From the U.S. Department of Homeland Security, American International Group and the New York New Jersey Port Authority to Xerox, the University of Illinois and the state of Alabama, organizations and their security operations are similar as well as different. Of course, you don’t have to be the biggest to be the best, but it sure helps. There’s no doubt that those chief security officers, security directors and managers in this second annual Security 500 face common and unique pressures because of higher visibility by their CEOs, stakeholders, Wall Street, the media, criminals and terrorists.

EXECUTIVE SUMMARY

Since last year’s ground-breaking Security 500, security continued its positive evolution with critical measures of organizational and professional development. With this report, Security Magazine identified ten distinct management trends. There’s also an intangible that these successful leaders share – passion. It was evident across the top organizations interviewed.

Eight of the trends relate to organizational change and two are changes impacting the security leadership role.
  1. The “Cs” Are Getting It!
  2. The Security Organization’s Role Continues to Expand and Evolve
  3. The Best Security Leaders Are Proactive and Visible
  4. Preparedness is the BUZZ Word
  5. Visibility is Back
  6. Organizational Issues Around Security Are Being Sorted Out
  7. Initial Planning and Design Increasingly Includes Security
  8. Technology Design Is Being Driven by Security Specifications
  9. Career Security Professionals are Crossing the Chasm to Successful Business Executives
  10. You’re Global!


COMPARED: 2007 TO 2006 FINDINGS

The most significant differences: a movement from “what security should be doing” toward a significant percentage of organizations proactively taking action to implement strategies. Executive management and Boards have turned their attention to security. They better understand what role they want security to play and have made organizational changes as a result. Budget allocations and objectives are aligned with the overall organization focusing on a wide range of attributes from risk mitigation to culture. (Last year's Security 500 is available online atwww.securitymagazine.com)

As a result of top executive management’s increased attention, protecting brand and reputation have received a higher priority from security executives. Business resilience and human safety investments (employees, guests, students, patients) have also had an increase in visibility and activity, especially in the area of emergency preparedness.

The traditional security roles of asset protection and regulatory compliance continue as a core activity. Perhaps due to the long-term focus on these issues, there is less new activity and investment necessary to execute effectively. As a result, they were identified as a lower priority or area of concern vs. last year.

Measuring the return on investment for security spending continues as a core objective.

Security spending is now more directly linked to the value it has for the organization’s risk mitigation goals including compliance, business resilience, brand and asset protection. The increased understanding of security’s optimal organizational fit and role at the executive level has created a clearer understanding of what internal measures are important and how to measure them. Examples include workman’s compensation, customer satisfaction, employee retention and revenue/customer retention. The measure of external ROI factors (technology speed or process cost savings) alone are not as significant security spending catalysts as they were last year.

External ROI factors are a competitive advantage to vendors selling solutions, but only after the buying organization has identified its own internal benefits from implementing a particular security solution.

Organizations are increasing their internal measuring activity but not aggressively benchmarking through other organizations or associations. In some vertical markets, organizations are sharing information and benchmarking, such as shrinkage in retail, but this is not a new activity.

Technology continues its significant impact on how security is designed and implemented. The application of IP-centric video, analytics, storage, communications and mobility, monitoring and integration with access control systems, facilities systems and external organizations such as law enforcement is accelerating. Custom-designed security systems, especially emergency, mass notification and sophisticated security operations centers, is a fast growing trend.

This year the Security 500 includes twelve vertical markets and this issue profiles nine of the leading security organizations and their executives.

There are ten trends identified in this year’s Security 500.

1. The C-s Are Getting “IT”

CEOs and Boards are coming to understand security’s organizational value beyond its necessity. Security professionals have been aware that the “guns, guards and gates” role of security departments ended years ago. Now the executive suite has learned how important and necessary a strong security leader, strategy and program is to their organization’s overall success.

For organizations that want to compete globally, “go fast, be first” requires security to be integrated into the enterprise-wide strategy as well as executed at an enterprise-wide level. Top leaders understand that the role of security has changed and that they need executive level security leaders who can help drive the overall organization.

This is a new, proactive and productive conversation. Once the “Cs” buy-in to the value of security, increased budget allocations and approvals tend to follow. Last year’s Security 500 identified that executive level buy-in to the value of security was a major factor in the level of the person hired to lead security, the role of security in the organization and security spending.

The result of this “buy-in” is a dynamic shift from academic discussion about what security’s value could be to real organizational changes that are creating value.

2. The Security Organization’s Role Continues to Expand and Evolve

The logical follow through from executive buy-in is asking the security organization to do more. The best security leaders are getting more money and their role is being defined more widely. Increased responsibility is a result of:
  • Real world risks that need to be mitigated
  • Trust in hand-picked “CSO” level executives
  • Increased security specific regulatory and legal requirements
  • Globalization
  • Outsourcing/supply chain inter-dependencies
At Target the role of “asset protection” has changed from physical security and shoplifting to:
  • Assessing and mitigating global risks including their supply chain
  • Cyber- environment
  • Cyber security
  • Brand and reputational risk
  • Store site selection
  • Employee travel
  • Community involvement such as the SafeCity Program.
The result is that security organizations are drawing a bigger circle.

3. Security’s Leaders (that’s you) Are Expected to be Proactive and Visible

Several CSOs have been hired by a CEO who told them, “I want to hire you but I am not sure what I want you to do.” That is understandable, as you would not expect most CEOs to have expertise in security. But CEOs clearly know when change is needed and their organization should move in a different direction.

As a result, the expectations are very high even if the direction is not specific. The security leader is expected to be proactive and visible across the organization by setting strategy, executing, communicating and providing measurable results.

The result is that successful security leaders have organizational leadership skills and proactively identify solutions to improve enterprise-wide security within the cultural norms of their organizations.

4. Preparedness is the Buzz Word

Creating a reasonable and workable plan, educating and training all stakeholders and drilling – practice, practice, practice – has become a serious exercise and now gets both C-level as well as organizational support and participation. Emergency preparedness has shifted from an annoyance to be tolerated to a benefit sought out by stakeholders, particularly employees. Preparedness is becoming part of the organizational culture.

Good leadership includes showing the behaviors you expect your employees to emulate. In the early 1980s organizations whose CEOs did not use e-mail were the slowest to adopt e-mail. Emergency preparedness has a similar adoption curve, if your “C” is not participating and/or buying in, the organization will not buy in.

The result is a high expectation for emergency preparedness.

5. Visibility Is Back

The concept that technology would replace security officers by employing hidden surveillance in place of a physical officer presence has proven to be a myth instead of a best practice. While technology greatly empowers security officers to be more productive, the value of a physical presence is significant to both ensure employees and guests that safety is a shared concern and also to deter predators from taking action.

The role of the security officer has also grown to include first greeter, guest services, customer services and triage responsibilities as well as their traditional first responder/first line of defense role.

The result is that making security visible to ensure stakeholders safety and deter predators works and its use as a security strategy is on the rise.

6. Organizational Issues Around Security Are Being Sorted Out

Security’s most beneficial structure and scope to support an organization’s goals comprise becoming better understood by executive management and better placed within organizations. As executive management’s understanding evolves regarding security’s potential as a competitive advantage, business resilience and/or stakeholder retention lever, the best organizational structure and role within each organization is being recognized and realized.

The organizational issues that are being sorted out include:
  • Level of the most senior security position
  • Role/scope of the security organization
  • Security’s relationship to IT
  • Measurement: what to measure/how to measure
Boards and executives are realizing where they want security to start and to stop. In some cases, the role is broad and global including worldwide physical, IT, supply chain and brand/reputation risk issues. In others, it is narrowed to more traditional physical security.

This shift enables organizations to better communicate the role and beneficial purpose of security across the enterprise, which builds understanding and acceptance.

This trend also implies that future security leaders will be hired with a clear job description and organizational role. The result is that organizational leadership understands what role they want their security departments and executives to play and are more capable of articulating goals and structure than in prior years.

7. Initial Planning and Design Increasingly Include Security

Security planning is being initiated at the design stage more often than not. While there is no standard “security building code” delayed the integration at the design stage. Technology proliferation (e-mail, data security, electronic transaction processing) and the post 9/11 and Katrina reality of increased risk and the related liability have increased security spending and driven the economies toward initial design planning vs. retrofitting.

For cutting edge organizations, design includes the overall environment of the facility or campus including fire/life safety, security and comfort to ensure overall business resilience and productivity. Productivity includes employee retention and wellness.

And it has to be GREEN, of course.

The result is that both being and feeling secure for all stakeholders is gaining consideration and inclusion at the initial design stage and the cost benefit of designing security initially will be substantial.

8. Technology Design Is Being Driven by Security Specifications

Technology applications for the purpose of security, life safety and emergency preparedness are coming full circle. IT solutions quickly entered the market after 9/11 using digital and IP-centric infrastructures.

Security and IT departments initially developed a grudging co-existence. IT treats security as an internal customer and provides available technology applications that best meet security’s needs. The expectation was that complex data-center centric systems would be managed by IT and security managers would become extinct.

That has not happened. Instead, leading security organizations are identifying their risks, their needs and working with internal and external IT solution providers to specify and build custom systems.

The result is that security organizations are relying more on technology by designing custom solutions that best mitigate risks and increase emergency preparedness in their unique environment and circumstances.

9. Career Security Professionals Cross the Chasm to Successful Business Executives

At the executive security level, strong leadership, people management and problem solving skills are equally or more important than technical security procedure and operations knowledge.

While the security profession is increasing in numbers and more diverse career backgrounds are entering the field, a significant percentage of career security and law enforcement professionals are successfully transitioning to the CSO or equivalent title.

The result is that career security professionals are demonstrating both the desire and ability for continuous learning and growth in three key areas:
  • The security profession
  • Their organization
  • Their specific industry


10. You’re Global!

Security leaders have confided that they are being asked to provide security in places of which they have never heard.

Many organizations – not just businesses, but hospitals and universities – are opening facilities outside the U.S. A major and real concern is the safety of the people who will be working at, living in or visiting those facilities. As security thinking enters the initial planning stages, security organizations will be called upon to participate in the planning and will be expected to deliver effective security programs on time. Security is either a competitive strength or weakness for organizations seeking to “go fast. be first.”

The result is that delivering enterprise-wide security globally will become the norm for top security organizations and their leaders.

Security 500 Sponsors

ADVERTISER
Web Addresss
ADT SECURITY SERVICES, INC.
www.adt.com
ALTRONIX
www.altronix.com
AMERICAN MILITARY UNIVERSITY
www.amuonline.com
ATI SYSTEMS
www.atisystem.com
AUTOGATE, INC
www.autogate.com
AXIS COMMUNICATIONS, INC.
www.axis.com
B I G ENTERPRISES INC
www.bigbooth.com
CBL SYSTEMS
www.cblsystems.com
COMMUNICATIONS SUPPLY CORP
www.gocsc.com/security
CONTINENTAL INSTRUMENTS
www.ciaccess.com
CONVERGINT TECHNOLOGIES
www.convergint.com
COOPER WHEELOCK
www.cooperwheelock.com
CORNING CABLE SYSTEMS
www.corning.com/cablesystems/smls
DEDICATED MICROS, INC.
www.dedicatedmicrosus.com/security
DETEX CORPORATION
www.detex.com
DIGITAL HORIZONS
www.1dhs.com
DOOR KING INC
www.doorking.com
DORTRONICS SYSTEMS INC
www.dortronics.com
DUOS TECHNOLOGIES, INC
www.duostech.com
DV TEL
www.dvtel.com
DYNALOCK CORP
www.dynalock.com
FLIR SYSTEMS, INC.
www.flir.com
HID GLOBAL CORPORATION
www.hidcorp.com
FARGO
www.fargo.com/hdp
HIRSCH ELECTRONICS CORP
www.hirschelectronics.com
HONEYWELL SECURITY
www.security.honeywell.com
HSM ELECTRONIC PROTECTION SVCS
www.hsmsecurity.com
INTEGRAL TECHNOLOGIES, INC.
www.integraltech.com
INTERNATIONAL SECURITY NETWORK
www.isnsecurity.com
INTRANSA
www.intransa.com
IONIT TECHNOLOGIES
www.ionitusa.com
ISONAS
www.isonas.com
IVIEW SYSTEMS
www.iviewsystems.com
JVC
www.jvc.com/pro
KERI SYSTEMS
www.kerisys.com
KEYSCAN ACCESS CONTROL
www.keyscan.ca
LENEL SYSTEMS INTL. INC.
www.lenel.com

LSI EDUCATION INC.

www.LSIeducation.com
MAC-MODULAR ACCESS CONTROL
www.modularsecuritysystems.com
MBM CORPORATION
www.mbmcorp.com
NETWORK VIDEO TECHNOLOGIES
www.nvt.com
OMEGA II FENCE SYSTEMS
www.omegatwo.com
PAR-KUT INTERNATIONAL
www.parkut.com
PCSC
www.NextGenFT.com
PELCO SALES INC
www.pelco.com
PROTECTION TECHNOLOGIES
www.protechusa.com
RAYTHEON
www.raytheon.com
SECURING NEW GROUND
www.securingnewground.com
SECURITRON MAGNALOCK CORP
www.securitron.com
SPECO TECHNOLOGIES
www.specotech.com
STEALTH LABS
www.stealthlabs.com
TALK-A-PHONE COMPANY
www.talkaphone.com
TIMEKEEPING SYSTEMS INC
www.thepipe.com
TRANS TECH SYSTEMS
www.ttsys.com
ULTRA ELECTRONICS
www.magicard.com
ULTRA VISION SECURITY SYSTEMS
www.ultravisionsecurity.com
VISCOUNT
www.viscount.com


Links