Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSectorsThe Security Benchmark ReportSecurity Enterprise ServicesSecurity Leadership and ManagementPhysical SecurityBanking/Finance/Insurance

The Security Benchmark Report – Leader Profiles

Todd Vigneault: Focusing on risk and intelligence

Insurance Co.

By Maggie Shein
todd vigneault

Todd Vigneault, Director of Security and Safety Insurance Co.

Bio image courtesy of Todd Vigneault. Ju Photographer / Getty Images Plus via Getty Images

November 11, 2021

This insurance company is an 85-year-old private business (and the second-largest auto insurer in the United States), with more than 42,000 employees and 10 campuses around the U.S.

About five years ago, Todd Vigneault, Director of Safety and Security, was the first physical security leader hired into such a role at the company, but security and safety is certainly not an afterthought. In fact, the insurance company built a robust, mature cybersecurity program and team years ago, and company leadership recognized the need for a robust, mature physical security program and team to follow.

2021 Security Benchmark Index

Main Report

Sector Reports

About the Report

Security Leader Profiles

Download PDF of Full Report

Security Benchmark Report Archives

Indeed, it was the existing chief information security officer (CISO) that recognized the need for, and championed the idea of, building a just-as-robust physical security program to focus specifically on safety, security and insider threat management.

Prior to Vigneault’s role, physical security was largely siloed and ran independently at each of its locations. Within 10 regions, for example, the company had eight different contract security suppliers. “Operating separately was a damper on our progress,” Vigneault says. “We had a roadmap in mind, and we knew where we would like to end up. It’s important to have all the security staff operating like one big corporation.”

For example, a few of the company’s locations in close proximity with one another previously had separate contract suppliers and very little cross communication. Over time, as contracts have been consolidated, technology has been upgraded and communication procedures have been set in place. Now, security teams on the ground at locations can communicate, share intelligence and even share resources to make sure the whole organization is on the same page, Vigneault says.

“Company leadership is so supportive and recognizes the importance of what we are doing. And because they knew that the cyber team had walked this path several years ago prior to physical security, they had a model to see what could be done,” Vigneault says. “When you’re building a program, it’s a journey, and you don’t just pump out documents and tell people what to do. It’s important to have that roadmap and programmatically build it out to get there, while building trust and truly understanding the corporate culture and the critical areas of importance.”

Over the past five years, the physical security team has continued to grow, mature and evolve, all with the focus of being a business enabler for the greater organization. The physical security team reports to the CISO, who oversees both the physical and cybersecurity programs. Because of the way the team is structured, Vigneault says, the physical and cyber teams are truly integrated and work hand-in-hand on projects or processes that call for an all-hands-on-deck approach, such as investigations, responses to incidents, insider threats, etc. “Working as closely as we do with the cybersecurity side and really positioning ourselves as one department to manage risk — I think that helps the organization tremendously,” he says.

TOP 3 CRITICAL ISSUES:

• Business Continuity and Resilience
• Crisis Management
• Insider Threats

Vigneault says that the security team’s focus is on an enterprise risk security model for the entire organization. The corporate security team is organized into four pillars: technical operations and security systems; security operational delivery; safety and administrative; and programs and initiatives.

With approximately 30 full-time security team employees and 200-plus partner-supplied boots on the ground managing day-to-day security tasks, the leadership team has been focused on increasing intelligence across the security team as well as the entire enterprise in a number of ways.

One of those ways, accelerated by COVID-19 and the majority of the company’s workforce shifting to a remote work policy, has been infusing new technology and leveraging existing technology into the business to gain more value from the data being collected, and also to be less dependent on contract suppliers. “The more we leverage some of that technology, the more it has enabled us to centralize some of our services,” Vigneault says.

The security team has focused on fewer total systems, a smaller total footprint and increased intelligence with its technology plans. For example, the organization moved to leverage its access control system and add additional modules to expand visitor management capabilities without the need for a separate system. In addition, Vigneault says that the team recently implemented an enterprise-wide security management software, as well as a risk-intelligence platform across the enterprise that allows for centralized intelligence, access and visitor management. “Our intent is to have as few panes of glass as possible to get to events, incidents or risks,” he says.

In the near future, the cyber and physical security teams will centralize intelligence even further by merging their two security operations centers (SOCs). “We will be a joint SOC together, which will not only allow us to control and manage our operational costs more efficiently, but it will allow us to strengthen those partnerships, focus on threat management and really triage incidents in an efficient, streamlined way,” Vigneault says.

For Vigneault, who came from an earlier career in the U.S. Marines before entering into the world of corporate security, the support that the executive team gives to the security organization is a breath of fresh air. “The leadership team here really cares. I don’t know that I’ve ever seen this level of support from leadership,” Vigneault says. “They understand risk, they are willing to listen, and not only do they support security as a part of the organization, but they promote it too. They want to raise the importance of security, and I think that’s just amazing. It helps position us for success.”


Back to The Security Benchmark Report article!
KEYWORDS: enterprise risk management insider threats security thought leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • future workplace

    The case for security intelligence

    See More
  • Mayo Clinic’s Global Security team

    Mayo Clinic’s Global Security team works together to mitigate risk

    See More
  • Ground Zero 9/11 terrorist attacks 20th anniversary

    The 20th anniversary of September 11: Reflections on the evolution of enterprise security

    See More

Related Products

See More Products
  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing