Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementPhysicalLeadership & ManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Leadership & Management

Is our leadership approach stuck in the 1840s?

The world today moves at lightning speed, but perhaps our understanding of leadership is still tethered to theories of old.

By Michael Gips
man talking

JohnnyGreig / E+ via Getty Images

leader ship and management
man talking
leader ship and management
October 10, 2022

Today’s world moves lightning fast. The 24-hour news cycle has diminished to the time it takes to refresh a website. Technology becomes obsolete the moment it comes out on the market. Fortunes are won and lost on Wall Street by one computer outjockeying another by nanoseconds.

But are our notions of leadership keeping up with the times? Or are we tethered to leadership theories that don’t serve the modern world?

Leadership studies can be traced back to the 1840s with the emergence of the Great Man Theory. Originated by Scottish philosopher Thomas Carlyle, this philosophy contends that leaders are born, not made.

We still see remnants of this thinking throughout business today, when executives are chosen by pedigree or title. That might include a company hiring a decorated and well-respected military official or government bigwig with no business acumen or emotional intelligence as the new chief security officer (CSO).

Early in the 20th century, the Trait Theory emerged. Trait Theory posits that people can become great leaders by improving skills typically found in leaders. Those characteristics include intelligence, self-confidence, initiative, persistence and so on.

Among the problems with this theory is that no one could agree on the specific leadership traits; other leadership factors are ignored; and no tests exist to measure these traits or how well they perform. Trait Theory in security today may take the form of identifying, grooming and coaching young professionals for leadership positions based on observing specific characteristics commonly associated with leadership.

In the 1970s, Paul Hersey and Ken Blanchard’s Situational Leadership theory gained currency. This theory says that no one single style of leadership is optimal; leadership must be adapted to both the people who need to be influenced and the task that needs to be accomplished.

Hersey and Blanchard viewed leadership as falling into one of four behavioral styles — delegating, participating, selling or telling. For all Situational Leadership’s advantages — flexibility chief among them — not all leaders can adapt in the way prescribed. In addition, shifting between leadership styles can confuse followers or reporting staff. In security, which is often compliance-based, Situational Leadership can come across as flaky or inconsistent.

Transactional Leadership, which gained popularity in the early 1980s, is a structured method for optimizing staff performance that relies on the carrot and stick approach to motivate employees. Leaders do not actively engage their staff; they intervene only when an issue arises.

Transactional Leadership may be found in security departments that are under pressure to reduce or minimize costs. Expected to achieve an ongoing sequence of short-term goals, these leaders set specific tasks for their staff and entice them with rewards.

Another method is Transformational Leadership, which emerged around the same time. With Transformational Leadership, leaders inspire their staff to collaborate toward a shared vision.

Servant Leadership stands traditional leadership on its head. With servant leadership, leaders serve those who report to them, ensuring that they develop, have necessary resources, feel empowered and otherwise thrive.

Although the theory hatched 50 years ago, Servant Leadership has truly blossomed since the turn of the millennium. Focusing on empathy and transparency, it remains one of the most prominent leadership approaches today. One of its most ardent practitioners and advocates is Mike Howard, the former CSO of Microsoft and author of “The Art of Ronin Leadership.”

This quick hopscotch through the history of leadership theory omits several other philosophies that have found favor, but they all overlap and coexist in many ways.

What’s clear is that there is no magic formula for security leadership — or any leadership for that matter. While the Great Man Theory might be considered archaic today, it’s a good thing that leadership principles don’t change at the speed of Google. Being a leader is a lifelong process.

As Mike Howard puts it in the first chapter of “The Art of Ronin Leadership,” “In the… journey to becoming a great strategic leader, I always like to say you must crawl, walk and then run.”


For more Leadership & Management columns, click here. 

KEYWORDS: enterprise security risk management security leadership security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael gips headshot
Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. Columnist image courtesy of Gips

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0820-Leadership-Feat-slide1_900px

    Driving the leadership Zamboni

    See More
  • cybersecurity-freepik1170x658.jpg

    Convergence is the answer for a defense-in-depth approach

    See More
  • Movie board with popcorn

    Leadership lessons at the movies

    See More

Related Products

See More Products
  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing