Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementThe Security Benchmark ReportSecurity Enterprise ServicesSecurity Leadership and Management

Brad Minnis: Proactively Tackling Counterfeiting, Cyber and the Supply Chain

A Security 500 Thought Leader Profile

By Diane Ritchey
Brad Minnis Security Magazine November 2017
November 1, 2017

According to a study by the International Chamber of Commerce (ICC), the global value of all counterfeit and pirated goods is $1.77 trillion. Counterfeit products make up five to seven percent of world trade, and have cost an estimated 2.5 million jobs worldwide, with 750,000 jobs lost in the U.S. alone.

It’s an issue that Brad Minnis, Senior Director, Corporate Safety and Security for Juniper Networks, spends much time and effort to mitigate. Juniper Networks is a multinational corporation headquartered in Sunnyvale, California, that develops and markets networking products, with a presence in 47 countries with 60 offices. His philosophy towards counterfeit products, which he has successfully implemented at Juniper after 17 years in his role at the company, is that it needs to be proactive, rather than reactive. “You need to do more than find a counterfeit product, investigate it and shut it down. That’s reacting to a problem that you already have.”

That philosophy, he says, was born after roles that included security officer, electrician, security supervisor, site security manager and security system managers at National Semiconductor Corp, Caterpillar, and 3Com Corporation.

Minnis explains, “During my time at 3Com the company experienced a big counterfeit issue. I took the lead on that as Lead Counterfeit and Gray Market Investigator for the company where my role was focused on counterfeit investigation, but also counterfeit prevention, eventually working with other industry leaders to form the Alliance for the Abatement of Counterfeiting and Gray Marketing, (AGMA) which is still a pretty relevant organization today.”

About eight years into his role at 3Com, Minnis moved to Juniper, and immediately changed the name of the company’s anti-counterfeiting program from Brand Protection to the Brand Integrity Program, which is focused on counterfeit prevention. “We are protecting the product all the way through its life cycle, through design and R&D and manufacturing. We’ve implemented security best practices at all levels of the product life cycle. At 3Com, the issues that led to the ability for somebody to counterfeit its products was internally-driven: bad business practices and other factors. At Juniper we have best practices around our supply chain processes, including technology features, to prevent the infiltration of counterfeit components into our supply chain, and to make it very difficult for people to counterfeit our products. And as a result, in our history we’ve never had a counterfeit product, which is really unusual for our sector.”

As a result, Minnis says he’s spending more time talking to Juniper customers about its anti-counterfeiting mitigation strategies. “We have a great story to tell,” he says, “so I spend more time than ever in front of customers talking about security and positioning security as a competitive advantage for the company.”

In addition to anti-counterfeiting work, Minnis has responsibility for environmental health and safety, business continuity and crisis management, and corporate social responsibility, particularly where it pertains to environmental performance and supply chain management. “We outsource all of our manufacturing supply chain to third parties, so we have a rigorous program to not only ensure the security of the manufacturing process, but other factors as well, including human rights and human trafficking, labor and living conditions.” Minnis has a team of 14 professionals that help manage the health, safety and security program, which includes GSOCs in Sunnyvale and Bangalore, India.

He reports to Juniper’s General Counsel, and has solid access to the C-suite and support at all levels. “We have had some high visibility events where Security has demonstrated leadership and has reduced risk to the company. Also, our CEO has been with the company more than 20 years, and I’ve been here almost 17 years, so we’ve both grown through the organization and have a solid relationship.”

In terms of security technology, Minnis and his team have implemented the ability for Juniper employees to report suspicious activity via an anonymous reporting app. “We have a younger workforce, so we are looking to technology that caters to that generation,” he says. “Beyond that, our security technology needs to give us credible information, in a timely fashion, that’s also actionable. We have a good relationship with our employee base; we’re not looked upon as ‘big brother’ at all, and we want them to continue to share information with us to help us keep them safe.”

In his free time Minnis enjoys playing golf, participating in music concerts and spending time with his family, including his four grandchildren.

 

Security Scorecard

Annual Revenue: $4.9 billion

Security Budget: $9.9 million

 

Critical Issues

• Cyber Incident Response

• Product / Supply Chain Security

• Information Security

KEYWORDS: brand security counterfeiting intellectual property security security thought leaders supply chain security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Ryder supply chain security

    Supply Chain Management Best Practices for 2014 and Beyond

    See More
  • Every Link in the Chain

    See More
  • cannabis field

    Tackling theft within the cannabis supply chain

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing