Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSectorsThe Security Benchmark ReportSecurity Leadership and ManagementCybersecurity NewsEducation:University

George Finney: Training Future Digital Security Leaders

By Diane Ritchey
SEC1118-profile3-feat-slide_900px
November 6, 2018

When George Finney was studying law at Southern Methodist University, a private university in metropolitan Dallas with 11,649 students (undergrad and graduate), his supervisor made him a “deal of a lifetime,” he says. Finney had some network engineering experience, but he really wanted to get his law degree to do patent law. “It turns out that life is always interesting,” he says. “While I was studying law, I helped the only cybersecurity engineer who was on staff, and it wasn’t a full-time role. After I finished law school, my former supervisor in IT security named me the head of the SMU Cybersecurity program, as CSO. While I’m not practicing law per se, I do believe that I am doing some type of law work, as I’m exposed daily to SOC or PCI compliance in addition to networking, system administration and cybersecurity technology. My law degree gives me the background and knowledge about what I need legally to do if there is a cyber incident, specifically the steps that I need to take.”

In his role, Finney reports to the SMU CIO but has access to the SMU Board of Directors. “That’s where the CSO role continues to move,” he says. “As CSOs, we have to be able to communicate to about risk exposure and not specific technologies. I have to speak about potential compliance issues. Ten years ago, my role focused on technology, but today’s CSOs are trying to be partners to the business.”

On his team are four full-time staff members for cybersecurity and two team members for physical security. He also has several outsourced providers to fill in gaps on services such as penetration testing and staffing the security operations center. “My team is fairly small compared to some of my corporate friends,” Finney says. “But I also take a different view in that everyone [on campus] is a security employee, all working to keep everyone safe, and I like to think of myself as a coach  to set up the playbook right, whether it’s an incident response plan or other program.”

Finney likes the constituency that he and his team serve, which includes students, faculty and visitors to the university. “The joy of working at a university is that we get to be on campus and see our customers every day.  We also play a part in educating them to be digital citizens,” he says. “Students all will eventually leave campus and find their own careers, but while they are with us, we want to not just protect their personal information, we also are hopefully setting them up to be digitally secure for the rest of their lives. I think it’s a great mission, and I’m really excited to be a part of it.”

Part of that lifelong lesson, he says, is being proactive and teaching that to students and faculty, as well. “Part of my mission is to teach others and my team to be proactive and not reactive. It’s been a long process to get there: it’s required funding and its required support. We are not there yet but we are on the cusp of turning the corner.”

Finney is a proponent of removing barriers that may prohibit the next generation of cybersecurity leaders. “With most job postings, there’s a high barrier of entry. We are requiring industry-specific experience, and we should not be doing that,” he explains. “For example, with the banking industry, which is one of the biggest employers of cybersecurity, they require five or 10 years of banking experience, which eliminates many qualified candidates. Also, many employers require a candidate to have Splunk training. That’s a great product and knowledge to have, but is that training valuable to us long-term? We need to remove barriers to find qualified candidates. I can provide specific training once the candidate is on the job. When I recently filled a position, I removed many barriers, and I received 10 times as many qualified candidates.”

“Collectively as CSOs and leaders in the community, we need to commit to educating our employees and future leaders to close the [cybersecurity] skills gap,” Finney continues. “There aren’t enough college graduates to fill cybersecurity jobs. One way is to look internally at candidates who have the skill sets and to train them.”

In his free time, Finney is a published writer. His book, No More Magic Wands: Transformative Cybersecurity Change for Everyone, discusses a story that’s common with businesses today: a security breach and how to address security problems. It offers advice that can assist cybersecurity professionals in influencing good practices within their organization.  “Writing has been my passion and my mission to shepherd in the next generation of security awareness training,” he says.  

 

Critical Issues

  1. Active Shooter
  2. Data Security
  3. Rogue Insider Threats
KEYWORDS: cybersecurity talent gap security career security education security thought leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Training Future Digital Security Leaders

    Training Future Digital Security Leaders

    See More
  • SEC0319-Cover-Feat-slide1_900px

    Robots and Drones -- the Future of Enterprise Security?

    See More
  • SEC0519-cover-Feat-slide1_900px

    How SOCS Help in Training Security Professionals

    See More

Related Products

See More Products
  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing