Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Leadership and Management

The Road to CSO: Meet Microsoft's New Security Leader

How did Brian Tuskan use technology, his reputation, networking and a desire to help people to become Microsoft's new CSO?

By Diane Ritchey
SEC0219-cover-Feat-slide_900px

Brian Tuskan, CSO, recently celebrated his 18th anniversary with Microsoft. Of his long and successful career to date, he says, “You’re building a plane as you fly. When I got into the security group at Microsoft it truly was evolving, so I was part of the evolution of the security team. I learned a lot on the job. And I also had outstanding mentors.” 

Photo courtesy of Microsoft Global Security

February 1, 2019

How did Brian Tuskan use technology, his reputation, networking and a desire to help people to become Microsoft’s new CSO?

As Chief Security Officer of Microsoft, Brian Tuskan is responsible for global physical security operations for a company with a footprint spanning 190 countries and more than 138,000 employees. As a global organization, the security team must prepare for an evolving physical threat environment. Tuskan, who oversees a division of seasoned security professionals across the globe, has a sophisticated arsenal of tools and advanced threat assessment protocols. The tools include advanced analytics, artificial intelligence, IOT, machine learning and leveraging Microsoft’s intelligent cloud and intelligent edge. Microsoft Global Security’s digital transformation and technology strategies are paving the way – at light speed – to help what can be an archaic physical security industry evolve into the future.

Growing up, Tuskan was always interested in technology. In the late ’80s in college, he took newly available computer courses and was instantly hooked. “I learned basic programming, but I loved being a user of the technology leveraging new programs such as spreadsheets, word processing and business productivity tools. The computer was magical to me because at that time they were still very new.”

At age 23, Tuskan joined the Honolulu Police Department (HPD) and held many assignments.  One of the duties was with the Office of Information and Complaint. This gave him the opportunity to use technology to improve job performance, including developing processes to move beyond manually writing reports and digitizing them.  “One of my sergeants nicknamed me ‘Mr. Science’ because I embraced the power of technology early on,” he explains. “My supervisors noticed that I could articulate metrics and statistics in a way that wasn’t being done.” The department’s SWAT team took notice of his innovation and recruited him to help with investigative and metrics work.

From there, Tuskan took his technology skills and experience to the city of Redmond, Washington’s police department – a smaller department, but a role that allowed him to become a better investigator. “It took me less than a year to become a detective. I was one of the first to embed photographs and other images into reports using Word documents, changing the department’s mindset regarding technology and away from the old way of doing things.”

It was in this role where he first met the Microsoft security team, also based in Redmond. “They knew of my work, as I was building a reputation within the security community, and after eight years with the Redmond Police Department, I was recruited for a role as a corporate investigator within the physical security team.”

For 18 years, Tuskan worked his way up through the ranks of Microsoft Global Security, managing most of the security functions including global investigations, security operations and technology. As a senior leader, Tuskan worked closely with his predecessor, Mike Howard, whom he replaced as Chief Security Officer, Global Physical Security.

Tuskan’s continued love of technology, hardworking reputation and desire to help others has meant that he has been heavily recruited throughout his career. He has been diligent in returning every headhunter phone call, but his heart has always been with Microsoft. It’s in this way that he has also had to be humble and patient. “I always want to know why the position is open and why they are interested in me,” he says. “But my eye was always on the Microsoft CSO role, and I was willing to wait for the position to open. I knew that it wouldn’t be easy and that it would be a very competitive process.” His patience paid off when Mike Howard retired, and he was named Chief Security Officer, Microsoft Global Physical Security, last September.

Today, with nine regional directors in the Americas, Europe, Middle East, Africa and Asia, he encourages each one to work hard each day and to strive for career growth, just as he did. “I consider my directors as co-CSOs, in that I give them the autonomy to drive and run their business as an executive leader,” he explains. “In fact, each one could be a CSO at Microsoft or another company. I encourage my team to want that goal. As a leader, I don’t micromanage. I have my finger on the pulse of everything, but I defer to my leaders to drive their business because even before I was named CSO, I had a mindset to operate like one for every business function I managed.

“I feel very privileged and blessed to have this position,” he notes. “I’m now a steward of the position. I continue to manage with high ethics and integrity and want to make Microsoft a pioneer in the physical security industry while helping my industry peers.”

Tuskan’s Mentors

Another critical step in Tuskan’s rise to CSO is from mentors: Charlie McNerney (Microsoft Corporate Vice President) and Dave Gasiewicz (Microsoft General Manager, IT).  “One of the most coveted pieces of advice Charlie gave me was that I control my own destiny. He said this early on, and it was true. With Microsoft in such a growth mode, I could create my own destiny of where I needed to be.”

Tuskan reported to McNerney as manager of the Microsoft investigation’s team, and from him, he learned the business aspects of managing, budgeting and finance, as well as how to speak at an executive level to secure investments in global security and other initiatives.

“Charlie helped me understand that you only have 24 hours in a day. In any corporation, especially if you’re a salaried employee, you can give as much time as you want to the company, and the company will gladly take it from you. But it is up to you to balance your sleep, health, personal life and family. He reminded me that every day will reset.  He drew it all on a whiteboard to show me the importance of organization and time management. I’ve been a student of organization and time management ever since. So, every day I look for a new way to be more efficient to maximize every minute of the day.”

Gasiewicz, a technical IT infrastructure architect who helped build the Microsoft corporate network, gave Tuskan advice about simplification. “He was the best at explaining how people can complicate discussions that could be articulated very simply. He taught me to ask precise questions, and not to be ashamed also to ask clarifying questions.”

Patience and Advice

“I first began to envision myself as the CSO when I was promoted to the director level,” Tuskan notes. “Essentially, I started a 14-year goal of becoming CSO. And everything I did and chose not to do in those 14 years prepared me to be in the running for the CSO role. Patience was my ally. I see a lot of strong, competent and seasoned security executives that are close to the top position, but are just too eager, and will prematurely jump ship just to get one.”

Tuskan always had a game plan, he says, “I call this philosophy organizational continuity, and I have it with my team: we’ve been around [Microsoft] for a long time. That continuity provides a strong foundation so the organization can be very healthy. I had extensive experience in every facet of the security organization and spent 18 years honing my craft, which ultimately put me in a position to be the CSO.”

Tuskan never stops learning. “I don’t have a business degree, but working in and around finance positions helped me to understand the business better,” he notes. “I’m self-taught using internal tools and resources, including information on budgeting, finance, strategic planning and how to present to senior leaders. I continue to learn, just on a higher level, while also being the face of Microsoft’s physical security. And I’m having a blast doing it.”

He continues to set goals for himself and for his team. “The Microsoft business is about empowering every person and organization on the planet to achieve more. The enterprise physical security team enables our business by keeping our people and assets safe.”

He adds, “We also have the ability to innovate and create products and solutions in our security discipline that are sold or presented as a value-add to our sales team. This means we create and use tools in our operation that can be sold to third parties and to generate revenue. And as long as our business group maintains relevancy as the industry leader in physical security technology, we definitely are contributing to the success of Microsoft as a company. I believe the future of the security industry is an ongoing digital transformation. Currently, the industry is behind, relying too much on hardware, using some old solutions. At Microsoft, we’re always looking to innovate.”

When it’s Tuskan’s time to retire, what does he want his legacy to be? “I want my legacy to be as an innovator – not only a CSO for the physical security industry but, ultimately, someone who contributed to making the world a safer place. I also want to be known as a thought leader for security technology, not just a talking head, but someone who can roll up his sleeves and get into the trenches. I worked hard in those trenches and moved up the corporate ladder. And I’m happy to be here.”

KEYWORDS: Microsoft Security security career security leaders security metrics security networking security thought leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • THE CSO, the Enterprise leader

    2015 Security Leadership Issue: Making the CSO the Next Enterprise Leader

    See More
  • SEC1119-500Profile6-slide6_900px

    Jerry D. Loghry: The Road to Security

    See More
  • Engaging Millennials in Security

    2017 Security Leadership Issue: The Road Less Traveled - Engaging Millennials in Security Leadership

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing