Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
The Security Benchmark ReportSecurity Leadership and ManagementInfrastructure:Electric,Gas & Water

Frank Taylor: Enabling the Mission

“Leaders get recognized for their ability to mitigate problems and choose effective strategies. The same is true for security… The status quo or yesterday’s success is never good enough.”

profiles feat
November 5, 2013

“Security is about enabling a mission. Business leaders are able to take our tools and apply them to a variety of settings to create success. Our job is to create an environment of success for the enterprise. It is not what we do, rather, it is how we enable the enterprise to achieve its goals,” shares Frank Taylor, Vice President and Chief Security Officer for The General Electric Company. It is important to note that as you read this, one of America’s (not just security’s) greatest leaders and thinkers will have retired, again.

Frank retired earlier in his career at the rank of Brigadier General in the Air Force. He continued to serve his country as Assistant Secretary of State for Diplomatic Security and Director of the Office of Foreign Missions, with the rank of Ambassador. After 9/11 he became a key advisor to President Bush and Secretary of State Colin Powell as Ambassador at Large and Coordinator for Counterterrorism until November 2002. He joined General Electric in March 2005.

“The only job I ever applied for was to join the Air Force,” he says. “A headhunter got my resume and after three interviews at General Electric, I became their first Global CSO. For anyone migrating from law enforcement or the military to the private sector, they should expect to be uncomfortable,” coaches Frank, noting the need to become a team player, deal with new and unfamiliar issues, learn new jargon and understand and respect new processes. “But, what the military and General Electric have in common is the diversity of what they do and how they recognize and reward leadership and accountability. The company is big, exciting and dynamic, but you still feel in control because processes and procedures are in place.”

Asked how General Electric’s first global CSO got his arms around the global business and leading security, Frank shares his successful plan. First, he liked the structure at General Electric because it was diversified but simple, similar to the military. And the many businesses and geographies across the company were akin to his Air Force and State Department experiences of overseeing more than 200 detachments and more than 265 embassies and diplomatic facilities, respectively.

“First we sorted out the structure and organization to identify policies and procedures, ensuring a successful global system,” he explains. “Next we identified the key deliverables to the businesses from security. The business unit security leaders are direct reports in the business units and dotted line to global security. That enables us to set policies and procedures, conduct audits and create guidelines.”

With 70 percent of General Electric’s business outside the United States, Frank’s experience and thoughts on leadership are compelling and insightful.

“Leaders get recognized for their ability to mitigate problems and choose effective strategies. The same is true for security. Leaders see the problems coming and plan for them. They see the changes ahead and plan. They attack issues. The status quo or yesterday’s success is never good enough. Leadership is also about influencing, collaborating and sharing knowledge. People sometimes don’t realize that leadership learned in the military translates very well to the private sector. The challenge for people is translating that leadership experience into the business environment and adapting it to the mission.”

During his storied career, Frank has had many mentors. “Every boss I have worked for, in one way or another, has been a great mentor.” Of particular note he points to Major General Pierce Smith who encouraged young leaders to retain more than 200 contacts outside their core area whom they can call and seek advice or discuss issues. He still does so.

Thoughtful about what CEOs should know about security, Frank says, “That they need an entity in the organization to think about risk and security full time. We learn from every crisis and get better as a result. We have warts, yes, but we work on removing those warts every day.”

Proud of being part of a team that added great value to General Electric he points to the company’s compliance policy: We have no greater responsibility than the security of our employees noting, “Global security has created a confidence among the employees that the company is committed to their safety and security,” he says. “As a result, there is no market in the world in which the company cannot operate. The most rewarding experience has been how we protect our people and feedback that security did a great job and make a difference for our 323,000 employees, thousands of contractors and customers who comprise the General Electric enterprise.”

Frank will pursue his passions of gardening and landscaping where, “I can immediately see the results.” He looks forward to spending more time with his two grandchildren and, of course, plans to continue his contribution to our national security. Securitythanks him for his service.

 

 

Security Scorecard

  • Revenue: $160 Billion
  • Security Budget: $115 Million

 

Critical Issues

  • Manmade Disasters
  • Natural Disasters
  • Political Unrest

 

Security Mission

  • Asset Protection/Loss Prevention (for Resale)
  • Brand/Product
  • Corporate
  • Enterprise Resilience
  • Enterprise Risk Management
  • Global Security Operations Center
  • Intellectual Property
  • Investigations
  • Physical/Asset Protection (Not for Resale)
  • Regulatory Compliance
  • Supply Chain/Logistics
  •  Workforce Protection 
KEYWORDS: C-Suite Buy-in disaster management intellectual property protection utilities security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • risk-nado feat

    Security 500: How Security’s Risk Mitigation Focus Creates a Risk-Nado!

    See More
  • rankings feat

    2013 Security 500 Rankings

    See More
  • 2013 Security 500 Report Methodology

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing