Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingPhysical Security

How CSOs Can Strategically Keep Security on the Map

Part 1

By Bob Pocica
key-enews
February 25, 2020

Chief Security Officers (CSOs) are charged with protecting an organization’s assets and people. Like all corporate functions, the design of this department will vary greatly depending upon the organization. However, the process by which a program is designed, measured and evaluated has some consistent principles across different industries. This series explores how to make your physical security program more strategic, and how to secure funding for this objective.

As a backdrop, the strategic import of IT security has become more pronounced in recent years. Many CISOs and even some CEOs have lost their jobs due to a data breach or some other IT security issue. The high stakes and visibility have forced CISOs to become more calculated, led to massive increases in funding, and given the CISO a prominent position in the organization for mitigating risk. In my experience, the CSO can also become increasingly strategic about physical security and risk mitigation by following key steps. In essence it requires the CSO to adopt a mindset of businessperson first, security professional second.

This first article discusses a process to better understand your own organization and how to understand and quantify real and perceived risk.

 

Understand the Key Drivers of Profitability 

The drivers of profitability (and market capitalization) might not be obvious to you, but they are salient to the key business leaders. As a CSO (or ranking security officer), you need to be a business leader who can connect safety and security to the organization’s bottom line.

If you haven’t already, you should conduct a detailed assessment of your organization’s business model, assets and structure – and know how they relate to physical risk mitigation. There are several places you can gather this information. Industry/trade publications can be a fantastic source. If your organization is publicly traded, its 10-K will be instructive – as will the 10-K of any competitors. You can search for them, along with other public filings, using the US SEC EDGAR database. 

Your colleagues can also provide invaluable guidance. Make sure to speak with key stakeholders and business leaders at different levels of the organization and look for any available data to inform your analysis. (The next article in this series will delve into strategies for developing relationships with key stakeholders.)

Here are some key aspects to examine as part of your analysis.

At a high level, what are the strategic assets that drive revenue or profitability for your organization?

The answer to this question relies on many factors, including the applicable industry, organizational structure, primary product(s) and market(s) and others. You want to address this question with a balanced level of specificity.  For example, a manufacturer of consumer electronics relies heavily on in its intellectual property (e.g., product design and capabilities), its highly skilled workforce (e.g., to design and test the products), its manufacturing facilities and personnel (e.g., to produce the products) its distribution channels and networks (e.g., so the product can be shipped and retailed) and a variety of other tangible and intangible factors that make it unique among competitors. All these characteristics create different facets of an organization’s risk profile.

Here are some assets to examine as part of your analysis:

  • Facilities that store valuable assets, with an emphasis on high-value inventory, data centers, large sums of cash, sensitive/restrictive areas and any other factors that make a given location important or indispensable to the organization
  • Production facilities or development offices
  • Distribution centers and systems
  • Key suppliers
  • Retail centers and key customers

What are the unique risks faced by your organization?

Understanding the biggest risk factors to your organization’s bottom line - both real and perceived - are critical to building a strategic and successful physical risk mitigation program. A given organization’s risk profile is determined by the nature, location and categories of its assets: people, places, products and partners. You should seek to understand the sources of recurring or acute risk, based on your organization’s characteristics.

From the perspective of physical security, it’s easy to understand risks to life-safety – for instance, employees interacting with the public at brick and mortar locations; travelers or offices in volatile parts of the world or high-profile executives who speak on controversial topics. It can be a bit more challenging to intuitively grasp operational or financial risk – but it’s essential to an organization’s bottom line.

You want to recognize what types of incidents could most adversely impact your company in terms of revenue/EBIDTA, in terms of public/investor relations and in terms of long-term goals such as recruitment or business expansion. A CSO needs to understand the company’s business model and margins. A high margin business might over-invest in a risk mitigation strategy because they have financial resources to do so, where a low margin company cannot.

For example, consumer electronics, often rely on rare earths for microprocessors – truly crucial components that may be single-sourced. A supplier of a given crucial component may be the ONLY supplier – so any event that disrupts production of that component could delay production of multiple products. The tragic and devastating Fukushima earthquake/tsunami event impacted some of these types of manufacturers and caused earnings issues.

There already may be objective data which can aid your risk assessment. Here are a few examples:

  • Prior loss data from business units, including impacted assets and the cause of the impact (e.g., environmental vs. man-made)
  • Internal audit reports identifying risk issues
  • Any information collected by your risk management team
  • Insurance group prior claims and underwriter concerns
  • Types and volumes of different alarms or alerts every month 
  • Any times/locations with higher volumes of alarms or other risks (e.g., high-crime area)
  • Existing organization risk mitigation policies
  • Prior fines, citations or other regulatory activity
  • Offices/facilities in politically volatile or environmentally sensitive areas
  • Compliance hotline data

One important thing to keep in mind here: it’s unlikely that you will have the resources to address all potential sources of risk. Thus, you should seek to mitigate the most impactful or recurring sources of risk. We’ll dig deeper into this in future articles.

In summary, a CSO needs to conduct due diligence on a company’s operations and profitability, prior risk experience, risk tolerance and existing programs before they initiate new strategies for managing the company’s risk profile. Risk mitigation strategies should be closely connected to the organization’s bottom line.

In the next article, we’ll examine how to develop the internal relationships with key business leaders that are required to not only succeed with the department’s mission but also with your own career.

KEYWORDS: Chief Security Officer (CSO) IT security physical security assessment risk management threat assessment

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pocica headshot

Bob Pocica is an experienced security executive and a strategic advisor for Topo.ai, a corporate security software company. Pocica began his career at the Federal Bureau of Investigation (FBI), where he spent nearly 23 years. Following his service at the FBI, Pocica served as senior director of global security programs at Pfizer Pharmaceutical and then as senior vice president and chief security officer at McKesson.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0419-leadership-feat-slide1_900px

    How CSOs Can Strategically Keep Security on the Map, Part 2

    See More
  • phone-enews

    How CSOs Can Adapt to the Changing World of Digital Risk

    See More
  • concerts-unplash

    How US security teams can learn from the events of the Manchester Arena terror attack and the subsequent Protect Duty

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!