Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementSecurity Leadership and Management

Stranger in a Strange Land: Finding the New Normal of Security Culture

By Phil Aronson
Phil Aronson
Stranger in a Strange Land: Finding the New Normal of Security Culture - Security Magazine
Phil Aronson
Stranger in a Strange Land: Finding the New Normal of Security Culture - Security Magazine
June 1, 2018

The title of this month’s column is from an old Robert Heinlein novel. A man from Earth, raised by Martians, is thrust into our world and begins to question everything. His frame of reference conflicts with the culture.

Today, we have a new normal. Risks are outpacing our ability to staff, fund and manage them. Technology is displacing old notions of security. We are no longer in a “safe” world. There are many who believe they are simply managing what inevitably is going to happen. We are all strangers in a strange land.

A colleague of mine provided a disturbing story that illustrates this new normal. IT Security teams receive more than 17,000 alerts or potential threats per week. Nineteen percent are well-founded threats. But only four percent are investigated. They spend 395 hours a week reporting on false positives at an average annual cost of $1.27 million.

Many of our clients in the physical security market are facing similar challenges. They see drones and robots at industry events basing their value proposition on cutting the cost of guarding. But, at the end of the day, they are fighting their version of the 19 percent of well-founded threats with a four-percent investigation rate.

Security risk graphic chart - Security Magazine

This will eventually force a change in our “security culture.” Something has to give.

If we drew the problem on a board, we might see disconnected pieces of the puzzle. How we receive real-time data on risk. How we do risk assessments. How we evaluate our procedures, our workflows and our technology to optimize and effectively respond to risk. How we source the labor and the expertise to staff the very processes and tasks needed to protect us.

If risk is at the center, it might look like this diagram. Risk is the common language of the executives inside the organization. It is used to define defensive postures and offensive market strategies; that is, opportunities for value creation. But we in the security ecosystem are not positioned to balance our approach to risk with opportunity.

The very tools we will finally use to reinvent security will revolutionize how we think of markets and culture. And revolution is not a term that sits well with any of us. Change is hard.

But it is coming. The video we are using today for security is being used to predict consumer behavior. The intercom we use today is being radically transformed into Alexa. The machine is learning. And it will be your best friend and your enemy’s best tool.

So, a new vendor model must emerge that integrates risk assessment, intelligence and monitoring with technology to change the way we resource and fund security’s next generation of practices. And it must be affordable and resourced in a new way. Whoever can provide this infrastructure, resource model and quality of service will be the strategic advisor to a whole new generation of security leaders.

KEYWORDS: automation and security security risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aronson 2016 200px

Phil Aronson is the second generation owner of Aronson Security Group (ASG) a provider of risk, resilience and security solutions within the emerging Security Risk Management Services (SRMS) industry. Aronson is heavily invested in a legacy of value for the industry by hosting an executive leadership forum called The Great Conversation, by participating in the International Security Management Association (ISMA) and by leading his company to the next generation of security services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Defining the Next Generation of Security Services in the C-Suite's Language; security technology, security services

    Defining the Next Generation of Security Services in the C-Suite's Language

    See More
  • Managing the Mess Security Magazine November 2017

    Managing the Mess: Finding Opportunity Amidst Complexity

    See More
  • Culture First, Technology Third, Security Magazine October 2017 Corner Office

    Culture First, Technology Third

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing