Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Eleven Areas for Improvement

By Bob Hayes, Kathleen Kotwica Ph.D.
Bob Hayes and Kathleen Kotwica
October 1, 2011

In our July column, we discussed the dangerous gap in the transfer of knowledge between visionary security leaders and the next generation of leaders who will have to take up the mantle after them. Then in August, we laid out a roadmap for a new type of training that would help to close that gap. But what topics do up-and-coming leaders need to know more about?

For six years, the Security Executive Council has worked with top-tier security leaders to develop research, track industry trends and solve problems. In the course of this work, these Tier 1 Security Leaders have shared with us their thoughts on the skills that are lacking in the deputies and other potential leaders they are grooming. Most often they are concerned with the lack of strategic thinking and planning skills in these individuals. This shouldn’t be surprising; many deputies have to work 10 hours every day on critical operational issues and have little time to devote to strategy.

We’ve identified 11 key strategic areas in which Tier 1 Security Leaders would like to see their direct reports take on.

     • Aligning Board-Level Risk and Business Unit Mitigation Strategy.The next generation of leadership will need to know how to line up their programs with the risk categories most important to the Board. 

   • Communicating Hazards and Risks, Mitigation and Performance Metrics.Management and board members make critical decisions based on a host of spreadsheets, graphs and trend lines. Effective, actionable risk management requires disciplined analysis. Security leaders who want to show their business-based contribution to the organization must know how to a) understand the data they’re collecting to identify risks, and b) use that data to tell a compelling story of performance and value to the organization.

   • Influencing Community Preparedness and Resilience for Emerging Global Risks.Catastrophic manmade and natural risks will continue to threaten organizations and communities, making crisis and continuity management ever important. Security leaders need to be versed on the latest global requirements for preparedness compliance, and they must take steps to create community alliances to help build resilience and protect brand.

   • Managing Information Protection, Breaches and Situational Intelligence. Brand stakeholders require confidence. Information ranging from intellectual property assets to personal identifiers must be protected from persistent physical and cyber threats. The next generation of security leaders needs to know how to roadmap protection architecture and how to manage information crises at the speed of the Internet.

   • Adding Business Value with Mission Assurance and Profit & Loss Performance.The successful security leader of tomorrow must understand both how to add value and how to show it. Security leaders need to demonstrate security’s revenue influence and cost avoidance in return-on-investment calculations and operating statement results. 

   • Researching Next Generation Organizations, Programs and Leadership Style.Security leaders who understand their organization, its employees and their own leadership development are in a strong position to accurately benchmark and gauge program success. They must learn the steps to evaluate themselves and their organizations against industry research to inform their role and corporate readiness.

   • Governing Compliance and Social Responsibility for Brand Equity.The connection between ethical performance – including compliance and community care – and market performance is increasingly relevant. How can security leaders play a role in stronger ethical performance?

   • Conducting Assignment, Contract, Hire, Incident and Transaction Diligence.With estimated global fraud exceeding $2.6 trillion (ACFE) and identity theft at epidemic levels, organizations need multi-factor authentication of persons, cargo, conveyances and information. Errors, omissions and fraud are increasingly discoverable with well integrated and layered security solutions that will likely be required by evolving compliance.

   • Transferring Risk Mitigation Competence.Risk mitigation has become increasingly cross-functional; it’s important for security leaders to know how to identify, develop and retain talent all levels for sustainable results. Ongoing risk assessments must be included in project and program management along with continuous education and training.

   • Building Strategic Brand Alliances and Community.Public and private community partnerships with clients, governmental agencies, peer organizations and trade associations can augment the in-house resources. Security leaders need to know how to build these partnerships and to sustain them for the greatest benefit to all.

   • Applying Proven Practices and Solution Innovations. Innovative solutions can lend confidence to common risk situation management? Solution evaluation should include pilots that allow for the measurement of cost savings, loss avoidance and opportunity improvements. Proven solutions should optimize core organizational processes and outcomes.

Do you agree that these 11 topics are the areas the next generation needs a firm grasp on? Do you think other issues are more important than these? Contact us at contact@secleader.com to tell us about it.   

KEYWORDS: added-value security security knowledge transfer security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob hayes1

 Bob Hayes is managing director of the Security Executive Council. He has more than 25 years of experience in security, including eight years as the CSO at Georgia Pacific and nine years as security operations manager at 3M.  

Karen kotwica
Kathleen Kotwica, Ph.D., is EVP and chief knowledge strategist for the Security Executive Council (SEC). She develops strategies and processes to identify, store, understand, build upon, and disseminate the Council’s Collective Knowledge™ and insights.. To learn about becoming involved, or to offer comments or questions about Next Generation Security leadership, e-mail contact@secleader.com or visit https://www.securityexecutivecouncil.com/sm.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Bob Hayes and Kathleen Kotwica

    Benchmarks Aren’t Magic, They’re Tools

    See More
  • Global competition chart

    How Business and Risk Drivers Impact Mitigation Strategy

    See More
  • Bob Hayes and Kathleen Kotwica

    Security’s 2012 Accomplishments and 2013 To-Do List

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products

Events

View AllSubmit An Event
  • May 14, 2012

    Effective Risk Communication: Theory, Tools, and Practical Skills for Communicating about Risk

    Stay ahead of the curve by attending this in-depth program, featuring the latest scientific findings on risk perception, case studies from around the world, a suite of practical tools, and hands-on skill training.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing