Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Leadership & ManagementSecurity Leadership and Management

Risk at High Velocity

By Marleah Blades
February 1, 2012

In last month’s column, we argued that the next generation of security leaders will be challenged more than previous leaders to run their function as a business; they will be expected to align with the organization and build value through security. As they work toward these goals, they will also be faced with new risks, some of which have the potential to escalate at a stunning pace.

For example, communication on the Internet has been a boon to business, but it has created an online environment that can be dangerous to corporate reputations. Consumers, employees and often partners habitually share opinions and information through social media and viral posts to popular sites, which can turn a single person’s comment one day into a media firestorm the next.

At the time of this writing, news has recently broken that actor Alec Baldwin was kicked off an American Airlines flight for reportedly verbally abusing the flight crew after refusing to turn off his phone when asked. It’s interesting to note that within 30 minutes of Baldwin’s first notorious tweet about the incident, AA had tweeted a response stating they were looking into the incident, and within 24 hours their Facebook page had been updated with a refutation of Baldwin’s version of the events and a defense of AA’s actions. The book is still open on the incident, but at the moment it looks like Baldwin may have come out the worse in this fight. Not all companies are able to deflect socially driven bad press in the same way. The damage that harmful YouTube videos, tweets, or Facebook comments can do to an organization’s stock price can add up to millions of dollars in brand equity, and how these incidents are handled can either minimize or maximize that damage.

Of course, it will not do to focus on newer threats like online security while neglecting the basics. Burgeoning security leaders must remember that physical security remains critical in managing risk, and the increased value of information actually makes physical protection even more important than before in many cases. Information – intellectual property as well as private employee and customer data – is a high-dollar asset in itself. When the assets on which information resides are compromised, the damage is therefore compounded.

The healthcare industry may serve as a telling example. Privacy Rights Clearinghouse data recently showed that more publicly disclosed data breaches occur in the medical industry than in any other, and most of those are due not to hacking, but to loss or theft of portable data devices. The next generation security leader must be prepared to protect information and brand from cyber threats and physical threats to information assets.

Protecting not only information but the enterprise at large will also require a solid strategy for preparedness and resilience. “Brand confidence and loyalty are intrinsically tied to responsibility before a crisis,” says Francis D’Addario, emeritus faculty member of the Security Executive Council and former vice president of Partner and Asset Protection for Starbucks Coffee. D’Addario evangelizes for security leaders to build preparedness and crisis management capabilities by, among other things, enhancing the social responsibility initiatives of the organization. A company’s investment in social responsibility in the good times, enabled by strong security and risk management, allows the CEO to stand in front of the media and the community after a disaster and say with sincerity that the company cares about the community and is truly doing all it can to help. There is significant intangible value to that kind of sincerity, according to D’Addario.

Building local alliances and attending to global preparedness guidelines and regulations is also critical. Numerous partnerships and partnership organizations have arisen to assist individual communities in developing preparedness and response plans that leverage the resources and knowledge base of both the public and private sectors to better protect communities and the businesses that reside in them.

Threats and risks will continue to pick up speed, and the next generation of security leaders will need to be quick enough to build security functions that can match them – functions that rely on solid protection strategy as a foundation for nimble, resourceful and creative response.   

KEYWORDS: Intellectual Property online security security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Marleah Blades is senior editor for the Security Executive Council, an innovative problem-solving research and services organization. The Council works with Tier 1 Security Leaders™ to reduce risk and add to corporate profitability in the process. To learn about becoming involved, e-mail contact@secleader.com or visit www.securityexecutivecouncil.com/sm. You can also follow the Council on Facebook and Twitter.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • How Business and Risk Drivers Impact Mitigation Strategy

    See More
  • Do You Understand Risk Appetite?

    See More
  • The Titanic: Risk Management vs. Compliance

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • Risk Analysis and the Security Survey, 4th Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing