Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Securing the Crossroads

Eric Levine
September 1, 2011

Eric Levine left New York and moved to Indianapolis. Why? Not only for the “Crossroads of America,” as the city calls itself, but to build a security team that anticipates and understands the risks and threats that exist for WellPoint, where he is director of corporate security. 

 

How did you get into the security industry?

I’ve worked in all facets of the security industry, ranging from law enforcement as a police officer, to the U.S. Government, to the security departments at Fortune 100 companies. I enjoy both the strategic and tactical aspects of security and the fact that no two days are the same. Throughout my career, I’ve enhanced my skill set by gaining valuable experience in many security environments. All of my work experience has contributed to my leadership style. Before I joined the corporate sector, I worked for the U.S. Department of State Bureau of Diplomatic Security. The skill sets necessary for that job are very similar to what you need in corporate security, such as understanding risk management and policy development and getting out in the field to do assessments to effectively chart the course for associate, physical, executive and technical security programs. In all of the program areas you evaluate risks and threats and you prioritize, which all contribute to a successful security operation.

 

What do you like about your position?

At WellPoint, we have more than 37,000 associates working at offices throughout the United States and internationally. My team is responsible for ensuring that WellPoint’s facilities remain safe for associates and visitors. But what I like the most is the people I interact with each day. When I was first considering the job, our CEO asked me why I would want to leave New York and move to Indianapolis, where WellPoint is headquartered. By that point, I had already met with several people in the organization and my answer was simple: the people. Not only are the people professional and friendly, but there was a good solid working team that existed, and they understood the value of a cohesive security organization. Beyond that, I enjoy the opportunity to further develop the security team. Challenges are what keep a person engaged and enthused about a job. We’ve been able to build a sophisticated model that looks at both intelligence and risk, which drives all of our actions. We’re focused on anticipating and understanding the risks and threats that exist for the company, and putting strategic and tactical solutions in place to appropriately address them.

 

What are the elements of your leadership style that help make you successful?

My leadership abilities have definitely been enhanced by networking. I enjoy the opportunity to talk with business colleagues inside and outside the security industry about how they resolve challenges and develop solutions. I also think my success as a leader comes from connecting with people and that means having face-to-face conversations or conversations on the telephone rather than relying on email. Technology is an integral component of our jobs, but being able to talk to my team and our leaders is crucial.   From a team perspective, I think it’s important to have mutual respect with members of the team and understand the requirements, responsibilities, and capabilities of each team member so I can be responsive and provide the necessary direction to help them achieve the best results. Paying attention to detail is necessary for this job, but at a company our size, you have to entrust and empower your team to make decisions on their own. Open communication and understanding are essential in being an effective leader and having a top-notch team.

 

Who in your organization do you respect and take time to interact with and why?

John Cannon – our executive vice president and general counsel. He happens to be my boss, but that’s not why I named him. Upon my arrival at WellPoint and prior to working for John, I recognized him as strong leader who lead by example and showed compassion for our associates and understood the need to identify security risks and develop mitigation plans. It is John’s understanding of our associates, their opinions and his command of the issues that face our business that provide me with insight that I attempt to model and instill in my team. 

 

What’s a typical day like for you? How do you start and end your day?

The only thing typical about my schedule is four days a week I start with a cardio workout. After that, no two days are the same, but my work day normally starts with reviewing an intelligence briefing, so I can get an understanding of any risks. Then, it is on to the regular calls with staff and colleagues about budgets, strategic plans, significant incidents that have occurred and normal course of business meetings; and usually ends with reviewing or completing emails.

 

What do you like to do in your spare time?

My job definitely keeps me busy, but our company is one that encourages a healthy work/life balance. I enjoy traveling and being near the water – whether it’s for a walk, or a ride on a boat. I also enjoy cooking, but some people may consider me a foodie for my love of dining out and trying new restaurants. Having lived and traveled throughout the world, there are a lot of great places and cuisine! Don’t tell my mom, but I still don’t eat my veggies!  

KEYWORDS: Eric Levine security career

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • inge huijbrechts

    Leading at the Crossroads of Sustainability and Security Risk: A Discussion with Inge Huijbrechts

    See More
  • Video at the Convergence Crossroads

    See More
  • road signs

    Third-party risk management programs at a crossroads

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing