Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Harnessing the Brain for Security’s Good

By Bill Zalud
April 1, 2012
Don’t be afraid.

This is all about habits. And it is a twin spin from an MIT lab and a self-help professor at Utah State University, a seemingly deadly combination, but which may hold the key to how to sell security to the boss and employees, how to balance values and principals professionally and personally as well as how to sell Febreze at Walmart, if you want.

The MIT neuroscientist, Ann Graybiel, says she and her colleagues began exploring habits more than a decade ago by putting rats into a maze with chocolate at one end. Graybiel continues to study the basal ganglia, forebrain structures that are profoundly important for normal brain function and also linked to Parkinson’s disease, Huntington’s disease, obsessive-compulsive disorder and addiction. Her work is uncovering neural deficits related to these disorders as well as the role the basal ganglia play in guiding normal behavior.

 

Cue, Routine, Reward

The bottom line: the process within our brains that creates habits is a three-step loop. First, there is a cue, a trigger that tells the brain to go into automatic mode and which habit to use. Then there is the routine, which can be physical or mental or emotional. Finally, there is a reward, which helps the brain figure out if a particular loop is worth remembering for the future. Over time, loops – cue, routine, reward; cue, routine, reward – become more automatic.

No doubt, habits aren’t destiny.

But, when selling security plans to the boss or to employees, cue, reward, routine can make a difference.

What’s happening in businesses and sports can be replicated for enterprise security leaders.

For example, many major retailers, from grocery chains to investment banks to the U.S. Postal Service, have what they may call a “predictive analytics” department devoted to understanding not just consumers’ shopping habits but also their personal habits, so as to more efficiently market to them.

Tony Dungy, the football coach, reinvented one of the least performing teams in the NFL to the Super Bowl by focusing on how his players habitually reacted to on-field cues. Before he was named U.S. Treasury secretary, Paul O’Neill overhauled a troubled conglomerate, Alcoa, and turned it into a top performer by fine focusing on one habit – worker safety – which in turn led to companywide transformation.

Then there was Febreze, the odor eliminator from Procter and Gamble. It was originally a failure when first introduced. The product’s cue – the bad smells that were supposed to trigger daily use – was hidden from the people who needed it the most. And Febreze’s reward, an odorless home, was meaningless to someone who couldn’t smell offensive scents in the first place. After much analysis, P&G discovered that it was using the wrong cues and routines to lead to the reward. They adjusted from smelly homes and Febreze has turned out to be the best selling P&G brand.

 

Making Things Automatic

Habits are sequences of behavior that are learned to the point where they become automatic. Many everyday motor actions become habitual through repetition, but we also develop habits of thought and emotion.

Which gets us back to security.

Enterprise security leaders who focus on those cues, routines and rewards when it comes to getting employees to be a real part of the security effort can pay off. The same strategy can also work with the boss, too.

Habits can also be elements of values and principals.

Dr. Stephen Richards Covey from Utah State University has a new book, “The 8th Habit: From Effectiveness to Greatness,” Covey argues against what he calls “The Personality Ethic,” something he sees as prevalent in many modern self-help programs. He instead promotes what he labels “The Character Ethic,” aligning one’s values with so-called “universal and timeless” principles. Covey adamantly refuses to conflate principles and values; he sees principles as external natural laws, while values remain internal and subjective. Covey proclaims that values govern people’s behavior, but principles ultimately determine the consequences. Covey presents his teachings in a series of habits, manifesting as a progression from dependence via independence to interdependence.

Which also gets us back to security. Programs for employees work best when emphasizing on principals. People already have instilled their own values for better or worse. It is also valuable for security executives to understand, appreciate and follow the principals of the enterprise – the corporate culture, so to speak, as set by the chief executive officer and the history of the organization.

KEYWORDS: external natural law rewards routines security analytics security ethics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Code

Security Leaders Discuss the Marquis Data Breach

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Thought bubbles

    Lessons from the Security 500 Conference: The good, the bad, and the ugly

    See More
  • Zero-trust-freepik

    Good-bye, trust-based security – WFH may usher in the age of zero trust

    See More
  • Guy Grace

    Retrofit Fits the Bill for Outdated Security Technology

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing