Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Will the Real CSO Please Stand Up?

By Eric Smith
October 25, 2011

 

Many large organizations are beginning to add the position of chief security officer (CSO) to the C-suite. This is great news as it highlights the benefits and importance of a well-designed security unit as a business function. However, some recent trends suggest that some organizations still may misunderstand the impact and role of security.

One tendency is to combine information technology (IT) security functions under the same umbrella as more traditional or physical security management. Just because both use the word security does not mean the same skills, experiences or knowledge are involved. A CISO (chief information security officer) faces true threats, but ones that are very different from a security management perspective. Hackers, firewalls, database protection are more the focus, compared to burglars, cameras and employee theft. A leader with extensive experience blocking cyber attacks from overseas may not have the background or expertise to plan for executive protection overseas or to conduct an internal investigation.

If you look at the ways IT security and physical security go about protecting an enterprise, you will see that the talents, know-how and abilities are very different. Both roles are focused on protection, but in very different ways. Both have grown up as separate industries, each with their own professional organizations and professional certifications. Even some terms may be similar such as risk assessments or threat analysis and again the meanings vary. 

Threat assessment for a physical security leader is the process of reviewing threats of violence against a facility or individuals as compared to an analysis of malware and hacking attempts.

As companies become more reliant on technology there is an increasing need for information security and physical/environmental security to partner together. Security software systems tied to the Internet may need to be set up in conjunction with IT to ensure that any risks of unauthorized access are minimized. At the same time, IT should not be selecting the systems based solely on what works best for the network or any applicable databases, switches, encoders etc.  IT may not understand the needs or expectations with the system by those depending on it.

A former law enforcement officer may know a lot about loss prevention, handling investigations or crime prevention, but be completely lost when it comes to SSL certificates, VPN and database encryption. On the flipside, an information system manager may be an expert with SQL databases or programming in C++, but not understand criminal law, the warning signs of violent behavior or the force continuum for security personnel.

So which background makes for the best CSO?  The answer will depend on the organization. Ideally, there should be a CISO and a CSO to work in tandem with each other and with other business units for the best level of protection.

If there is only one CSO, careful thought should be given to the job functions.  In this case, it is highly unlikely that one person will have the necessary background for all the job description. Then the real CSO should be the leader who demonstrates the ability to develop teams and cultivate enough understanding to manage both info security and physical security challenges.

Perhaps the single most important skill set is the understanding of human behavior; specifically, an in-depth understanding of the criminal mindset and its ability to exploit vulnerabilities in both the virtual and real worlds.

KEYWORDS: Chief Security Officer (CSO) security leaders security officer security organizations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Eric Smith, CPP, works for HSS, Inc. as the security director for Exempla Healthcare, a three-hospital system in the Denver, Colo. area. He is the current president of the Colorado Chapter of IAHSS. He is also the author of the security blog, Business Karate, www.businesskarate.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 Ways to Handle (and Prevent) Active Shooters

    See More
  • 2015 Security Leadership Issue: Making the CSO the Next Enterprise Leader

    See More
  • security proadvisors

    The Security Advisor shares interviews with the CSO of Blackstone & CSO of S&P Global

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing