Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Strategic Security

Leveraging security as a business enabler

To gain leadership buy-in and a seat in the C-suite, security professionals must unearth creative strategies for developing business value.

By Alan Saquella
greeting

pixelfit / E+ via Getty Images

October 5, 2022

To be successful, the chief security officer (CSO) today must be both an MBA and a security professional.

At the security executive level, business acumen becomes a top priority. Security executives are already experts in the field, so they should focus their development on business and operational leadership to communicate effectively at the C-level.

One strategy for business-minded CSOs is to surround themselves with the best security professionals. This must include hiring physical security, investigations, risk management and other experts with varied backgrounds to support the business. Avoid the temptation to hire former colleagues, vendors and suppliers. Strong hiring practices can help CSOs excel in their strengths and minimize any weaknesses.

With a well-rounded team and a business mindset, security leaders can transition their departments from a cost center to a value add. Highly successful security organizations make the jump by using their security and investigative talent to take on more responsibilities.

In addition to expanding the responsibilities of the physical security team to recover otherwise lost revenue, as explored in Part 1, security executives can transform their departments into profit generators by implementing other business-minded tactics.


Strategic Capital Investment

In the area of strategic capital investment, many security organizations budget and build their security infrastructure in two ways:

  1. Non-regulated — Building and maintaining physical security to standards set by the CSO.
  2. Regulated — Designing and maintaining security to the requirements set by the government or regulator, often due to government contracts or as required for critical infrastructure industries.

In both cases, most organizations build to the same standard for all facilities. All warehouses, retail spaces and office buildings will have the same CCTV, access and alarms across the organizational footprint within the company, for example. Though little adjustment can be made in the regulated arena, most other businesses can modify their approach to capital spending and maintenance of the physical security within the organization.

One CSO added value to the organization by using the risk management model of assessing risk for each location and then distributing the capital investment to the locations with the highest probability of business impact. The idea was to ensure high-risk facilities were secured to the appropriately high level, while maintaining less superfluous security technology at low-risk facilities.

In those industries that build security to one standard for all locations, the high-risk locations may suffer while the low-risk locations are overbuilt. It is recommended that capital spending be allocated according to risk and probability, not one size fits all. Of course, as market, risk and probability change, adjustments to facilities in those locations should also change.


Develop Organizational Partnerships

Another area of opportunity and a capital win involved a department that historically did not partner with security.

The marketing department at the telecommunications organization approached the CSO to inquire about cameras in the retail locations. Due to a recent upgrade in camera resolution, the marketing team wanted access to cameras in retail locations to understand customer behavior.

The marketing department was interested in knowing how long customers stay in the store, which items catch their attention, which items they physically handled and purchased, as well as other behaviors.

Through a partnership with marketing and sales, access was granted to sales floor camera views in exchange for shared expense of purchases and maintenance of the cameras and recording servers. It resulted in a financial windfall for the CSO — more than $1 million. Partnerships are key to success, and collaboration is a wonderful way to share costs.

The illustration above is a good example of how a CSO who has developed strong relationships and business partners across the enterprise can grow the security function.

A robust understanding of business operations and finance and an appetite for process improvement can develop opportunities for security teams to assist in other functional areas of the business as well. The enterprise security leader, as mentioned above, should already have a strong understanding of security and investigations, and the skills the team possesses that are transferrable and valuable to other functional areas in the organization.

As a total result of the CSO’s preparation, learning, analysis and notification (PLAN) efforts, the team uncovered a 12 to 15-million-dollar opportunity for recovery and did, in fact, recover more than $10 million annually from just the areas mentioned above.

When implementing these business strategies in a security department, it is important to remember that all good programs must be regularly checked, tested and modified. It is imperative that a process be implemented and periodically audited to assure that the enhancements and programs deployed remain effective and are adjusted occasionally for maintenance.

This total figure, combined with the typical metrics communicated to senior leadership, sent a strong statement that the security department is not just a function that protects people, property and information, but also contributes to business goals, like asset protection or enterprise risk management teams.

The time to shift the security department from cost center to cost neutral — or even turn a profit for an organization — is now. In some organizations, security departments are taking on more now than they traditionally have. Security leaders must consider starting their own PLAN and look for opportunities to eliminate loss, assure revenue and get recovery. Attaining a permanent seat at the C-suite table will require this paradigm shift.


Editor’s Note: Security magazine brings this important topic to readers in a two-part series. The first part of this series: Transforming Security From Cost Center to Value Add, was published online and in our August digital edition.


For more thought-leadership content on unearthing the business value of security, visit:

Part 1: Transforming security from cost center to value add

Adding value to people and places

Enterprise security: Positioning your team as a value add, not a cost center

KEYWORDS: Chief Security Officer (CSO) risk management security director security leadership security management security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alan

Alan Saquella, CPP, is an influential security and investigations expert with more than 30 years of security and investigations experience in corporate and public organizations at the executive level. He served for many years as the Security Operations and Investigations Director at Cox Communications before assuming his current role as a faculty team member at Embry-Riddle Aeronautical University — College of Business, Security and Intelligence. Saquella is also the Director, Investigations and Research at Verensics and a Member of the Identity Theft Advisory Board. Image courtesy of Saquella

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Three women in a serious meeting

    A workplace security framework: Mitigating employee-related threats

    See More
  • Retail Security

    Navigating retail security challenges: A comprehensive approach

    See More
  • empty conference room

    5 strategies for advocating for a security budget increase

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing