Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementLeadership & ManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Leadership is Wasted on Leaders

By Michael Gips
SEC0620-Leadership-Feat-slide1_900px
SEC0620-leadership-slide2_900px
SEC0620-Leadership-Feat-slide1_900px
SEC0620-leadership-slide2_900px
June 1, 2020

Youth is wasted on the young,” goes a popular witticism, which has been ascribed to George Bernard Shaw, Oscar Wilde, Michel de Montaigne and others. The point is that young people have the vitality and enthusiasm to achieve tremendous things, but they usually lack the wisdom, experience and maturity to actually do so.

Equally true is that leadership is wasted on leaders, but for different reasons. It’s not that people who are in a position of leadership — CEOs, politicians, coaches, clergy, judges and so on — necessarily lack any quality that lets them excel as leaders. It’s that they are expected to lead and to lead followers through difficult situations. They signed up for it.

What’s truly extraordinary is when someone not in a traditional position of authority steps up to leadership.

Of the 90,000 books on leadership that Amazon.com sells, listed first (not including sponsored results) is Doris Kearns Goodwin’s highly praised 2018 work, “Leadership in Turbulent Times.” Kearns Goodwin chronicles the exploits of four U.S. presidents at their defining moments: Abraham Lincoln through the Civil War leading up the Emancipation Proclamation; Theodore Roosevelt during the coal strike, as the gears of the Industrial Revolution were grinding down workers; Franklin D. Roosevelt and his first 100 days in the heart of the Great Depression; and Lyndon Johnson coming around in his thinking on social justice to push through a civil rights platform.

These men, like most world leaders, were put in the position to lead, were expected to lead and were regularly presented with situations and issues in which they could exhibit leadership. That history bore out their judgment distinguishes them from their presidential colleagues who were defined by failure: Jimmy Carter for his inability to navigate the nation out of an oil crisis and economic “stagflation” or rescue the American hostages in Iran; James Buchanan for allowing the South to secede; Andrew Johnson, for poor leadership during Reconstruction efforts, and Warren Harding for allowing a culture of corruption to flower around him.

Wharton Professor Michael Useem calls the critical confluence of time, place, situation and individual as “The Leadership Moment,” the title of his 1998 book. While that book explores nine such leadership moments, from the man who brought Apollo 13 down to Earth to the President of El Salvador who ended his country’s civil war, Useem, too, focuses on people in power.

But leadership is much more wondrous and thrilling when it is exercised by someone without a pulpit or even an audience. It’s like grass growing in the desert. It’s why Todd Beamer resounds as a symbol bravery and grit in the face of terrorism, why Rosa Parks is synonymous with quiet grace and resolve in the face of institutionalized discrimination and why Malala Yousafzai epitomizes how a single person can stand up to a tyrannical regime.

We all greatly appreciate the tremendous sacrifices made by medical professionals, emergency responders, daycare workers, delivery drivers and workers in food and health supply chain. But there’s a special place for people whose jobs don’t require that kind of sacrifice but insert themselves into the fray. Many of them are security professionals.

It’s people like Ohad Zaidenberg, Lisa Forte, Radoslaw Gnat and Joshua Saxe, cybersecurity professionals who have created or grown groups of like-minded practitioners who volunteer their time to send threat data to healthcare institutions to help them prevent cyberattacks and damage to their resources and medical infrastructure.

It’s people like James Hankey, a security executive who took time off to connect self-isolated vulnerable people in his community with volunteers who could support and supply them with basic provisions.

It’s people like Annie Glass, a third-year criminal justice major at Northeastern University, who co-ops as a security officer at Boston Medical Center.

It’s people like Anthony Miller, who connects people vetted through the U.K.’s Security Industry Authority to help people in need or at risk due to the pandemic.

Want to call out others who have made a difference? Share some stories with me (mike@gipsinsights.com) or Diane Ritchey (ritcheyd@bnpmedia.com). We want to share your Good Security News.

Let’s not waste leadership on the leaders.

KEYWORDS: business continuity COVID-19 healthcare security leadership public safety officer risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael gips headshot
Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. Columnist image courtesy of Gips

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Red peg in a group of white pegs

    CSOs speak out on today's leadership challenges

    See More
  • Leadership Style

    Adjusting your leadership style at a new employer

    See More
  • Podcast setup

    Your favorite security leadership podcasts

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing