Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Leadership and ManagementPhysical Security

Mexico Security Crisis: Never Waste a Crisis

By John Rodriguez
Four people in suits
Vitaly Gariev via Unsplash
March 19, 2026

The recent crisis in Mexico with the government actions against organized crime pressure tested company security programs to protect their people, property and reputation. 

Security leaders did what they do best — they responded with comprehensive and on-going tactics and strategies with heighten focus, concern and support by senior business leaders. Security assessments and risk-based program adjustments occurred and continue.  

Now the uncertainty of what the security environment will develop into in the short, medium and long term is the challenge for security leaders and their guidance to business leaders. This is the time to positively impact your business partner status and the trust-building you strive for — don’t waste this opportunity. 

Considerations:

You have senior and local site leadership’s intensified attention — all while they focused on business continuity, enterprise risk, and their annual business plan prior to Day 1 of the crisis on Feb 22., in addition to their expectation that you are successfully managing the Mexico crisis. Now is an opportune time (timing is everything) to benefit from business leader support to potentially further enhance your security program and team and here are just four examples: 

  • Do you have a pending business case to seek CAPEX/OPEX for security technology enhancements?
  • Have you established rationale to add security professionals to your security department, or promotion(s) in title, responsibility and compensation for some in your existing team if merited?
  • Have you previously discussed with Human Resources and Operations the opportunity to assess employee engagement via pulse surveys as well as methodologies to obtain employee feedback on their perception of safety and security at work? This impacts employee engagement and talent retention.
  • Do you have vetted vendor options for Open-Source Intelligence (OSINT) and real-time event monitoring ready to present to leadership?

Some of the above ideas may benefit the entire enterprise and some may only affect one or several sites. As the senior-most security representative or a regional manager or director, and even a manager of a single site — everyone on the security team should use the same methodologies described in this article. And the team should collaborate to develop leadership understanding and support from the local Operations level to the C-suite as appropriate. 

Critical Aspects for Success:

All your requests or proposals must be in a business case structure for the highest chance of success. Coming to leaders and saying, “We need to do X right now because of this crisis”, without a comprehensive and objective assessment and rationale, especially describing the short-to-long term benefits of the investment of capital, or time with the workforce to provide security training, could undermine your efforts and more so your reputation.  

Communication 

How you communicate your business case, both written and/or a verbal presentation will affect your success or failure:

Written: Does your company have an internal business case template that you fully understand and comply with? If not, have business case format examples that other business leaders use been shared with you?

What communication styles does the person prefer? Executive summary with following details is standard. The detail section should include supporting specific information and rationale.

Verbal presentation: Have you mastered the contents of your business case to the point you can fluently and influentially deliver it in a precise and concise manner? Business leaders have many priorities that are thinking about, and like everyone else, their attention span is becoming shorter. Preparation and deliver are just as important at the contents of the business case.

Two last suggestions:

  • Be prepared for the business leader and/or their finance partner to have the perspective of, “we can’t afford it at this time,” or “we’ll weather this crisis without this.”  What will your response or reaction be? (Wisdom tip: if there is/are a site business leader(s) that support your proposal, include that information in your opening remarks — and rest assured the senior business leader will most likely seek out the supporting business leader to get their input directly). 
  • What am I missing? Always check your biases (for example, expediency and experience biases) and have the humility to ask yourself and others in your department or business partners, “What am I missing in this business case?” and adjust accordingly. 

In closing, continuously improving your security program in times of crisis is both Science (the business case and preparation) and Art (blending human nature and timing).

KEYWORDS: business value security crisis response security strategy strategic planning strategy

Share This Story

John rodriguez headshot

John Rodriguez is the founder of Empathic Security Cultures, LLC, based in Austin, Texas, with more than 43 years of pure corporate security experience working for major corporations including General Motors, Kimberly-Clark, Levi Strauss & Co., and Cardinal Health. He previously was the CSO for Temple-Inland in Austin, Texas. Rodriguez is a globally recognized security culture expert and works with global security departments and leadership teams to enhance their security programs for improved employee engagement and talent retention.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing