Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Talk ColumnSecurity Leadership and Management

What Makes a Great Security Leader?

By Diane Ritchey
Generic Image for Leadership Topic
May 1, 2015

What does leadership mean to you? We all have our own ideas about what it means to be a good leader. For example, some people think leadership means guiding others to complete a particular task, while others believe it means motivating the members of your team to be their best selves. But while the definitions may vary, the general sentiments remain the same: leaders are people who know how to achieve goals and inspire people along the way.

We are fortunate to have two security leaders on our team, Lynn Mattice of risk management consultancy firm Mattice and Associates and Jerry Brennan of security executive search firm SMR Group, to define what enterprise security leadership means to them.

 

What are the most important leadership aspects of a CSO?

Lynn Mattice and Jerry Brennan: Chief Executive Magazine last year published the results of a survey they conducted of CEOs asking them to identify the top 10 skills needed for effective leadership. The results were as follows:

I. Adaptability to Change

II. Strategic Thinking

III. Integrity

IV. Very Good Communicator

V. Being Trustworthy and Open

VI. Vision

VII. Develops and Fosters Diverse Teams

VIII. Delegation

IX. A Positive Mind-set

X. High Self-awareness

Based on what is important to CEOs, if a CSO embraced and demonstrated the skills listed above, success will be more probable…However, one must also take into account the personality traits of the individual CSO as well as the culture of the enterprise itself. If there are disconnects, then there is little probability the CSO has any chance of being successful in that particular environment.

To compare, visit www.SecurityMagazine.com/WebExclusives to see what CSOs view as the most important leadership traits for their position, as demonstrated by a survey conducted by SMR Group and Premier Profiling.

 

What can a new or junior security executive do in terms of networking to land a CSO role?

Mattice and Brennan: If their CSO is a member of ISMA and OSAC, there are a number of opportunities generated by both organizations to not only enhance their skill-sets, but also providing incredible opportunities to network with colleagues, peers and CSOs from a broad  range of companies. 

 

What can a new security executive do in terms of education to land a CSO role?

Mattice and Brennan: The most important skill for a CSO is to understand business, risk and process management. A number of highly respected major universities have outstanding programs and special conferences on these key topics, as well as online courses. The ability to identify and analyze risks and threats to the enterprise is vital to the survivability of the enterprise and is key to providing actionable intelligence to key decision makers. Providing relevant and timely intelligence that allows executive management to make informed decisions can dramatically enhance the value the CSO brings to the enterprise’s hierarchy.

 

How important is it to “sell” your skills and leadership qualities?

Mattice and Brennan: CSOs must first demonstrate that they connect with and are aligned with the business as well as the goals of the enterprise. A CSO has to have an “elevator speech” ready to go on a moment’s notice. If one is lucky enough to find a mentor in one of the key executives, they can not only guide the CSO with insights relative to what resonates with the particular senior management of the company, but can also act as a champion for the CSO.  The other important aspect to consider is to develop key metrics that are meaningful to the enterprise’s leadership. While a number of measurements and metrics are helpful in managing the security functions, only key metrics should be provided to management, and those key metrics should be targeted at supporting the specific goals of the enterprise.

 

Is it important to know the IT aspects of an enterprise in order to land a CSO role?

Mattice and Brennan: In today’s world of the Internet of Everything, the more knowledge a CSO has of issues that can affect an enterprise's IT architecture, network, hardware, software and applications…the greater his or her prospects of expanding the CSO role once full engaged in the enterprise. There has been some consolidation of IT security under the CSO, but it has been slow to occur. A because a significant number of CSOs believe they have to be fully conversant in IT to manage the role. CSOs need to look at IT security in the same manner they look at any other function in their portfolio… it is just another set of processes that need to be managed. Bifurcating the CIO and CISO functions can result in an easing of tension and a more fluid movement to an environment of robust  cyber threat management.    

KEYWORDS: Chief Security Officer (CSO) Career security education security executives security leadership

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Diane Ritchey

    What is a Leader?

    See More
  • Team hands in a circle

    What makes a great security leader?

    See More
  • Security Blog

    What is the Great Conversation?

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • operations center.jpg

    Security Operations Center Guidebook

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing