Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResiliencePhysical SecurityCybersecurity News

Balancing data, leading by experience

By Thomas Kopecky
security-business-fp1170x658v.jpg

Image via Freepik

November 9, 2022

Just over a decade ago, I got my first glimpse into how digital technology would significantly change the security industry. I was working with a Fortune 500 company as an embedded contractor, and my job was to build its protective intelligence program. A seemingly innocuous comment on social media directed toward the chief executive officer (CEO) kicked off an investigation that forced us to look at multiple threat intelligence feeds.


The result: our social media commentator was actually a mentally disturbed individual with a history of violence and appeared to hold a grudge against the company and its CEO. What made this issue more alarming was that this person had signed on to volunteer at a corporate event taking place just two weeks later — which would have granted the individual VIP access to the entire facility.


Today, the volume and diversity of datasets we can access are revolutionizing our industry. Data is giving security executives new ways to proactively monitor for and mitigate risk like never before. Proper access to and management of risk data is also enabling security leaders to confidently speak the broader language of business, communicate security’s impact on business continuity, and vie for a seat at the executive table. 


Although we are playing in a different league when it comes to the tools and techniques required to detect and interpret vast amounts of information that come our way, we should always remember to balance data management with our investigative experience and professional curiosity. Security professionals bring various backgrounds from law enforcement, military and intelligence agencies, all of which have their own institutional methodologies for how things get done. This experience provides vital context and perspective that guides our decisions. Allow me to explain.

 

From Security Experts to Business Insiders 

For security professionals, entering the business world with our perspective on risk can be a source of strength. But the business world, especially the world of executive ranks, typically relies more on metrics and data to inform decision-making.


This is where things are changing, and data is giving us new ways to lead. The ability to qualify and quantify potential threats, back up insights with metrics and illustrate trends — along with the valuable crisis management expertise security professionals contributed during the pandemic — means that security professionals have the tools and information to make their case to management about new ways to reduce risk, and positively impact business operations. 


Be it from case management data, access control sensors, video cameras or integrated information systems that generate information, technology can help security teams show their value and level the playing field as effective contributors to the overall reduction of enterprise risk. 

 

A Diversity of Viewpoints Builds Strength

While we understand risks in ways that few of our colleagues can, the same is true of our colleagues in other departments, who have different viewpoints and experience, which guides the roles they perform in the company. 


For example, cybersecurity executives may understand threats to the company in ways that physical security teams don’t. Human resources (HR) teams and compliance officers also have their own perspectives — which are the product of years of experience and training in their fields. These diverse perspectives were captured in a recent study conducted by the Ontic Center for Protective Intelligence, which asked 400 executives from legal, HR, physical security, and cybersecurity how their line of business defined threats to the company. 


Respondents were asked whether “hostile written, verbal or physical actions that have the potential to compromise individuals’ mental or physical well-being at the workplace or while on duty” constituted a threat to or business risk for the company. 


More than two-thirds of physical security executives said yes, while less than half of cybersecurity executives said so. We saw the reverse when we asked about the potential compromise of company critical infrastructure and IT networks: A large majority — 70% of cybersecurity executives — defined this as a threat, but just 36 percent of physical security executives did. 


What about actions or events that might compromise the company’s ability to comply with laws and regulations? Human resources executives and legal and compliance leaders were more likely to see those as threats against the company than physical and cybersecurity executives. 


In so many cases, where an executive sits within an organization — along with the experience they bring to their role — informs their views on what constitutes a legitimate threat or business risk. 


It’s incumbent on physical security executives to understand how their counterparts may interpret data and view risks to the company based on their experience. It is important to factor in these nuances for designing effective enterprise-wide programs. Furthermore, it’s the responsibility of the security executive to better understand the priorities and mindset of C-suite executives and their supporting partners, so that their team’s value can be properly demonstrated as impactful to the entire organization.

 

Ongoing Revolution

The security world has come a long way since I began my career. When I started, there was a great deal of analog gumshoe work, which included field investigations, knocking on doors, retrieving public records at courthouses, and occasional surveillance operations. 


Data and technology have helped bring about an ongoing revolution in security that is certain to progress further. It was only 10 years ago that I envisioned a world where online databases, automated social media, and other intelligence feeds could be integrated and analyzed and assessed in real time. 


One aspect I could not foresee was the degree to which technology would facilitate communication across departments within an organization and how this collaboration could help mitigate risk. Physical security teams are working cross-functionally more to help connect the dots and keep everyone safe. But they’re also using data and technology to speak to the c-suite, to speak to their colleagues in Legal & HR, and to speak the language of risk management.


This isn’t possible with data alone, but it’s the unique combination of data and experience that produces this result.

KEYWORDS: c-suite data protection physical security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Thomas Kopecky is Ontic’s President and Chief Strategy Officer.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • American flag in front of building columns

    CISA announces secure by design pledges from leading tech providers

    See More
  • SEC0820-Data-Feat-slide1_900px.jpg

    Data Protection by Design: Eight Questions to Help Protect User Data from the Start

    See More
  • Leading the Troops at TSA

    See More

Events

View AllSubmit An Event
  • September 25, 2024

    How to Incorporate Security Into Your Company Culture

    ON DEMAND: From this webinar, you will learn how to promote collaboration between IT and physical security teams to streamline corporate security initiatives.
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!