Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical SecurityCybersecurity News

Balancing data, leading by experience

By Thomas Kopecky
security-business-fp1170x658v.jpg

Image via Freepik

November 9, 2022

Just over a decade ago, I got my first glimpse into how digital technology would significantly change the security industry. I was working with a Fortune 500 company as an embedded contractor, and my job was to build its protective intelligence program. A seemingly innocuous comment on social media directed toward the chief executive officer (CEO) kicked off an investigation that forced us to look at multiple threat intelligence feeds.


The result: our social media commentator was actually a mentally disturbed individual with a history of violence and appeared to hold a grudge against the company and its CEO. What made this issue more alarming was that this person had signed on to volunteer at a corporate event taking place just two weeks later — which would have granted the individual VIP access to the entire facility.


Today, the volume and diversity of datasets we can access are revolutionizing our industry. Data is giving security executives new ways to proactively monitor for and mitigate risk like never before. Proper access to and management of risk data is also enabling security leaders to confidently speak the broader language of business, communicate security’s impact on business continuity, and vie for a seat at the executive table. 


Although we are playing in a different league when it comes to the tools and techniques required to detect and interpret vast amounts of information that come our way, we should always remember to balance data management with our investigative experience and professional curiosity. Security professionals bring various backgrounds from law enforcement, military and intelligence agencies, all of which have their own institutional methodologies for how things get done. This experience provides vital context and perspective that guides our decisions. Allow me to explain.

 

From Security Experts to Business Insiders 

For security professionals, entering the business world with our perspective on risk can be a source of strength. But the business world, especially the world of executive ranks, typically relies more on metrics and data to inform decision-making.


This is where things are changing, and data is giving us new ways to lead. The ability to qualify and quantify potential threats, back up insights with metrics and illustrate trends — along with the valuable crisis management expertise security professionals contributed during the pandemic — means that security professionals have the tools and information to make their case to management about new ways to reduce risk, and positively impact business operations. 


Be it from case management data, access control sensors, video cameras or integrated information systems that generate information, technology can help security teams show their value and level the playing field as effective contributors to the overall reduction of enterprise risk. 

 

A Diversity of Viewpoints Builds Strength

While we understand risks in ways that few of our colleagues can, the same is true of our colleagues in other departments, who have different viewpoints and experience, which guides the roles they perform in the company. 


For example, cybersecurity executives may understand threats to the company in ways that physical security teams don’t. Human resources (HR) teams and compliance officers also have their own perspectives — which are the product of years of experience and training in their fields. These diverse perspectives were captured in a recent study conducted by the Ontic Center for Protective Intelligence, which asked 400 executives from legal, HR, physical security, and cybersecurity how their line of business defined threats to the company. 


Respondents were asked whether “hostile written, verbal or physical actions that have the potential to compromise individuals’ mental or physical well-being at the workplace or while on duty” constituted a threat to or business risk for the company. 


More than two-thirds of physical security executives said yes, while less than half of cybersecurity executives said so. We saw the reverse when we asked about the potential compromise of company critical infrastructure and IT networks: A large majority — 70% of cybersecurity executives — defined this as a threat, but just 36 percent of physical security executives did. 


What about actions or events that might compromise the company’s ability to comply with laws and regulations? Human resources executives and legal and compliance leaders were more likely to see those as threats against the company than physical and cybersecurity executives. 


In so many cases, where an executive sits within an organization — along with the experience they bring to their role — informs their views on what constitutes a legitimate threat or business risk. 


It’s incumbent on physical security executives to understand how their counterparts may interpret data and view risks to the company based on their experience. It is important to factor in these nuances for designing effective enterprise-wide programs. Furthermore, it’s the responsibility of the security executive to better understand the priorities and mindset of C-suite executives and their supporting partners, so that their team’s value can be properly demonstrated as impactful to the entire organization.

 

Ongoing Revolution

The security world has come a long way since I began my career. When I started, there was a great deal of analog gumshoe work, which included field investigations, knocking on doors, retrieving public records at courthouses, and occasional surveillance operations. 


Data and technology have helped bring about an ongoing revolution in security that is certain to progress further. It was only 10 years ago that I envisioned a world where online databases, automated social media, and other intelligence feeds could be integrated and analyzed and assessed in real time. 


One aspect I could not foresee was the degree to which technology would facilitate communication across departments within an organization and how this collaboration could help mitigate risk. Physical security teams are working cross-functionally more to help connect the dots and keep everyone safe. But they’re also using data and technology to speak to the c-suite, to speak to their colleagues in Legal & HR, and to speak the language of risk management.


This isn’t possible with data alone, but it’s the unique combination of data and experience that produces this result.

KEYWORDS: c-suite data protection physical security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Thomas Kopecky is Ontic’s President and Chief Strategy Officer.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Guests checking in at hotel front desk

    Securing hospitality: Balancing guest experience and safety

    See More
  • Balancing Security and the Fan Experience in Sports Security

    See More
  • successful security strategy

    Leading by example

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing