Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementPhysicalLeadership & ManagementSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Leadership & Management

Is our leadership approach stuck in the 1840s?

The world today moves at lightning speed, but perhaps our understanding of leadership is still tethered to theories of old.

By Michael Gips
man talking

JohnnyGreig / E+ via Getty Images

leader ship and management
man talking
leader ship and management
October 10, 2022

Today’s world moves lightning fast. The 24-hour news cycle has diminished to the time it takes to refresh a website. Technology becomes obsolete the moment it comes out on the market. Fortunes are won and lost on Wall Street by one computer outjockeying another by nanoseconds.

But are our notions of leadership keeping up with the times? Or are we tethered to leadership theories that don’t serve the modern world?

Leadership studies can be traced back to the 1840s with the emergence of the Great Man Theory. Originated by Scottish philosopher Thomas Carlyle, this philosophy contends that leaders are born, not made.

We still see remnants of this thinking throughout business today, when executives are chosen by pedigree or title. That might include a company hiring a decorated and well-respected military official or government bigwig with no business acumen or emotional intelligence as the new chief security officer (CSO).

Early in the 20th century, the Trait Theory emerged. Trait Theory posits that people can become great leaders by improving skills typically found in leaders. Those characteristics include intelligence, self-confidence, initiative, persistence and so on.

Among the problems with this theory is that no one could agree on the specific leadership traits; other leadership factors are ignored; and no tests exist to measure these traits or how well they perform. Trait Theory in security today may take the form of identifying, grooming and coaching young professionals for leadership positions based on observing specific characteristics commonly associated with leadership.

In the 1970s, Paul Hersey and Ken Blanchard’s Situational Leadership theory gained currency. This theory says that no one single style of leadership is optimal; leadership must be adapted to both the people who need to be influenced and the task that needs to be accomplished.

Hersey and Blanchard viewed leadership as falling into one of four behavioral styles — delegating, participating, selling or telling. For all Situational Leadership’s advantages — flexibility chief among them — not all leaders can adapt in the way prescribed. In addition, shifting between leadership styles can confuse followers or reporting staff. In security, which is often compliance-based, Situational Leadership can come across as flaky or inconsistent.

Transactional Leadership, which gained popularity in the early 1980s, is a structured method for optimizing staff performance that relies on the carrot and stick approach to motivate employees. Leaders do not actively engage their staff; they intervene only when an issue arises.

Transactional Leadership may be found in security departments that are under pressure to reduce or minimize costs. Expected to achieve an ongoing sequence of short-term goals, these leaders set specific tasks for their staff and entice them with rewards.

Another method is Transformational Leadership, which emerged around the same time. With Transformational Leadership, leaders inspire their staff to collaborate toward a shared vision.

Servant Leadership stands traditional leadership on its head. With servant leadership, leaders serve those who report to them, ensuring that they develop, have necessary resources, feel empowered and otherwise thrive.

Although the theory hatched 50 years ago, Servant Leadership has truly blossomed since the turn of the millennium. Focusing on empathy and transparency, it remains one of the most prominent leadership approaches today. One of its most ardent practitioners and advocates is Mike Howard, the former CSO of Microsoft and author of “The Art of Ronin Leadership.”

This quick hopscotch through the history of leadership theory omits several other philosophies that have found favor, but they all overlap and coexist in many ways.

What’s clear is that there is no magic formula for security leadership — or any leadership for that matter. While the Great Man Theory might be considered archaic today, it’s a good thing that leadership principles don’t change at the speed of Google. Being a leader is a lifelong process.

As Mike Howard puts it in the first chapter of “The Art of Ronin Leadership,” “In the… journey to becoming a great strategic leader, I always like to say you must crawl, walk and then run.”


For more Leadership & Management columns, click here. 

KEYWORDS: enterprise security risk management security leadership security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael gips headshot
Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. Columnist image courtesy of Gips

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Gift of Leadership

    The Gift of Leadership

    See More
  • SEC0820-Leadership-Feat-slide1_900px

    Driving the leadership Zamboni

    See More
  • cybersecurity-freepik1170x658.jpg

    Convergence is the answer for a defense-in-depth approach

    See More

Related Products

See More Products
  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

See More Products

Events

View AllSubmit An Event
  • April 15, 2026

    How AI is Closing the Decision Gap in Leading GSOCs

    Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing