Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

2012 Security 500 Leader Profiles

November 1, 2012

Ed GoetzEd Goetz, Vice President, Corporate and Information Security Services, Exelon Corp.

 

Intelligence Driven

 

In March 2012,Exelon merged with Constellation Energy to become the nation’s largest competitive energy provider. The merger posed operational and transitional challenges for the integration of the two companies’ security groups. Ed Goetz, vice president, Corporate and Information Security Services at Exelon, was tasked with managing security for the new company.

Goetz’s Corporate and Information Security Services group is a converged cyber and physical security management organization with broad responsibility for preventing, detecting and responding to security incidents, regardless of the medium. The group is also responsible for assuring compliance with security-related regulations including NERC CIP, Sarbanes Oxley, the Chemical Facilities Anti-Terrorism Standards, Pipeline Security, and the Maritime Transportation Safety Act.  

“Historically, security emphasis was placed on reactive investigations of localized security events,” Goetz says. “While these incidents still occur and must be addressed, the primary focus of corporate security has shifted to proactively identifying and mitigating national and potentially international threat vectors. The greatest threat to our company and customers is the Advanced Persistent Threat. So it is more important than ever, as a security leader, that I focus on the use of cutting edge technology and fostering relationships with governmental agencies and industry groups to mitigate threats to our critical infrastructures and national interests.”

To facilitate such a broad charge, the security organization is divided into four groups including:

• Client Services, which is composed of investigators/physical security specialists and guard force management.

• Compliance Services to ensure security controls adherence, compliance program management and audit support.

• Support Services is responsible for the 24/7/365 operations center, access management, business continuity and threat and intelligence analysis.

• Information Security Services for cyber, malware and vulnerability management as well as incident monitoring and response.

For Exelon, the security of the company requires regulatory compliance.

“This growing compliance issue continues to provide challenges to all lines of business,” Goetz says. “By uniting our security and compliance programs in a synergistic effort, we have been able to close the gap between our operational efforts to secure the enterprise and our ever-evolving need to maintain compliance with regulated security standards. This will help to reduce costs associated with potential regulatory fines and improve our compliance posture.”

Exelon’s C-Suite executives understand security risk and have dedicated the necessary resources to enable Ed and his team to achieve their goals.

“They expect us to provide exemplary service and have invested to ensure we have the necessary resources,” Goetz says. “With the resources available within our security program, we have the depth and breadth required to provide an intensive focus on security threat analysis, mitigation planning and execution. My team is expected to leave no investigative avenue unaddressed or preventative solution unexplored in an effort to protect Exelon from emerging and existing threats or comply with new and existing regulations.  

 “In this day and age, security is not optional; it is an essential component and fiduciary responsibility of the corporation. Innumerable laws, pending legislation and shareholder expectations have placed the responsibility for securing the critical infrastructure, assets, people and data of the corporation. Security is security; the only difference is what you are protecting: people, property or information.”

Goetz enjoys addressing the wide range of issues he encounters on a daily basis.  The converged cyber and physical security structure ensures that each day is different. 

“The security organization touches almost every facet of the Exelon enterprise in some form or fashion, resulting in an ever-changing list of challenges to overcome, often in unique and innovative ways,” he says. “Security is everyone’s responsibility. Everyone has a role in keeping our people, property and assets safe and secure. That is the reason behind our intelligence based model: to look over the horizon, to prepare and prevent. We do not want to react to events.”

Goetz says his past professional experiences prepared him well for his current role. After a highly decorated career at the FBI, Maryland State Police and Baltimore City Police, and a secondment with the CIA, he joined Constellation Energy in 2009. “I enjoyed my work in the government and consider it an honor to have served my country,” he says. “In my new role, I leverage the things I learned in my previous career; combine them with an understanding of the issues facing Exelon, in order to put in place a comprehensive risk mitigation approach to security.”

Married with three sons, Goetz is an avid mountain biker and student of European history, and enjoys reading and conversing in German.

 

Security Scorecard

•           Revenue/Budget: $32,700,000,000

•           Security Budget: More than $30 Million

•           Critical Issues:

            – Cyber Threats

            – Regulatory Compliance

            – Hiring Employees with Cyber Security Experience

 

Security Mission

•           Asset Protection/Loss Prevention

•           Brand Protection

•           Business Continuity

•           Corporate Security

•           Cyber Security/IT Security

•           Disaster Recovery

•           Drug and Alcohol Testing

•           Emergency Management/Crisis Management

•           Intellectual Property

•           Investigations

•           Physical Security/Facilities

•           Regulatory Compliance

•           Safeguarding Shareholder Value

•           Workforce/Executive/Personnel Protection

KEYWORDS: security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security 500 Trends: Thanks for Nothing

    See More
  • 2012 Security 500 Rankings

    See More
  • 2012 Security 500 Report: Earning Your Stripes

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing