Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceCybersecurity NewsTop Cybersecurity Leaders

Special Report

2021 Top Cybersecurity Leaders - Spencer Wilcox

CPP, CISSP, CSA, Executive Director, Technology and Chief Security Officer, PNM Resources

By Maria Henriquez
SEC0321-Cover-Wilcox-slide12_900px

Bio Image courtesy of Wilcox — in-future / iStock / Getty Images Plus / via Getty Images

March 1, 2021

Spencer Wilcox first started his career in cybersecurity while in law enforcement in the Commonwealth of Virginia. With training in computer forensics and cyber investigations from the Federal Bureau of Investigation (FBI), Wilcox transitioned to the energy industry at Constellation Energy as a DFIR (Digital Forensics and Incident Response) investigator and has held positions in cyber and physical security leadership ever since.

Now, as Executive Director of Technology and Chief Security Officer (CSO) at PNM Resources, Wilcox oversees a highly-skilled and dynamic team of nearly two dozen security staff, where he has successfully managed and overseen various security projects. Beginning in 2018, Wilcox led a realignment of the organization to help ensure that both cyber and infrastructure teams would have a mutual stake in vulnerability management outcomes, and use similar tools and platforms for metrics identification, alerting and notifications, helping the organization to drive mutual accountability for the security process. He has developed the security program at the organization, with nearly 100% of cyber analysts achieving a nationally recognized certification in the past two years.

He led the organization’s critical staff, along with state, federal and local participants to collaboratively engage in the semi-annual GridEx exercise that simulates cyber and physical attacks on the electric grid and infrastructure. Previously the company engaged alone in the exercise. Under Wilcox’s influence, and with the collaboration of his federal, state and local colleagues, the 2019 exercise included New Mexico participants from the Department of Energy, Department of Defense, National Nuclear Security Administration, Federal Bureau of Investigation, Department of Homeland Security, State of New Mexico Department of Homeland Security and Emergency Management, and City and County Emergency Management participants.

In addition to delivering an enterprise-wide phishing awareness program that demonstrated a reduction in phishing susceptibility to below 1%, Wilcox developed a crisis management program that has been instrumental in managing business continuity through the pandemic, to include secure remote access and communications.

Wilcox also implemented S3R3 strategy for technology and security. S3R3 stands for Simplify, Standardize, and Secure by making Resilient, Redundant and Reliable (S3R3). The strategy uses the NIST cybersecurity framework, and focuses on recovery first, to ensure that the enterprise can recover from all hazards, and reduces complexity through the implementation of standard technologies and processes in a secure fashion. As Wilcox says, “we realized that we have to assume that we are breached, and continue to keep the lights on and the beer cold, every day, while living in this hostile and contested environment.”

Though there are many aspects of his extensive career Wilcox is proud of, one project that comes to mind is having the opportunity to build a communications paradigm for cyber and physical security that is easily reproducible and helps gets the message out.

“Several years ago, my team and I were having a difficult time explaining security issues. Our business customers regularly believed that cybersecurity was a James Bond problem. They thought that their information was not that valuable, so clearly there was no need to worry about it. They believed that cybersecurity was a matter of firewalls, anti-virus and background screens, just like physical security was about gates, guns and guards. They thought, “who would really want to break in and steal what we have or know?”

Wilcox discussed this with his team, and they tried several different mechanisms: a risk model approach, using heat maps; kill chains; and threat models. While they were successful for communications to boards of directors and/or technical teams, they were insufficient to spur action or acceptance from business users, he says.

One evening while working on a paper for the International Security Management Association’s security leadership course at Georgetown University, he says, “the answer became abundantly clear: We needed to communicate the Threat, the Impact to the business if the threat were actualized, our Response to the threat, and our Expectations of the business, in a simple easy to understand message. One that got to the heart of the issue without creating fear, uncertainty and doubt. One that explained the situation, the impact of the situation on the business, what we were already doing about it, and what we needed from them. Threat, Impact, Response, Expectations or TIRE. A simple paradigm for cybersecurity risk communication that gets action from the recipient.”

With the introduction of the TIRE methodology, his team began to communicate like a business partner. “We ceased to dump our expectations on the business, and instead focused on the outcome, not the cause," according to Wilcox. "We started to rethink our purpose and our style, and we began to evolve into a modern risk-based security organization. We were able to train our people to communicate a little more effectively, a little more proactively, and we could do so with one simple word: TIRE.”

KEYWORDS: business continuity cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0321-Cover-Estlick-slide6_900px

    2021 Top Cybersecurity Leaders - Dave Estlick

    See More
  • SEC0321-Cover-Grafenstine-slide8_900px

    2021 Top Cybersecurity Leaders - Theresa Grafenstine

    See More
  • SEC0321-Cover-Sewell-slide11_900px

    2021 Top Cybersecurity Leaders - Grant Sewell

    See More

Related Products

See More Products
  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing