Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Will the Real CSO Please Stand Up?

By Eric Smith
October 25, 2011

 

Many large organizations are beginning to add the position of chief security officer (CSO) to the C-suite. This is great news as it highlights the benefits and importance of a well-designed security unit as a business function. However, some recent trends suggest that some organizations still may misunderstand the impact and role of security.

One tendency is to combine information technology (IT) security functions under the same umbrella as more traditional or physical security management. Just because both use the word security does not mean the same skills, experiences or knowledge are involved. A CISO (chief information security officer) faces true threats, but ones that are very different from a security management perspective. Hackers, firewalls, database protection are more the focus, compared to burglars, cameras and employee theft. A leader with extensive experience blocking cyber attacks from overseas may not have the background or expertise to plan for executive protection overseas or to conduct an internal investigation.

If you look at the ways IT security and physical security go about protecting an enterprise, you will see that the talents, know-how and abilities are very different. Both roles are focused on protection, but in very different ways. Both have grown up as separate industries, each with their own professional organizations and professional certifications. Even some terms may be similar such as risk assessments or threat analysis and again the meanings vary. 

Threat assessment for a physical security leader is the process of reviewing threats of violence against a facility or individuals as compared to an analysis of malware and hacking attempts.

As companies become more reliant on technology there is an increasing need for information security and physical/environmental security to partner together. Security software systems tied to the Internet may need to be set up in conjunction with IT to ensure that any risks of unauthorized access are minimized. At the same time, IT should not be selecting the systems based solely on what works best for the network or any applicable databases, switches, encoders etc.  IT may not understand the needs or expectations with the system by those depending on it.

A former law enforcement officer may know a lot about loss prevention, handling investigations or crime prevention, but be completely lost when it comes to SSL certificates, VPN and database encryption. On the flipside, an information system manager may be an expert with SQL databases or programming in C++, but not understand criminal law, the warning signs of violent behavior or the force continuum for security personnel.

So which background makes for the best CSO?  The answer will depend on the organization. Ideally, there should be a CISO and a CSO to work in tandem with each other and with other business units for the best level of protection.

If there is only one CSO, careful thought should be given to the job functions.  In this case, it is highly unlikely that one person will have the necessary background for all the job description. Then the real CSO should be the leader who demonstrates the ability to develop teams and cultivate enough understanding to manage both info security and physical security challenges.

Perhaps the single most important skill set is the understanding of human behavior; specifically, an in-depth understanding of the criminal mindset and its ability to exploit vulnerabilities in both the virtual and real worlds.

KEYWORDS: Chief Security Officer (CSO) security leaders security officer security organizations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Eric Smith, CPP, works for HSS, Inc. as the security director for Exempla Healthcare, a three-hospital system in the Denver, Colo. area. He is the current president of the Colorado Chapter of IAHSS. He is also the author of the security blog, Business Karate, www.businesskarate.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • 5 Ways to Handle (and Prevent) Active Shooters

    See More
  • 2015 Security Leadership Issue: Making the CSO the Next Enterprise Leader

    See More
  • O'Connell podcast news header

    The CSO’s Evolution, From the Perspective of a CSO

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing