Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & TrainingPhysical Security

Security Program Design: Part 1

Mastering the first step in security management: Get your facts right

In part one of the Security Program Design series, J. Nicole McDargh, VP, Safety and Loss Prevention at Domino's, gets down to some security management basics.

By J. Nicole McDargh, Contributing Writer
security management

AndreyPopov / iStock / Getty Images Plus via Getty Images

September 12, 2023

 Editor's Note: This article is the first installment of our three-part Security Program Design series from J. Nicole McDargh. Click here for part two — Strategies for developing an effective security program: Build the right solution — and part three — Presenting the security program: Win leadership buy-in.


This three-article series will explore what I argue are the three fundamentals that form the bedrock of effective security management principles:

  1. Get Your Facts Right
  2. Build the Right Solution
  3. Present the Program for the Win

In this initial installment, we will delve into the intricacies of the first pillar, Get Your Facts Right, encompassing strategies for data utilization, proper sourcing, critical analysis and rigorous fact-checking.

As security professionals, arming ourselves with accurate information and a discerning mindset is imperative for creating robust security programs that can adapt to the constantly evolving landscape of threats and challenges. However, there are some challenges and pitfalls that can cause us to stay stuck in mediocre programming or which can lead to embarrassment and back-pedaling. Here are four important steps to take when thinking about the data which should inform security and safety program decision-making.

1. Use data effectively

In a data-driven era, leveraging information to its maximum potential is quintessential for security management professionals to stay ahead of emerging risks. Effective data utilization entails employing methods to collect comprehensive data from various sources, analyze it holistically and embrace cutting-edge analytics tools. This enables security teams to extract valuable insights that inform proactive decision-making, enhance risk assessments and optimize resource allocation. By utilizing data effectively, security professionals gain a comprehensive understanding of the threats they face, enabling them to develop and implement targeted security measures.

2. Source properly and read beyond the headlines

In an age inundated with an overwhelming amount of information and clickbait, accurately sourcing information becomes paramount for security management professionals. Relying on trusted sources, cross-referencing multiple outlets and delving beyond attention-grabbing headlines are essential practices in the pursuit of reliable information.

Security practitioners should prioritize accessing information from reputable sources such as government agencies, academic institutions, industry associations and trusted news outlets. However, the responsibility for sourcing information does not stop there. It is crucial to engage in critical thinking and conduct further research to verify the credibility of sources. By assessing the qualifications and expertise of authors or organizations, evaluating data collection methods, and scrutinizing potential biases, practitioners can discern the reliability and accuracy of the information at hand.

Reading beyond headlines is equally important. Headlines often serve as teasers, designed to capture attention and generate clicks. It is essential to delve into the full article, report or study to gain a more nuanced and comprehensive understanding of the issue at hand. By avoiding hasty judgements based solely on headlines, security professionals can ensure their decision-making is well-informed and based on substantive knowledge

3. Actively avoid confirmation bias

Confirmation bias, an inherent cognitive tendency to seek and interpret information that supports existing beliefs, poses a considerable threat to unbiased security management. Recognizing and mitigating the effects of confirmation bias is of utmost importance for security professionals striving to make objective and evidence-based decisions, which will lead to program strategy and design.

One strategy to counter confirmation bias involves actively seeking diverse perspectives. Engaging with individuals who possess different backgrounds, experiences and viewpoints can challenge ingrained notions and shed light on aspects that may have been overlooked. Encouraging team members to express dissenting opinions promotes a culture of critical thinking and prevents groupthink from clouding judgement.

Promoting a culture of critical thinking is another vital step in mitigating confirmation bias. This can be achieved by encouraging rigorous debate, fostering an environment that values constructive criticism, and emphasizing the significance of evidence-based decision-making. Implementing fact-checking protocols and subjecting assumptions and assertions to scrutiny ensures that the decision-making process is grounded in objective analysis rather than personal biases.

4. Fact-check and question everything

In an era where misinformation can spread rapidly and widely, fact-checking becomes an indispensable strategy for maintaining the integrity of security management efforts. Fact-checking involves a process of cross-examining information from multiple reliable sources and engaging subject matter experts to validate data.

Developing fact-checking protocols and establishing a system that promotes collaboration and accountability is crucial. Fact-checking aligns with the age-old adage “trust but verify” — it ensures that the information upon which security decisions are based is trustworthy and accurate. By rigorously examining claims, questioning assumptions and consulting reliable sources, security professionals can detect misleading or false information before it influences critical decisions.

Sometimes incorporating subject matter experts into the fact-checking process may be critical to enhancing the overall accuracy and reliability of information. Experts bring deep knowledge and experience in their field, enabling them to identify common fallacies, discern biases and provide valuable insights that contribute to decision-making. Their involvement adds an additional layer of scrutiny that promotes thoroughness and rigor in the information verification process.

Security professionals have the privilege and responsibility to inform, advise and maybe even build programs which can and will impact people, places and things. Building an excellent program, however, shouldn’t just be left to intuition, gut feelings and experience. In order to ensure that security leaders are well informed and bolstered in their understanding of the problem, they have the responsibility to check under every rock to see if the problem is as they think it is, because it may not be.

Next month, we will dive into some strategies to help security professionals take what they’ve discovered to be the issue, and use it to build a solution that is right based on the threat to, and culture of, their institution.

KEYWORDS: bias loss prevention proactive security security management security program evaluation SME security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

J. nicole mcdargh

J. Nicole McDargh JD, CPP, is VP, Safety and Loss Prevention at Domino’s and host of the podcast Your Security Boss. Image courtesy of McDargh

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • building a strong security program

    Strategies for developing an effective security program: Build the right solution

    See More
  • Security Program Design

    Presenting the security program: Win leadership buy-in

    See More
  • Internet of Things

    The IoT Cybersecurity Improvement Act: A first step in bolstering smart technology security

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products

Events

View AllSubmit An Event
  • November 17, 2025

    SECURITY 500 Conference

    This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!