Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Talk Column

Outside the Comfort Zone

Get to know Dennis Treece, Director of Corporate Security for the Massachusetts Port Authority. Whom in his organization does he take the time to interact with, and why?

By Diane Ritchey
Diane Ritchey
June 1, 2012
Dennis Treece

How did your career in security begin? Why did you decide upon this profession? 

It’s a question that I ask people who I mentor. In my case, the Army decided it for me. When I entered the Army at the end of Vietnam War, I moved from infantry to intelligence, and much of my duties involved security. During my 30 year career in the Army, I had many opportunities to get involved in security. During my last assignment, I was the IT security official for all U.S. army Internet connected networks in Europe. So I became one of those rare people with experience in both Physical and IT security. After the Army I worked in Atlanta for a company that managed firewalls and watched cyber attacks in real time against banks and insurance companies. Then after 9/11 I got a phone call from Massport, and I’ve been here ever since. Fundamentally, though, security principles are the same, regardless where you apply them.  

 

With your background, do you tend to gravitate towards IT security?

Well, most of what I deal with is physical, but there are plenty of issues with IT security too. Fortunately our small privately addressed networks are very well protected, so I don’t need to spend a lot of time on cyber.

 

What will be your greatest challenge this year in your role? 

The biggest challenge is keeping people motivated. It’s been 10 years since 9/11, and it’s always a challenge to make people stay aware and stay focused. It’s a leadership issue. We work on that here by mandatory training and with a daily operations and security meeting to discuss the security issues for the day. Security functions within the context of airport and seaport operations in this organization, so it’s an opportunity each morning to tie operations and security together. And every six months we reward people who have stepped outside of their comfort zone and brought something to the attention of law enforcement. There’s plenty of negative reinforcement out there, but it’s always nice to recognize those who go the extra mile. Hopefully, we won’t have another motivation like 9/11.

 

Whom in your organization do you take the time to interact with, and why?

I spent most of my time talking to the CEO and senior staff, because I’m the policy guy and the risk manager, so my focus at my level is with the senior team. We serve the public so I also work with a long list of corporate security leaders whose firms use our facilities.  I also don’t like reinventing wheels, so I work with security chiefs around the country. Although most airports are different, often what works here in some ways will be applicable. We also have an active security test bed, and we’ve looked at more than 100 technologies since 9/11. I work closely with the intellectual community here and with high-tech research efforts in the Boston area.

  

What qualities do you have that you believe make you a leader?   

I guess it helps that I was a leader in the Army for 30 years and that I teach part time about leadership at Northeastern University. I think that I’m decisive, I have a lot of experience and I really care about my decisions balancing the business needs here with our security needs. We are in the transportation business with security issues, not the other way around. This makes me mindful of our passengers and shippers: they expect our terminals to be safe and secure when they are here. I often remark that the best thing I can do for our passengers is that they don’t even remember our facility. After all, we aren’t their destination; we are just a speed bump on their way to visit grandma. I think a good security program should be quietly but effectively running in the background and not getting too much in their way. I’m not a micro manager; I give broad guidance and direction, but I’m focused on making sure people have the ability and the confidence to make their own decisions.

 

What keeps you up at night?

There is always the nagging thought that maybe we haven’t done everything that we can do to mitigate security events that can adversely impact our business, customers and our employees. I ask myself: are our emergency responders well equipped, do I have surveillance cameras in the right places, are our IT networks adequately protected, do we all know who to call in an emergency, are the emergency plans up to date, have we done everything we possibly could have done?

 

What do you like to do in your free time?  

Who said I had any free time? I live in a large 120-year-old Victorian, so home maintenance is always on my agenda. I also have a formal garden; I like to play golf and to travel.  

KEYWORDS: cyber security cybercrime security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Talk Default

    The New CISO: How the Role Has Changed

    See More
  • Hackers Test Out Jackpotting Scheme for ATM Fraud - Security Magazine

    Hitting the Jackpot at the ATM

    See More
  • Amalgamated Security Services Limited - Security Magazine

    Announcing the Winners of the Bill Zalud Memorial Award for Professional Excellence

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing