Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Education & Training

Tackling complacency in the GSOC

By Sherman Brawner
SEC1220-Edu-Feat-slide1_900px
SEC1220-Edu-slide2_900px
SEC1220-Edu-Feat-slide1_900px
SEC1220-Edu-slide2_900px
December 14, 2020

It’s a typical day in the Global Security Operations Center (GSOC). The anticipated chatter on the phones, radio communication, and sounds of the software giving audible alerts are all what you’ve come to expect in this busy hub of the security program.

Stepping back and looking at the operations center, you see what you would expect and feel a touch of pride and accomplishment. There is an impressive video wall with dozens of camera images, and people in sharp-looking regulation uniforms who were carefully selected using screening criteria you have provided. Everyone has been through the sensitivity, cultural and company orientations required to be a team member of the GSOC and broader organization.

The Security Operations Center (SOC) agents have arrived on-time and you have observed a turn-over routine as the agents who have completed their shifts hand over the reins to the team coming on duty.

The software used to notify the SOC agents of any incoming alerts from the intrusion alarm devices is in place and working properly, which is the reason for the incessant audible notifications everyone is successfully ignoring.

Everything seems to be in order and exactly as you would have expected. You exhale the breath you’ve been holding while examining the situation, and you feel a sense of relief.

But is it really what you expected? Or does it just seem to be? What happens when we take away our filter of predisposition on the images of the SOC and look below the surface?

The near non-stop sounds of alerts have become normal and you have learned to tune them out. It seems the normal day-to-day routine of personnel ignoring the established policies has everyone in the mode of accepting hundreds of alerts each day for something that’s supposed to be an exception event.

But everyone is aware these are nuisance alarms and not actually something to be concerned about, right?

Why does this happen? And how did it evolve into an operational state which is now just “noise” from these intrusion sensors?

The GSOC has many facets and provides several functional security roles. From answering the phone for lost access control credentials to situational intelligence and threat assessment, there are dozens of connections to the organization and its operations, brand name, security posture, as well as guest and employee safety.

When this complex and carefully designed assembly of “people, processes and technology” were chosen, each aspect of the security and operational readiness objectives for the organization was examined.

After the budget and operating objectives were established, it was time to get the program set up and running. Of course, there were small gaps and minor changes to get the operation established, measuring the right performance indicators, and delivering reports that would substantiate its success. Now it was time to step back and watch this well-oiled machine run and deliver what was expected.

Remembering the compromises that had to be made and the hard-fought budget discussions to be funded, not only in the beginning but at each new fiscal year planning session, creates a question mark that begins to form at the edge of your security consciousness. Is the program still operating efficiently? Is the value both real and demonstrable to the larger organization and its leadership?

Are we accepting some things as normal that should be looked at more closely? Has the GSOC become complacent? Are there changes which have taken place in the overall organization, and the threats which have entered its operating realm, that have made new gaps that are now exposed but not yet clearly in focus and seen? Have the people we brought on board become familiar with the kinds of exceptions that are easier to ignore than to have resolved?

Did the overall organization decide that since you have a 24 hour-per-day, 7 day-per-week operation, you could also take some non-security related calls or e-mails? Things such as facility or engineering requests? Complaints or concierge calls for travelers or new employees in hard-to-fill positions? Are you now also creating service tickets for housekeeping or maintenance requests?

While it’s expected for the GSOC to be a team player and do what’s necessary to keep your funding and be a valued part of the organization, don’t lose sight of the primary objectives. The Security Program is job #1 and the reason GSOC agents have all of the tools at their disposal. They have to remain current, vigilant, and have the mission of the security program in the crosshairs every hour of every single day.

With those filters off of our eyes, we see how alerts from nuisance sensors are being ignored or acknowledged but then deleted from the alarm queue. We also see how our agents have become familiar with each other and what they do day-to-day, which leads to shortcuts and failure to use all of the authentication protocols. The state of readiness for the inevitable critical event will not lead to a smooth, efficient and unemotional response when it arrives.

Being prepared means looking at the GSOC and its components regularly against a backdrop for the circumstances evolving in the ever-changing world of risk, threats and vulnerability. We must keep in mind that the broader organization will evolve and adapt, as does the security industry. Preparations have to consider the dynamic forces at work around us for socioeconomic and environmental implications.

Don’t fall short when it counts and make your GSOC the next weak link in the chain of protection for the organization. Complacency can literally cost your organization in terms of assets, personnel protection, brand name recognition and reputation.

Remember this: even if you are on the right track, you’ll be run over if you don’t keep moving.

KEYWORDS: cyber security endpoint security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sherman Brawner is Vice President & General Manager at Allied Universal Technology Services. He can be reached at sherman.brawner@aus.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Cybercrime

    Tackling the cybercrime pandemic in 2021

    See More
  • NFL GSOC COVID Heroes

    The NFL’s GSOC takes center stage in getting players back on the field

    See More
  • Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing