Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

2012 Security 500 Leader Profiles

November 1, 2012

Mark FarrellMark Farrell, Chief Security Officer

 

The Ambassador

 

Several busy andeventful days had just concluded for Mark Farrell, CSO at Comcast Corporation. The Montgomery County Pennsylvania District Attorney’s Office had just released the news that a major fraud investigation had resulted in the arrest of six people, including the alleged ringleader, and that arrest warrants had been issued for 17 other individuals believed to have served as agents in a scam to provide unauthorized, discounted cable services to thousands of Comcast customers in exchange for a one-time cash payment. 

“During an audit, Comcast had discovered some unusual promotional adjustments that raised concerns and one of the alleged agents unknowingly actually tried to solicit one of our employees who reported it to us,” says Farrell. “In conjunction with our internal investigation, we worked with the DA’s office and this turned out to be a great example of public/private cooperation to investigate, collect evidence and get to the bottom of the fraud.”

This is just one recent example of Comcast Security’s business-focused organization. “The company is decentralized, so we have different teams that report into my office. Comcast is one of the world’s leading media and technology companies, and we work to address the critical issues each of its businesses face through a consistent set of policies and processes,” explains Farrell.

Farrell and his team oversee systems to protect the company’s employees so they are able to do their jobs in a safe environment.

For example, Comcast recently acquired NBCUniversal, which owns and operates entertainment and news cable networks, the NBC and Telemundo broadcast networks, local television station groups, television production operations, a major motion picture company and theme parks. Farrell works closely with their security leadership to standardize policy, oversight and investigations and to align programs and move toward a single measurement tool, such as the use of an incident tracking program.

“Our critical issues are to protect people, assets and processes. The best way to accomplish that is through gap analysis to identify vulnerabilities and work our processes to eliminate gaps. This enables our employees to be secure and the business to successfully create and deliver products and services to our customers,” says Farrell. “We use a lot of metrics to show value, such as our investigations/tracking tool. It has been so successful that we now use it in other departments to help with benchmarking and gap analysis across the company.”

“Our value proposition is as an independent, reliable group that conducts quality investigations the company can depend upon. We uncover gaps and risks and assist to mitigate them. We create value by getting in front of risk,” he shares.

Examples of Security’s positive impact include travel and investigations. Security supports employee travel with experience and expertise in documentation, go/no go hotels and areas and cultural protocol. Similarly, investigations are centralized across the organization so similarities and patterns in losses are recognized and gaps can be addressed more quickly.

“Our two key metrics are the safety and security of our people and the identification and elimination of risks,” says Farrell. “Security is expected to be constantly and consistently available, so we are thoughtful regarding the processes we implement and that we assist senior management with unexpected issues.”

“Every CEO should insist that Security is integrated into every part of the business. Security is every employee’s responsibility, and our employee who reported the fraud scheme is an outstanding example of that,” he says.

Another example of cooperation and business alignment can be found in the lobby of the Comcast Center. Brian L. Roberts, Comcast Chairman and CEO, wanted the guests to receive the same welcome they would when walking into a four star hotel. Farrell’s can-do attitude kicked in and the Ambassador program was born. He recruited graduates with hospitality degrees and interests. In addition to their “uniforms” being suits from a leading clothier, they were trained in security, emergency preparedness and safety. The program is a great success for the brand and the bottom line (read ‘article name’ on securitymagazine.com for more details).

“Comcast is a dynamic and progressive company, which makes coming to work a great pleasure. I love the opportunity to solve problems in this highly ethical and respectful culture,” he says.

A father of three children and grandfather of three, he is an avid skier and boater. He also has a passion for home remodeling. Prior to joining Comcast in 2006, he worked at the Delaware North Companies for 15 years. Prior to his time at Delaware North, Farrell spent 18 years in law enforcement, including eight years with the United States Secret Service.

If Farrell were not a CSO, he would work with Habitat for Humanity building homes or assist senior citizens who are not able to fix their own homes.

 

Security Scorecard

•           Revenue/Budget: $50,000,000,000

•           Security Budget: $15,000,000

•           Critical Issues:

            - Internal and External Fraud

            - Internet Fraud and Other IT Issues

            - Moving from Decentralized to Centralized

 

Security Mission

•           Asset Protection/Loss Prevention

•           Brand/Product Protection

•           Corporate Security

•           Emergency Management/Crisis Management

•           Investigations

•           Physical Security/Facilities

•           Workforce/Executive/Personnel Protection

KEYWORDS: security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Previous 1 2 3 4 5 6 7 8 9 … 14 15 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security 500 Trends: Thanks for Nothing

    See More
  • 2012 Security 500 Rankings

    See More
  • 2012 Security 500 Report: Earning Your Stripes

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing