Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Top Lessons Learned from the Security 500 Conference

By Mark McCourt
March 1, 2013

From the highest technology solutions against cyber crime, to the low-technology sandbags that saved $4 billion of Goldman Sachs’ New York City and Jersey City buildings against Superstorm Sandy, to the far-reaching and thought-provoking keynote presentation by Roland Cloutier, Vice President & Chief Security Officer of ADP, the Security 500 Conference gathered security’s thought leaders for a day of provoking and valuable networking.

Victimized by Superstorm Sandy itself in November and rescheduled to February 12, it is no surprise that the first panel focused on business resilience and lessons learned from Sandy. At the heart of successful resilience programs was strong communication with employees and stakeholders, redundancy against failures and moving into action well before the storm arrived. Panelists Ken Damstrom of Goldman Sachs, Daniel Holmes of Honeywell and Ed Goetz of Exelon shared their biggest lessons from the experience, especially the underestimation of the effect the storm would have on their employees’ families and homes, making the employees unavailable or unable to come to work as scheduled. As a result, resiliency plans have already been updated to include the housing and support of family members.

Security Associate Editor Claire Meyer moderated the panel Transcending Security: Empowering Your Business, that shared how successful leaders work with their executive peers to align with organizational goals. Russ Cancilla of Baker Hughes, Tim Janes of Capital One and Dennis Treece of the Massachusetts Port Authority shared the interesting notion that they do not talk to their executives about security. Rather, they listen. Talking security lowers the discussion the same way an HR executive discussing mundane HR policies would. Business leaders want to discuss their agenda and gain buy-in and support for success. By focusing on their internal customer’s goals, they earn the credibility and respect necessary to manage risk and security effectively. Avoid using law enforcement metrics such as fraud, theft or arrests – those paint you as a security person, not a business person.

Everyone learned a “new word,” so to speak, during the 3rd Party Oversight: Securing Procurement panel that was moderated by Brad Brekke of Target. After payroll, the next largest outflow of cash for an organization is procurement or purchasing, which is primarily based on trust and technology. The research on bidding vendors, their ownership and the delivery of goods and services is often done without best practices for oversight and risk management. Business leaders Bill Anderson of Ryder, Kevin Donovan of Johnson and Johnson and James Murphy of Kimberly Clark discussed their organization’s oversight programs.

Key learnings included the risk that if a vendor is doing something illegal or inappropriate, it will come back to the company creating brand, legal and financial issues. Another risk is allowing third parties too much access to information. Enforcement and auditing is critical to ensure compliance of legal, regulatory and company standards. The biggest creator of procurement risk is outsourcing. “Trust but verify” is key to a successful, global oversight program.

The cyber crime panel, Time to Play Offense!, was moderated by Lynn Mattice of Mattice and Associates. The initial question asked was why the federal government was not more helpful with threat information. Steven Chabinsky, Former Deputy Assistant Director for the Federal Bureau of Investigation, Cyber Division, explained that while the government shared some information on vulnerabilities in private sector systems, sharing more was not the answer to the problem. The two types of threat actors include those seeking an opportunity to steal and those targeting a specific private organization that has something unique that they want. The latter is the most difficult to prevent. Chabinsky summarized that the government is making it worse because they are simply not going after the bad guys but just telling businesses about them.

Mattice was joined by panelists Marene Alison of Johnson and Johnson, Paul Poh of Fiserv and Ed Goetz of Exelon. The discussion focused on a number of key issues facing organizations that make them vulnerable, including basic issues such as outsourcing of IT, giving external organizations access to your systems and allowing vendors onto your network in a manner that can bring infections.

The summary is that government has the legal ability to take action but is not doing so. Businesses have the technical ability to take action but are legally bound from doing so. Offense and action are necessary, though, because it is not an “if,” but a “when” your organization will face a broad range of cyber intrusion.

Roland Cloutier, CSO & VP of ADP spoke at the dinner about the security’s future moving from silos to a single, holistic organization that does not align with the business, but is within the business. By integrating risk and security processes within business operations through intelligent ecosystems that identify and manage threats, organizations will mitigate threats by eliminating vulnerabilities in real-time, thereby securing the business.   

Special thanks to the Security Industry Association for its support to produce the event. And thanks to our attendees, speakers and sponsors that participated in the program. Information about the May 16th event in Palo Alto will be forthcoming.  

KEYWORDS: C-suite involvement Hurricane Sandy Security 500 Conference third-party security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Thought bubbles

    Lessons from the Security 500 Conference: The good, the bad, and the ugly

    See More
  • Leadership panel SEC 500

    Security leaders talk lessons learned in SECURITY 500 Conference panel

    See More
  • Lessons Learned from Security 500 Palo Alto

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • January 30, 2025

    Iconic and Secure: Security Lessons Learned at Georgetown University

    ON DEMAND: Georgetown University, a major international research university with nine schools, an affiliated hospital, and many highly-ranked academic programs, has a mature, layered security program.
  • November 9, 2010

    The Security 500 Conference

    The Security 500 Conference is the industry's break through conference focusing on the business impact of security leaders. The Security 500 brings together security leaders from leading organizations.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing