Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementSecurity Leadership and Management

Are You Giving Back to the Security Industry?

Through High-Level Conversations, Security Executives Can Start to Enhance Their Role as Strategic Enterprise Business Partners

By Phil Aronson
Phil Aronson
Are you giving back to the security industry? - Security Magazine
Phil Aronson
Are you giving back to the security industry? - Security Magazine
March 1, 2018

I have been reminded every year by my friends and mentors in this industry why we do what we do:

  • We protect the lives and assets of our communities.
  • We advance excellence in our profession.
  • We intentionally share and collaborate although we are in different, perhaps competitive, organizations.

We are risk, resilience and security professionals.

In a few days, I will be joining the best of the best in our profession to share what we know today and to look into our future. And those of us who have been to The Great Conversation in Security, sponsored by Security magazine, will know that we will walk away with a reaffirmation of our purpose, as well as learnings that will take our program and our professional acumen to the next level.

Take John Turey, Vice President of Enterprise Risk and Security Management (ESRM) for TE Connectivity. John will kick-off the forum by anchoring how business executives (CEO, COO, CFO, CTO) are thinking about enterprise risks and what we can do to enhance our role as a strategic enterprise business partner. Walk away with a high-level framework in which you can leverage then engage the “enterprise owners of risk” in your organization.

Or Tyson Aiken, the Director of Global Security at Nike, Inc.: You may be building on ESRM, but without assessing and leveraging your culture, you have a program with serious risks.

And without a new approach to how you construct your technology architecture so that you can have a 360-degree dashboard around the measures of performance in risk, resilience, process optimization and technology, you cannot see where you are going. Lynn Mattice, a four-time CSO and now a thought-leader in the value transformation of security, moderates a panel on how this might be done. We are following this panel with breakouts in intelligent communications, a 360-degree case study, edge security and machine learning in surveillance. Because, without knowing where the technology is going, we cannot inform and infuse the planning of our future.

Dr. Thomas Cellucci, who once was an advisor to the White House while he was in Homeland Security, provides a first-hand account of how technology expertise must be embedded in our security risk and optimization efforts. The future will inform the present, but not without changing how we do risk assessments and security strategy and planning.

Dr. Michael Gelles, an expert in insider threat will provide a holistic view of the mitigation efforts needed to address 70 percent of the breaches that invariably will occur without adequate planning.

Two panels of CSOs and technology domain expertise will discuss how to treat your actionable response in terms of seconds rather than minutes. And well as how to proactively identify who is in your building and on your campus.

And, finally, the one missing element in most planning efforts that might forever change your approach to security. Kristina Anderson, the Executive Director of the Koshka Foundation, has taken her experience as a victim of an active shooter event to a great conversation with senior risk and security leaders in our industry. Her message is not only powerful, but her insights incredibly valuable in building a safe, secure and resilient culture of security.

They are all giving generously of their knowledge, time and wisdom. And all we have to do is listen, learn and share in return.

 

Editor’s note: The Great Conversation in Security is March 5-6 on the waterfront in Seattle. Register here: https://www.the-great-conversation.com/

KEYWORDS: security industry security leaders security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aronson 2016 200px

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • You Are Already Obsolete

    You Are Already Obsolete; It's Time to Evolve

    See More
  • How Do You Measure Success?

    How Do You Measure Success?

    See More
  • Communication Critical

    Do You Consider Communication Critical?

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing