Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

2012 Security 500 Leader Profiles

November 1, 2012

Jeff HaukJeff Hauk, Chief Security Officer & Emergency Response Coordinator

 

The Big Freeze

 

“It was the big freeze in 2011, actually,” says Jeff Hauk, Chief Security Officer and Emergency Response Coordinator for The El Paso Water Utilities (EPWU). “It sent shock waves across the city about water being available and the resilience of the city water utility against all threats, including weather. Pipes on private property burst and homes and businesses flooded. The freeze froze wells and damaged pump stations and our infrastructure. The electric utility required rolling blackouts, which contributed to equipment failures and challenges for the El Paso Water Utilities to continue providing service.”

Thus, Hauk was hired to create a comprehensive enterprise risk plan for security and emergency preparedness at EPWU. “Currently, the ‘security’ function is in its infancy stage of development. I was hired on in April of this year to formally develop a master security and emergency preparedness plan and exercise schedule that would lead the future growth and development of the department,” explains Hauk.

The El Paso Water Utilities serves more than 800,000 people in the El Paso region with a constant 15-percent annual growth and forecast of more than 1.5 million residents by 2060.

As a result, Hauk’s scope of work is quite broad. “My goal is to present and gain approval of the security risk and emergency preparedness master plan. It includes the strategic consolidation of multiple approaches to security into one global unit. Core to this plan is the infusion of a formal Risk Management Initiative, which establishes a risk and compliance culture for our organization.”

“Like the weather, water utilities are rather unique,” says Hauk. “Unlike the electrical utilities, the water utilities’ security and preparedness measures are not federally regulated, nor do they have mandatory program requirements and standards to achieve and maintain. In reference to security and emergency preparedness, the guidelines provided by the industry are voluntary. I find it to be somewhat ironic since we can all live without electricity, but we cannot live without water.” 

As a business leader in the organization, his main goal is to assist in providing uninterrupted service to EPWU customers, while maintaining the positive brand image of the organization. A utility must have clearly defined protective goals that will support, not impede, daily operations. “The challenge is to raise overall security and risk management without it becoming a barrier,” explains Hauk. Operationally, his initial focus has been the in depth evaluation of the facilities, planning and operations to assess the “as is” state of preparedness, primarily focusing on physical security and emergency response. Strategically, his focus is on program development, revising and creating policies and plans, maximizing current systems capabilities, planning for upgrades to technology and implementation of best industry practices and standards.

As a result, security’s business contribution is business efficiency and resilience.  “Our primary role is to help enable our business units and plants to operate effectively, efficiently, and without significant interruption. The key to our success is as a business partner, responding in a way that the business units can understand,” shares Hauk. “Ultimately, it is the uninterrupted services we provide customers that will create measurable value.”

Beyond weather, cyber security is an area of focus. “We are starting to address it on the SCADA side of operations. I am working closely with the IT and Instrumentation and Controls groups to implement best practices and policies, when it comes to security of the systems. EPWU is also fortunate because the University of Texas-El Paso is home to the Regional Cyber and Energy Security (RCES) center. We have expertise from the department of energy, private industry and academia, locally,” says Hauk.

Hauk has joined an organization with both significant need and expectations from the C-suite and community. “They have a high level of confidence and understanding in security’s value and ability to support business goals,” he says. “Our Board, President and Executives all understand that an industry leading ‘security’ program will help prepare for, and addresses, the overall operational risks our organization faces.”

“Every CEO should expect their security organization to deliver value and provide subject matter expertise. They should understand focusing resources on establishing an industry leading security risk management program that will provide an exponential return,” explains Hauk.

While he is facing big challenges and higher expectations, Hauk truly enjoys this opportunity. “The best part of my job is collaborating with others to reach mutually beneficial solutions that support protective and operational efficiencies, as well as being tasked with the responsibility of building an industry leading security risk program. Most of all I enjoy the responsibility of creating and maintaining a safe and secure environment for others to work,” he says.

Outside of work, Hauk enjoys spending as much quality time with his wife and three boys. In addition to traveling and outdoor activities, they are avid Michigan State University and Detroit Lions football fans.

 

Security Scorecard

•           Revenue/Budget: $276,042,000

•           Security Budget: $567,712

•           Critical Issues:

            - Cyber Security

            - Implementing New Technology and Best Practices

            -  Changing the Organizational Culture as it  Relates to Implementing an Enterprise Security Risk Management Program

 

Security Mission

•           Asset Protection/Loss Prevention

•           Brand/Product Protection

•           Business Continuity

•           Corporate Security

•           Cyber Security/IT Security

•           Disaster Recovery

•           Emergency Management/Crisis Management,

•           Intellectual Property

•           Investigations

•           Physical Security/Facilities

•           Risk Management

•           Workforce/Executive/Personnel Protection

KEYWORDS: security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Previous 1 2 … 5 6 7 8 9 10 11 12 13 14 15 Next
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security 500 Trends: Thanks for Nothing

    See More
  • 2012 Security 500 Rankings

    See More
  • 2012 Security 500 Report: Earning Your Stripes

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing