Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsLeadership & ManagementSecurity Leadership and ManagementSecurity Education & Training

Leadership & Management

The gorilla in your security plan

Risk is truly dynamic, and assessments should be frequent, taking into account political, economic and social developments; industry trends; new technology; and more.

By Michael Gips
Gorilla

Freder / E+ via Getty Images

leader ship and management
Gorilla
leader ship and management
September 14, 2023

In a famous ongoing experiment, subjects are asked to watch a short video featuring three people in white t-shirts and three people in black t-shirts passing basketballs. Subjects are asked to silently count the number of passes made by the people in white shirts. The six players move around, change positions, fake tosses and otherwise make it difficult to track the pass count.

During the video, a woman dressed in a gorilla suit walks among the players, turns to the camera, thumps her chest, and walks out of the picture. Half of the viewers concentrate so fully on counting the passes that they never see the gorilla. (I missed it too.) When you watch the video without fixating on the passes, it is shocking to realize that you could have possibly missed the great ape. (The experiment is online here.)

According to Daniel Kahneman in his 2011 bestseller Thinking, Fast and Slow, the study reveals two important things: “We can be blind to the obvious, and we are also blind to our blindness.”

That’s a particularly bad place to be as a security professional.

Yet we often get stuck in ruts and enslaved by our own biases. We may unconsciously give in to the anchoring effect, whereby, for example, reading about a specific risk probability in a magazine case study embeds that number into the assessment of risk in our own security environment, despite the situation having no correlation with the case study.

Or we may succumb to the availability heuristic, in which while determining the likelihood of an event, we give undue weight to immediate examples that come to mind. For example, a security practitioner for a retailer may instantly recall the heavy media coverage of shoplifters cleaning out stores with impunity and tailor the retailer’s security approach accordingly, even if a risk assessment would have dictated otherwise.

The list of cognitive biases is long: confirmation bias, framing effect, hindsight, outcome bias, attribution bias, groupthink, recency bias and the default effect, to name a few. They each furtively impede our thinking.

I asked industry experts how to avoid these traps — to see the gorillas while counting basketball passes. Adriaan Bosch, a senior security consultant at Buro Happold in London, England, notes that part of the problem is our obsession with metrics. “The nature of our profession is to create structures that can be measured and quantified, and thus there are so many standards and guidelines,” Bosch says. “The problem is that the threat is often dynamic, and adversaries are able to develop strategies to counter the well-intended structures and standards.” Getting past that mindset is difficult, he continues. “I have often hit a wall where I would suggest a new mitigation method and the response would be: ‘Where has this been tested,’ or ‘To what standard is this aligned?’”

Susana Marquez Pedrouso, a Spain-based security and loss prevention professional, points out that the most recent prominent example of focusing on the wrong things is the Covid pandemic. Relatively few companies had detailed business continuity plans for a virus; fewer still were prepared for years-long disruption.

“That’s why I believe the obsession to structure risk and crisis management to the limit is creating a very slow capacity to react in many organizations,” she says. “There has to be room to be creative, to innovate, to understand threats and consequences which might never have nailed down.”

Pedrouso echoes Bosch’s comments about the predominance of metrics. “I’m finding more and more security departments drowning in KPIs and protocols, reducing the capacity to perceive new issues and anticipate from a fresh perspective,” she says.

The upshot is that we must continually keep an open mind when thinking about threats, risks and vulnerabilities. Risk is truly dynamic, and assessments should be frequent, taking into account such factors as political, economic and social developments, trends in specific industries, new technology, cultural shifts in the workforce, and so on.

Doing so continuously is a monumental task, perhaps impossible. But doing so regularly and often is realistic.

It’s when we work with blinders on that the gorilla of unforeseen threats strolls into our midst. And, we all know what an 800-pound gorilla does when it shows up: anything it wants.

KEYWORDS: crisis management risk assessment security planning threat assessment threat management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael gips headshot
Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. Columnist image courtesy of Gips

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Podcast setup

    Your favorite security leadership podcasts

    See More
  • Thought bubbles

    Lessons from the Security 500 Conference: The good, the bad, and the ugly

    See More
  • weather-disaster-unsplash1170.jpg

    Four disruptions to plan for in the event of severe weather

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing