Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical Security

The changing role of security

Hear from Security's Editorial Advisory Board members about their thoughts on the changing role of security in the enterprise.

By Maria Henriquez
SEC0121-Roundtable-Feat-slide1_900px
SEC0121-Roundtable-slide2_900px
SEC0121-Roundtable-Feat-slide1_900px
SEC0121-Roundtable-slide2_900px
January 6, 2021

Traditionally, security leaders are tasked with protecting physical and digital assets and reduce risk utilizing preventive safeguards within the organization. In 2020, however, security leaders saw their roles change significantly and were forced to update emergency preparedness plans, undertake risk assessments and oversee health-related concerns and procedures in reaction to the COVID-19 outbreak, social and civil unrest, the election and more. This year, security departments have significantly broadened their scope to understand new needs and risks facing their enterprises, as well as how to adapt to a highly reactive environment.

To get some insight on the changing role of security, Security magazine held a roundtable discussion on this very broad subject with our Editorial Advisory Board, comprised of eight industry and thought-leaders. Here are some excerpts from that discussion. To see much more of the roundtable, visit www.securitymagazine.com/videos.

 

Steven Antoine
Chief Security Officer for Yum! Brands Inc.:

We’re a restaurant company. Since its inception, we’ve focused on loss prevention. However, the concept of enterprise risk management is relatively new compared to the history of the business itself, and the value proposition has changed. It has moved from traditional loss prevention concepts such as cameras, guards and the slippage, to providing measures that are proactive, preventative, forward leaning, and focused on duty of care. In today’s age, security has evolved into managing pandemic response, risk and resilience. Security is being integrated into business conversations at the highest of levels, connected to every part and brand of the business. The evolution is so significant that we don’t call it security – we call it risk and resilience. Overall, it’s a process of reshaping and reframing how we contribute to the bottom line of the organization.

 

Kristine Raad
Director of Global Security for Owens Corning:

Security is transforming, and the key attribute that security professionals need now is business acumen. Enterprise security is required to think and develop solutions that serve across multiple functions, and not just within siloes. The goal of those solutions should be designed for business activity to build and demonstrate value for all security investments the company makes. Security leaders need to be agile thinkers, as well as anticipate how security goals and objectives can create value for various areas.

There has also been a shift into data-driven decisionmaking, and using data to not rely on the status quo. Enterprise security leaders are becoming more sophisticated practitioners of how to actually convert data into business intelligence and to identify the top priorities.

 

Karl Perman
Management consultant specializing in risk management, cyber and physical security and regulatory compliance across critical infrastructures:

People have that preconceived notion when they hear security: gates, guns and guards. I remember the days in the basement, where security used to be located. Over 20 years, we have evolved into enterprise risk management and have started to get a seat at the table. Although many people think it is a new concept, enterprise risk and resilience is not new. It has always been about an intersection of business continuity, continuity of operations, security, assets, people, and the technology, or whatever you make, are all protected. It’s about resilience, especially with COVID-19. I tell people all the time, “I’m a business person first, and I’m a security practitioner second.” My job is to better accomplish business objectives through effective security solutions. That is what security should be about: a business enabler, not a business disabler.

 

Kirsten Provence, L.C.B.
Senior Manager, Supply Chain Security & Organizational Executive Strategy & Business Operations for The Boeing Company’s Security & Fire Protection (S&FP) organization:

The role of security and of security analysts has evolved. Historically, it has been a tactical responsibility, but now security is a significant contributor to the organization. It’s becoming more evident there’s a career path into this industry, quickly helping it become a more attractive field for people to join.

Over the years, the importance of having an internal integrated network has also grown. It is not just a siloed security organization anymore, we have a seat at the table, including supply chain partners, manufacturing partners, or other internal business partners. Now, it’s also important that external business partners and service providers of any security systems are invited to the table to be able to integrate a network based on design structure and on an “all-hazards approach,” allowing security leaders to pick and choose which business continuity plan to execute when they need it.

 

Jim Sawyer, CPP, CHPA
Director of Security Services for Seattle Children’s Hospital:

The modern security profession is integrated into every fabric of an organization. One of the foundations of the standards for modern security is emphasizing the science of prevention, and specifically of de-escalation to protect all assets.

Right now, about 70 million guns were sold during the month prior to the election. To say that the U.S. is an armed camp is an understatement. This has further added to the challenges we face every day in every security sector. In healthcare, it’s important that we now integrate security and the concept of safety, prevention and de-escalation into the very fabric of every partner to the organization, to help ensure a therapeutic and safe work and healing environment.

 

Guy M. Grace
Chairman of the Advisory Committee for Partner Alliance for Safer Schools:

In the K-12 sector, we have evolved in implementing technology, emergency preparedness and mental health in our safety and security plans. We’ve had to learn and implement the technology side into threat assessments, as well as consider how we deal with the people we protect, including where they gather. It is centered around people feeling safe in their environment. That’s our role; we have to be ready for all hazards and manage negative behaviors of people to enhance our workplace. We have evolved in technology and emergency preparedness in the last 30 years, but we have a long way to go in understanding behavior and mental health in K through 12, and in all security sectors. When I think about my career and the many things we have had to mitigate, it has required a willingness to evolve, to be humble all the time, and be willing to learn from others.

 

Jeffrey D. Hauk, MSA, CPP, PEM, CAS, CPTED, SHRM-CP
Director, Public Safety and Police Authority Services at Memorial Healthcare, Owosso, Mich.:

Along with the challenges of our risk landscape, the security industry is in the midst of a huge technological revolution. The volatility of emerging and morphing threats, from both a domestic and global perspective, presents us with some formidable risks that will require new and innovative security solutions and countermeasures to properly address, contain and mitigate. Traditional security functions, roles and responsibilities are converging around data-enabled solutions and technological capabilities. The next generation of security leaders will be required to adapt to the digital constructs across all their business processes and programs.

The next generation of security professionals will require more unique skillsets, tools and knowledge than has been required in the past. Leadership, advanced business degrees and technical degrees in computer science, cybersecurity and artificial intelligence (AI) will be foundational.

 

Dean C. Alexander, J.D., LL.M.
Director, Homeland Security Research Program and Professor, Homeland Security at the School of Law Enforcement and Justice Administration, Western Illinois University:

Security threats have certainly evolved. The threat from domestic terror and extremist groups has significantly increased over the years. Nation-state threat actors, such as North Korea, Russia, China, are more than ever targeting government agencies or public and private companies, to gain access to valuable data or intelligence or with a goal to disseminate disinformation and misinformation. Lone wolf terrorism is also emerging as one of the most deadly and frequent threats. Some of the highest number of deaths, in many cases are perpetrated by the lone wolf. Recent incidents in Norway, New Zealand or Las Vegas, have demonstrated that the danger of a lone actor is growing.

People are embracing extremist ideologies, which has added to the risks that enterprise security faces. Now, we have an increased susceptibility of customers and employees to be influenced by misinformation and disinformation.

KEYWORDS: business continuity enterprise security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cover story

    The Changing Role of the CISO

    See More
  • The High Tech Security Officer

    High-Tech Guard Solutions and the Security Officer's Changing Role

    See More
  • IFPO webinar

    IFPO webinar to focus on changing role of frontline security staff

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!