Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

How to Work Effectively with Your CFO

Money Matters: How to Work Effectively with Your CFO
Steve Harrold, CPP, Director, Global Security for Corning Incorporated.

“No one in the C-Suite would disagree with the goal of making workplaces safer, but you must also understand the challenges from an investment standpoint,” says Steve Harrold, CPP, Director, Global Security for Corning Incorporated. Photo courtesy of Corning Incorporated

Money Matters: How to Work Effectively with Your CFO
Steve Harrold, CPP, Director, Global Security for Corning Incorporated.
May 1, 2015

All too easily, there can be a vast disconnect between security and finance. Chief financial officers are looking out for every penny, and security departments can be frequently written off as cost centers. However, there has been growing involvement and partnerships in both directions, with CSOs now successfully proving security’s value to the enterprise and CFOs championing security and cybersecurity initiatives to better mitigate enterprise risks.

For example, CFO Magazinerecently reported that CFOs should regularly review cybercrime-related intelligence to determine an enterprise’s risk of a cyber attack, how targeted information could be used by criminals, and what techniques are being used to perform cyber attacks.

“For today’s CSO, it’s absolutely essential to have strong collaborative relationship with your finance department throughout the enterprise,” says Steve Harrold, CPP, Director, Global Security for manufacturing enterprise Corning Incorporated. “The CFO can help the CSO effectively understand the finances of the organization, and the CSO can use that knowledge to better present good business choices for the security department and the organization.”

The question to ask, Harrold says, is how much are you really spending on security? This means tallying up expenses all the way from corporate to the local operating level, building a picture of where your budget is spent, which departments are impacted, and what risks are being addressed. In larger enterprises, this can mean jumping between silos – physical security, IT security, risk management – to build that holistic view of your business.

“You have to peel back the onion, the layers of your spending,” says Harrold. “Characterizing your spend is a way of building up your accountability and find some visibility into the appropriateness of your finances. You might find that facilities supplies like cleaning supplies or building maintenance have been folded into security spending.

“This research takes patience, diligence and a strong relationship with finance, but it puts you in a position to make good security spending decisions,” he adds.

An enterprise security leader’s critical task is to understand an enterprise’s state of security as it is before pitching any new initiatives to the C-Suite, he says. Being able to express the value of a potential investment in terms of risk and financial benefit to the enterprise is only possible once an executive understands the department’s current investments and ROI.

“Leverage and collaborate with your financial partners to help you tell this story through cash-flow analysis, return on investment analysis and other metrics. There are free tools online to calculate these, but it’s important to provide these numbers within the lens of your company’s culture,” Harrold says. “No one in the C-Suite would disagree with the goal of making workplaces safer, but you must also understand the challenges from an investment standpoint.”

According to Jerry Brennan, Chief Executive for corporate security executive search firm Security Management Resources:  “A CFO’s world is very black and white – does (a program) cost money or make money? While there are security programs you might be able to show as cost-effective, you’re often dealing with risk mitigation and probability. It’s more challenging to come up with the metrics that will be recognized by a finance executive.

“What you can do to break through to a CFO is determine what keeps them up at night, in terms of risk,” he adds. “What are their feet being held to the fire for?”

According to Deloitte’s third-quarter 2014 CFO Signals™ survey, North American CFOs have strong concerns about the implementation of information security plans – 74 percent of 103 CFOs surveyed said cybersecurity is a top priority, and only six percent do not view is as a high priority. More than half of the CFOs surveyed cited anxieties about the security of data, intellectual property and facilities.

Enterprise security leaders can use these drivers and risks to better present security initiatives to CFOs.

“The role of the CSO crosses every single function in an organization; to do it well, you have to have a very good understanding of your enterprise and develop partnerships with other internal programs,” says Brennan. “Many executives still see security as guns, guards and gates – other risks aren’t on their radar yet. As a security executive, propose programs that already have buy-in from internal clients, pitching them as a service to enhance the business, not just an operations center. This helps you bring more diverse risks and functions to the CFO’s attention with the support of other business leaders.”

For security leaders looking to gain more business acumen, Brennan recommends keeping up to date on all regulatory and legislative issues to better address compliance to the CFO and C-Suite.

“It is extremely important to be business savvy,” he says. “It’s up to the CSO to provide a level of education about enterprise risk models from a security standpoint and a business standpoint. Take MBA-level courses, basic financial courses and classes in international finance. Find educational opportunities that relate to your company. Talk to your peers – find what’s pressuring their departments and see how you can be part of that team.”

Harrold finds value in what he calls “smart meetings,”in which a new executive to a company should reach out to other departments to review missions, form partnerships and help newcomers understand the different functions within an enterprise. These meetings demonstrate a CSO’s strong interest in bringing overall value back to an organization instead of striking off on his or her own.

“There are many paths to a decision-maker,” Harrold says. “There are always influencers or issues that the CFO does care about, and it’s a matter of linking security and risk to those issues. I call it ‘leaning on the door,’ instead of barging through. Persistence and consistence in this, in finding where your investments can bring value and drive the organization forward, is how I define success.

“Trust is built over the course of dealings, and consistently pitching value-driven, business-minded initiatives that help departments outside of security helps to bolster that trust.” 

KEYWORDS: cfo partnerships security budget security leadership security metrics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hacker

    How to Work with Hackers to Make Your Company More Secure

    See More
  • Employees gathering

    How to effectively communicate cybersecurity best practices to staff

    See More
  • Jerry Brennan

    How to Work with a Search Firm

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×
“No one in the C-Suite would disagree with the goal of making workplaces safer, but you must also understand the challenges from an investment standpoint,” says Steve Harrold, CPP, Director, Global Security for Corning Incorporated. Photo courtesy of Corning Incorporated

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!