Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireThe Security Benchmark ReportSecurity Leadership and Management

Jeffrey Mazanec: Helping Keep Our Nation Secure

By Sarah Ludwig
Jeffrey Mazanec: Helping Keep Our Nation Secure
November 1, 2016

General Dynamics, one of the nation’s top five defense contractors, “is a global aerospace and defense company,” says Jeffrey Mazanec, Director of Corporate Security. “We are organized by four business groups: Marine Systems, Combat Systems, Aerospace, and Information Systems and Technology.”

The security team “is involved in securing General Dynamics’ people, assets and competitive advantage as we do three things: identify, prioritize and mitigate the most important global risks,” says Mazanec. “We do that by aligning with our business operations, leveraging our resources, and building effective partnerships.”

Mazanec finds working in his sector thrilling. “We support our military’s ability to do everything from fighting to logistics to communication to sharing,” he says. “From a security vantage point, that makes the job exciting each and every day as we partner with both industry and government to accomplish that mission.”

One of the specific challenges Mazanec sees is “a continually evolving global environment that requires an intense focus on changing risk, aggressive and hostile actors, and espionage,” he says. Also, there is a “leveling of the playing field as cyber intrusions put propriety information at greater risk and an increasing threat of terrorism in light of the growing Lone Actor phenomenon.”

Although security risks change constantly, Mazanec is focused on protecting proprietary information and keeping employees safe. “We’re always attempting to increase company awareness of the threat of terrorism, which can occur both inside and outside the workplace,” he says. “Part of this comes as training and pushing needed information to employees.”

Keeping current with the state of the world and potential threats is another area of focus, as is conducting risk analysis for the organization. “The business in which General Dynamics is engaged cannot stop and so the security services need to adapt and stay relevant,” says Mazanec. “Often that requires creativity and reinventing the traditional role or recommendations. We’re obviously very focused on compliance with the federal regulations that govern the Defense Industrial Base. As we seek compliance, we also strive to identify risk and move resources to the most important risks.”

Measuring the value of security in the organization involves the degree of integration security has with General Dynamics’ stakeholders. “We constantly examine how closely we are aligned to the business objectives of our company,” Mazanec says. “If business leadership sees value, they will continue to ask for input and invite us into the business process. If we are isolated, our value quotient is small and we have little impact. We have to maintain ‘agility’ in the same way that the business side must be agile.”

Other measurements of security’s value include keeping tabs on “how well we are leveraging our resources throughout the business units” and “how well we are building and utilizing partnerships in the industry and throughout government and the public sector,” says Mazanec. “A continued dialog of sharing and partnering benefits everyone, including the security impact of my team.”

The security team is also mindful of being efficient with their resources and focuses on constantly improving. “We must constantly be of the mindset that we may not be as good as we need to be, but we’re better than we were last month. Our security practices must be more agile and efficient than the last try, and this is how we measure value to both the customer and the company,” Mazanec says.

Mazanec’s team is “very engaged with the C-suite and provides risk intelligence to maintain organizational threat awareness,” he says. “We also work very closely with our peers in the Defense Industrial Base, since we share the same risks and issues. We work closely to benchmark our services and share best practices when it comes to things like building new facilities, sharing threat information, or developing tighter and more efficient ways to comply with federal regulations and identify risk within our industry.”

The most difficult part of the job is “moving in so many directions every day all at the same time, and at the same time, trying to remain lean and have a small footprint,” says Mazanec. “Being nimble and flexible to move to whatever sub-program or discipline that’s required at the moment is a real challenge.”

In the off hours, Mazanec likes to do physical activities outdoors. “Hiking, biking with my family, getting exercise, staying in shape. That, I think, allows me to come back the next day or the next week and do this fairly stressful job.”

 


Security Scorecard

Annual Revenue:  $31 billion

Security Budget:   Confidential

 


Critical Issues

  • Employee and Executive Travel

  • Protection of Proprietary and Classified Information

  • Risk Management

KEYWORDS: contractor security security business objectives security information sharing security leadership security thought leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • marriott

    ICO fines Marriott International for failing to keep customers’ personal data secure

    See More
  • credit card security

    Only 1 in 4 global organizations keep cardholder payment data secure 

    See More
  • Data privacy and consumers

    Only 21% of people trust global brands to keep their data safe and secure

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing