Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

The Threat Picture

By Diane Ritchey
April 1, 2012
Brian Hogan

Is a Threat Analyst a part of your team? It’s a large part of Baker Hughes, one of the world’s largest oilfield services companies, with 55,000 employees, facilities in 72 countries and operations in more than 90 countries. Brian Hogan, regional security director (Latin America) & director, strategic analysis, leads the company’s threat analysis team.

 

How did your career in security begin?

I spent 15 years in the U.S. Foreign Service with long-term assignments in Algeria, India and Iraq along with a number of domestic postings. In 2005 I joined the Department of Energy’s Lawrence Livermore National Laboratory and spent three years working mainly  on counter-terrorism and counter-proliferation issues.  In 2008 I was hired to design and develop a Threat Analysis program within the Enterprise Security and Crisis Management function of Baker Hughes.

 

How does your role as a Threat Analyst play into the success of your organization’s corporate security team?

I view the Threat Analysis function as a strategic resource. Separate and distinct from the more traditional components of a security program, Threat Analysis paints a picture of the overall operating environment and allows our security team to better focus our resources against the most credible and high-impact risks to our business. Just as important, it also allows us to have a greater influence in the decision-making process at the highest levels of our company. Threat Analysis helps us tailor a fit-for-purpose security program by collecting relevant intelligence from multiple sources, assessing it, determining the specific business impact to our company and then communicating it in the right form to the right leaders at the right time. 

 

What will be your greatest challenge this year in your role and why?

The greatest ongoing challenge always seems to be integrating Threat Analysis into the business at the strategic planning level. In my opinion, there are essentially four phases in the developmental life cycle of a Threat Analysis capability. First, introduce the business to Threat Analysis at its most fundamental level by identifying current and near-term risks to your employees and operations. This is where you develop credibility and prove yourself a differentiator from the more generic threat warnings offered by third party vendors. Second, you need to move beyond just identifying threats to also seeing opportunities. In order to demonstrate true value to the business, it’s not enough to simply identify problems. You have to be able to recognize areas of the world where your company can obtain a competitive advantage through facilitating operations in unstable environments. A risk-based and intelligence-led Threat Analysis program can help you do this. Third, transform Threat Analysis into Strategic Analysis – this is where we are now at Baker Hughes. We are formally integrating with elements of the business that have P&L responsibilities and ensuring we’re providing the type of tailored, strategic guidance necessary for them to maximize profits and minimize loss. The fourth phase is to truly fold this analytical capability into long-term strategic planning – the kind of forward-looking, make-or-break decisions which will determine the future competiveness of your company. To succeed at this level, you need to have established both a strong track record of credibility at all levels of your business and have the buy-in of the senior-most levels of your company.

    

Who in your organization do you take time to interact with and why? 

Our Vice President - Health, Safety, Environment and Security and Chief Security Officer, Russ Cancilla, has been crucial for me both in terms of supporting the evolution of our Threat Analysis capability as well as my own professional development. Coming to the private sector after 18 years in government service, I think I was initially surprised at the difference between which of my skills I thought would bring immediate value to the business and the ones which really did. Russ was an important part of guiding me through that and also giving me regular interaction with our most senior leaders. Dealing with the highest levels of our company – and also seeing how they deal with each other – has been live-fire training and also helped me to shape our analytical program to ensure maximum relevancy. Finally, I don’t think the importance of daily interaction with the business leaders you’re supporting can be overstated. I don’t mean simply a weekly or monthly conference call, but rather sitting with them on a day to day basis, understanding the issues that are keeping them awake at night and truly grasping what the security team can do to help them achieve their goals and, perhaps just as important, how and when to stay out of their way.

  

What do you like to do in your free time?

There’s not a lot of it. But, when I do get some time off, I spend as much of it as I can with my family. I enjoy golf and reading and I especially love to cook. Leave me to my own devices in a kitchen for a few hours and I’m a happy man.  

KEYWORDS: counterterrorism security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Big Picture

    See More
  • The Danger Within: Confronting the Insider Threat

    The Danger Within: Confronting the Insider Threat

    See More
  • Boeing - Dave Komendat - Security Magazine

    Mitigating the Insider Threat: Boeing's Successful Approach

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing