your security program in a manner that (re)appeals to senior management and (re)establishes it as a crucial partner within the organization.

How well have you been aligning your programs with corporate-level goals? Do you know how ready your organization is for your security programs? Do they look at them as reducing risk in well-defined areas (e.g., workplace violence or investigations)? Do they view security as a true business partner? Knowing how senior management views security will help you define your programs to meet their current expectations. You can’t expect your programs to be accepted (or continually accepted) because they may have worked in the past. You must keep up with the ongoing transformations of the business.

You must also take a hard look at where you are as a security leader. Have you settled into a “maintenance” stance? While it is clear many security departments are currently understaffed and are working with a meager budget, consider the next stage you want to achieve. Try to find a way to keep existing programs well maintained while you build up your capacity to identify and manage emerging issues. If your department is thought of as simply a cost center, when the inevitable business shifts loom, you will surely be in the line of fire.

When corporate restructuring is on the table, take the time to think through your situation and the organizational structure.  Then, plan strategies that will eventually get you back to the position of a valued, revenue-enhancing partner of senior management. And look at this as an opportunity to improve your function, build its influence, align it with business goals, and better reduce risk.

If you have questions on how to realign after a structure change, or if you’d like to share your experiences and lessons learned, contact us at contact@secleader.com. 

KEYWORDS: reorganization security program

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob Hayes is Managing Director of the Security Executive Council. He has more than 25 years of experience in security, including eight years as the CSO at Georgia Pacific and nine years as security operations manager at 3M. The Council works with Tier 1 Security Leaders™ to reduce risk and add to corporate profitability in the process. To learn about becoming involved, visit www.securityexecutivecouncil.com/?sourceCode=secmag.

Kathleen Kotwica is executive vice president and chief knowledge strategist for the Security Executive Council. Prior to joining the council, she held a wide range of leadership positions, including information architecture consultant at a New England consulting firm, director of online research at CIO and CSO magazines, and research associate at Children’s Hospital in Boston. The Security Executive Council, a risk mitigation research and services organization for senior security and risk executives from corporations and government agencies responsible for corporate and/or IT security programs. In partnership with its research arm, the Security Leadership Research Institute, the Council is dedicated to developing tools that help lower the cost of security programs, making program development more efficient and establishing security as a recognized value center.  Visit https://www.securityexecutivecouncil.com/about/spotlight.html?sid=26499.

 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • “Garbage In” Can Cost You Your Job

    See More
  • 2011 Security Leadership Issue: Like Risk, Security Leadership Success Is a Moving Target

    See More
  • The Forces of Change

    See More

Related Products

See More Products
  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • operations center.jpg

    Security Operations Center Guidebook

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing