Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Harnessing the Brain for Security’s Good

By Bill Zalud
Dr. Stephen Richards Covey
Values are values which impact behavior but principals determine what finally happens, says Dr. Stephen Richards Covey of Utah State University.
Ann Graybiel
Enterprise security executives can gain by understanding habits that include cues, routines and rewards as highlighted by MIT neuroscientist Ann Graybiel.
Dr. Stephen Richards Covey
Ann Graybiel
April 1, 2012
Don’t be afraid.

This is all about habits. And it is a twin spin from an MIT lab and a self-help professor at Utah State University, a seemingly deadly combination, but which may hold the key to how to sell security to the boss and employees, how to balance values and principals professionally and personally as well as how to sell Febreze at Walmart, if you want.

The MIT neuroscientist, Ann Graybiel, says she and her colleagues began exploring habits more than a decade ago by putting rats into a maze with chocolate at one end. Graybiel continues to study the basal ganglia, forebrain structures that are profoundly important for normal brain function and also linked to Parkinson’s disease, Huntington’s disease, obsessive-compulsive disorder and addiction. Her work is uncovering neural deficits related to these disorders as well as the role the basal ganglia play in guiding normal behavior.

 

Cue, Routine, Reward

The bottom line: the process within our brains that creates habits is a three-step loop. First, there is a cue, a trigger that tells the brain to go into automatic mode and which habit to use. Then there is the routine, which can be physical or mental or emotional. Finally, there is a reward, which helps the brain figure out if a particular loop is worth remembering for the future. Over time, loops – cue, routine, reward; cue, routine, reward – become more automatic.

No doubt, habits aren’t destiny.

But, when selling security plans to the boss or to employees, cue, reward, routine can make a difference.

What’s happening in businesses and sports can be replicated for enterprise security leaders.

For example, many major retailers, from grocery chains to investment banks to the U.S. Postal Service, have what they may call a “predictive analytics” department devoted to understanding not just consumers’ shopping habits but also their personal habits, so as to more efficiently market to them.

Tony Dungy, the football coach, reinvented one of the least performing teams in the NFL to the Super Bowl by focusing on how his players habitually reacted to on-field cues. Before he was named U.S. Treasury secretary, Paul O’Neill overhauled a troubled conglomerate, Alcoa, and turned it into a top performer by fine focusing on one habit – worker safety – which in turn led to companywide transformation.

Then there was Febreze, the odor eliminator from Procter and Gamble. It was originally a failure when first introduced. The product’s cue – the bad smells that were supposed to trigger daily use – was hidden from the people who needed it the most. And Febreze’s reward, an odorless home, was meaningless to someone who couldn’t smell offensive scents in the first place. After much analysis, P&G discovered that it was using the wrong cues and routines to lead to the reward. They adjusted from smelly homes and Febreze has turned out to be the best selling P&G brand.

 

Making Things Automatic

Habits are sequences of behavior that are learned to the point where they become automatic. Many everyday motor actions become habitual through repetition, but we also develop habits of thought and emotion.

Which gets us back to security.

Enterprise security leaders who focus on those cues, routines and rewards when it comes to getting employees to be a real part of the security effort can pay off. The same strategy can also work with the boss, too.

Habits can also be elements of values and principals.

Dr. Stephen Richards Covey from Utah State University has a new book, “The 8th Habit: From Effectiveness to Greatness,” Covey argues against what he calls “The Personality Ethic,” something he sees as prevalent in many modern self-help programs. He instead promotes what he labels “The Character Ethic,” aligning one’s values with so-called “universal and timeless” principles. Covey adamantly refuses to conflate principles and values; he sees principles as external natural laws, while values remain internal and subjective. Covey proclaims that values govern people’s behavior, but principles ultimately determine the consequences. Covey presents his teachings in a series of habits, manifesting as a progression from dependence via independence to interdependence.

Which also gets us back to security. Programs for employees work best when emphasizing on principals. People already have instilled their own values for better or worse. It is also valuable for security executives to understand, appreciate and follow the principals of the enterprise – the corporate culture, so to speak, as set by the chief executive officer and the history of the organization.

KEYWORDS: external natural law rewards routines security analytics security ethics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Thought bubbles

    Lessons from the Security 500 Conference: The good, the bad, and the ugly

    See More
  • Zero-trust-freepik

    Good-bye, trust-based security – WFH may usher in the age of zero trust

    See More
  • Guy Grace

    Retrofit Fits the Bill for Outdated Security Technology

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing