Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

2012 Security 500 Leader Profiles

November 1, 2012

Walt FountainWalt Fountain, Director, Enterprise Security

 

The Synchronizer


“On April 3rd,CNN showed footage of our tractor trailers being thrown through the air like toys during the tornadoes in Texas,” shares Walt Fountain, Director, Enterprise Security for Schneider International.

“Thanks to our resilience planning, that facility was back up and running within twelve hours and there were no injuries. You have to get out in front of risk and we were very pleased with our ability to be prepared, respond, and have the best outcome possible.” 

Schneider National is a 75-year-old company and the largest truckload carrier in the U.S. with more than 17,000 associates, 10,000 tractors and 31,000 trailers (well, 30,999). “Schneider serves as one of the most powerful business-building tools in the industry to our customers, and security is integrated into that vision,” explains Fountain. “My role is to synchronize and coordinate risk assessment and security processes across the worldwide organization as efficiently as possible.”

As examples, Schneider’s physical security division reports into the CAO and Fountain works closely with the corporate security manager. Similarly, he works with the IS manager within the CIO’s office to address information security risk. In addition, he integrates with Human Resources on background checks, regulatory issues and drug testing.

“Supply chain management is such a vital part of a company’s ability to manage and grow their business,” says Fountain. “A great part of my job is to develop supply chain risk assessments and show our customers how to secure shipments and avoid high risk shipping profiles. Bigger shippers build a level of expertise, but smaller shippers have to depend on us for risk management.” In some cases, Schneider National provides end-to-end supply chain services, but for most customers, they manage a part of the customer’s supply chain. “That requires us to understand risk beyond our part and extend security to other parts of their supply chain.”

There are more than 700,000 registered carriers in the U.S., and like many businesses, Schneider National battles the notion that all shipping is a commodity, especially when it comes to risk and security. “Our customers get access to robust capacity with reduced risk and increased confidence in the process. We have worked with and given information to the sales team to differentiate our brand and address customer service, quality, safety, risk management and security’s value,” explains Fountain. Security uses a full suite of metrics to track its top and bottom line contribution. The information used by the sales team is fed from this extensive metrics program.

On the other side of the risk equation is knowing the customer. “Risk tolerance must be considered so we do not accept business from companies where the risk or customer request is not good business. The issues of theft, fraud or other illegal activity must be vetted to avoid being hired by a fraudulent customer,” says Fountain. Schneider National is self-insured and very careful about from whom it accepts business.

The security team also has a worldwide focus on the protection of their employees. “Workplace violence continues to be a growing concern for businesses. We brought a team together to explore the topic and address it. The outcome was to create an environment where our people felt comfortable using resources and seeking help. Our process is proactive by controlling the relationship with a colleague to discuss expectations and business issues internally,” explains Fountain.

Whether responding to flying trailers, customer shipments or workforce protection, Fountain focuses on creating a resilient organization that identifies and mitigates risks. A challenging area for all organizations is cyber security. “Our business runs on the back of information, so information integrity and availability is paramount to the successful delivery of our services. Our company was a pioneer in ‘in cab’ communication. And through redundancy and best practices we have prevented cyber events,” he shares.

 “Our CEO expects us to be a business enabler and we have done that by tailoring our services to meet a specific customer segment that demands security,” says Fountain. Every CEO should expect security to be a business enabler that proactively focuses on business and not be just a defensive process and cost center.”

Fountain sums up the scope of his role by saying, “The best part of my job is going out and working with the customers. They understand that they have a risk issue, but they do not know how big those risks are or how to mitigate them. It is rewarding to help them find a solution that is positive for their business goals and increase the value of our company’s services.”

A marathon runner, Fountain served in Army intelligence for 24 years and joined Schneider National after retiring. Based in Green Bay, Wisc., he is a proud Packers shareholder who enjoys being home with his family.

 

Security Scorecard

•           Revenue/Budget: $3,400,000,000

•           Security Budget: Confidential

•           Critical Issues:

            - Supply Chain Security

            - Workplace Violence

            - Cyber Security

 

Security Mission

•           Asset Protection/Loss Prevention

•           Brand/Product Protection

•           Business Continuity

•           Corporate Security

•           Cyber Security/IT Security

•           Disaster Recovery

•           Emergency Management/Crisis Management

•           Intellectual Property

•            Investigations

•           Physical Security/Facilities

•           Regulatory Compliance

•           Risk Management

•           Supply Chain/Vendor

•           Workforce/Executive/Personnel Protection

KEYWORDS: security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Previous 1 2 3 4 5 6 7 8 9 10 11 … 14 15 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security 500 Trends: Thanks for Nothing

    See More
  • 2012 Security 500 Rankings

    See More
  • 2012 Security 500 Report: Earning Your Stripes

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing