This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Security Succession Planning for CSOs
Security Leadership and ManagementLeadership & Management

Security Succession Planning for CSOs

mattice & Brennan
February 1, 2015
Jerry J Brennan and Lynn Mattice
KEYWORDS security education / security leadership / security mentorship / security risk management / succession planning
Reprints
No Comments

You have been with your current organization for more than 10 years leading the corporate security function, having conceived and built the program, hired staff around the world and integrated the department to being a trusted advisor to senior management. Since this is your second career, you are now reaching a point that you would like to retire and pursue other passions and personal interests. After sitting down and discussing this with your boss, you realize that he or she and the management team are concerned about the lack of a succession plan for your replacement. Their position is: While your second level staff is very good operationally, they are not under serious consideration for your role, and HR will be looking outside the company for your replacement.

This scenario is something that we see quite often within the security community, at all levels, not just the senior security role. Some of the indicators that no one on your staff is a likely successor are:

  • There is a significant difference between your base compensation of your direct reports. We have seen gaps of more than $50,000, in which case it is unlikely that they will be viewed as being at the same management level. Also, be aware that most organizations will not increase a salary in conjunction with a promotion by more than 10-15 percent, except in the most extraordinary circumstances that require special leveling. Further, do you really want to be responsible for downgrading your role? This will send the wrong signal throughout the organization as to the importance of the position and may well result in downgrading the reporting structure.
  • While you have done an excellent job in identifying and hiring staff to perform a wide range of tactical activities in the security risk portfolio, you have not implemented a career development plan that allows for improvement of their soft skills, cross-functional development beyond security-related activities or providing opportunities to operate strategically with key leaders and managers. 
  • You have not documented all aspects of your function and do not have well-developed job descriptions that can be used to identify those soft and professional skills needed to advance. Without these, how are you going to execute individual development plans? Keep in mind that these should be modeled along the same methodology used in the rest of the organization.
  • Allow and encourage your team to take on assignments (even if temporarily) outside the function and even outside the regions or countries they are assigned. A number of senior security executives hired by leading companies in the last 10 years have during their careers sought out and have taken on roles well outside their comfort zone so as to better understand their organization’s business drivers and build lasting relationships. This gave them a competitive advantage against those candidates who did not, and they were able to better connect with the executives on the interview teams.
  • Your team members have not developed relationships with your organization’s key and emerging management team beyond interacting with them on security problems.
  • You have not given your team members accountability for high-profile, high-impact projects to improve their credibility and visibility with the leadership team. Do you bring any of your direct reports to meetings with your boss and other senior leadership and encourage participation? If you are not comfortable with this, why would you think management would consider them as having potential as your successor?
  • Have you engaged in discussions with your boss and the HR manager responsible for organizational development concerning the irrational, political and emotional dynamics of succession planning and evaluation of future potential within your company?
  • There is only one person in your function who you feel is an appropriate successor, and you do not have not backup plan. What do you think will happen if that person advances their career outside and takes a CSO role for another company with a great compensation package? 

These handful of indicators can be used as a starting point for your career development and succession planning initiatives. Being aware of the commonly observed pitfalls can help you maximize the effectiveness of your program and will be beneficial in ensuring you have a talent pipeline strategy aligned with your organization for not only your role, but also it can be used to view the needs of your entire function to assist with its future success within your company.   

Subscribe to Security Magazine

Recent Articles by Jerry Brennan

Truth, Lies and Your Security Career

The First 90 Days of Your New Security Job

Privacy - An Emerging Security Career Challenge

The Insider's Guide to Security Recruitment

Building Relationships to Advance Your Personal Brand

Brennan-2016-200px

Jerry Brennan is CEO of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Mattice-2016-200px

Lynn Mattice is Managing Director of Mattice & Associates, a top-tier management consulting firm focused primarily at assisting enterprises with ERM, cyber, intelligence, security and information asset protection programs. He can be reached at: matticeandassociates@gmail.com​​​​​​​

Related Articles

Finding Career Success Through Self-Assessment

Building Strong Policies for Ongoing Structure and Security

Related Products

Risk Analysis and the Security Survey, 4th Edition

Effective Security Management, 6th Edition

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

cybersecurity-blog

European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing