Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
The Security Benchmark ReportSecurity Leadership and ManagementInfrastructure:Electric,Gas & Water

Frank Taylor: Enabling the Mission

“Leaders get recognized for their ability to mitigate problems and choose effective strategies. The same is true for security… The status quo or yesterday’s success is never good enough.”

November 5, 2013

“Security is about enabling a mission. Business leaders are able to take our tools and apply them to a variety of settings to create success. Our job is to create an environment of success for the enterprise. It is not what we do, rather, it is how we enable the enterprise to achieve its goals,” shares Frank Taylor, Vice President and Chief Security Officer for The General Electric Company. It is important to note that as you read this, one of America’s (not just security’s) greatest leaders and thinkers will have retired, again.

Frank retired earlier in his career at the rank of Brigadier General in the Air Force. He continued to serve his country as Assistant Secretary of State for Diplomatic Security and Director of the Office of Foreign Missions, with the rank of Ambassador. After 9/11 he became a key advisor to President Bush and Secretary of State Colin Powell as Ambassador at Large and Coordinator for Counterterrorism until November 2002. He joined General Electric in March 2005.

“The only job I ever applied for was to join the Air Force,” he says. “A headhunter got my resume and after three interviews at General Electric, I became their first Global CSO. For anyone migrating from law enforcement or the military to the private sector, they should expect to be uncomfortable,” coaches Frank, noting the need to become a team player, deal with new and unfamiliar issues, learn new jargon and understand and respect new processes. “But, what the military and General Electric have in common is the diversity of what they do and how they recognize and reward leadership and accountability. The company is big, exciting and dynamic, but you still feel in control because processes and procedures are in place.”

Asked how General Electric’s first global CSO got his arms around the global business and leading security, Frank shares his successful plan. First, he liked the structure at General Electric because it was diversified but simple, similar to the military. And the many businesses and geographies across the company were akin to his Air Force and State Department experiences of overseeing more than 200 detachments and more than 265 embassies and diplomatic facilities, respectively.

“First we sorted out the structure and organization to identify policies and procedures, ensuring a successful global system,” he explains. “Next we identified the key deliverables to the businesses from security. The business unit security leaders are direct reports in the business units and dotted line to global security. That enables us to set policies and procedures, conduct audits and create guidelines.”

With 70 percent of General Electric’s business outside the United States, Frank’s experience and thoughts on leadership are compelling and insightful.

“Leaders get recognized for their ability to mitigate problems and choose effective strategies. The same is true for security. Leaders see the problems coming and plan for them. They see the changes ahead and plan. They attack issues. The status quo or yesterday’s success is never good enough. Leadership is also about influencing, collaborating and sharing knowledge. People sometimes don’t realize that leadership learned in the military translates very well to the private sector. The challenge for people is translating that leadership experience into the business environment and adapting it to the mission.”

During his storied career, Frank has had many mentors. “Every boss I have worked for, in one way or another, has been a great mentor.” Of particular note he points to Major General Pierce Smith who encouraged young leaders to retain more than 200 contacts outside their core area whom they can call and seek advice or discuss issues. He still does so.

Thoughtful about what CEOs should know about security, Frank says, “That they need an entity in the organization to think about risk and security full time. We learn from every crisis and get better as a result. We have warts, yes, but we work on removing those warts every day.”

Proud of being part of a team that added great value to General Electric he points to the company’s compliance policy: We have no greater responsibility than the security of our employees noting, “Global security has created a confidence among the employees that the company is committed to their safety and security,” he says. “As a result, there is no market in the world in which the company cannot operate. The most rewarding experience has been how we protect our people and feedback that security did a great job and make a difference for our 323,000 employees, thousands of contractors and customers who comprise the General Electric enterprise.”

Frank will pursue his passions of gardening and landscaping where, “I can immediately see the results.” He looks forward to spending more time with his two grandchildren and, of course, plans to continue his contribution to our national security. Securitythanks him for his service.

 

 

Security Scorecard

  • Revenue: $160 Billion
  • Security Budget: $115 Million

 

Critical Issues

  • Manmade Disasters
  • Natural Disasters
  • Political Unrest

 

Security Mission

  • Asset Protection/Loss Prevention (for Resale)
  • Brand/Product
  • Corporate
  • Enterprise Resilience
  • Enterprise Risk Management
  • Global Security Operations Center
  • Intellectual Property
  • Investigations
  • Physical/Asset Protection (Not for Resale)
  • Regulatory Compliance
  • Supply Chain/Logistics
  •  Workforce Protection 
KEYWORDS: C-Suite Buy-in disaster management intellectual property protection utilities security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security 500: How Security’s Risk Mitigation Focus Creates a Risk-Nado!

    See More
  • 2013 Security 500 Rankings

    See More
  • 2013 Security 500 Report Methodology

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Complete Guide to Physical Security

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing