The military is a great matter of the state.It is the ground of death and life,The Tao of survival or extinction.One cannot but examine it.– Sun TzuWhen Sun Tzu wrote The Art of War, he was concerned with the organization and disposition of military units. In his day, as is true in ours, the military was a tool for the accomplishment of political goals. In our role as security professionals, we serve to further goals of organizations that fight on a competitive battlefield.Some of us are “foot soldiers”, fulfilling operational roles critical to the daily functioning of the company. Others are the leaders – managers, CIOs, CISOs – who coordinate the tactics that realize strategic aims set by the sovereign. While this hierarchy is common, the organizational Tao influences the way these elements are orchestrated.According to Sun Tzu, the Tao is the Way – the context that defines how actions are perceived and valued. In a business context, corporate values and culture define the Tao. The success of any strategy depends on how it is supported by the Tao. Why does culture matter when it comes to security? Is it not enough to expect compliance with published policies and procedures? An August, 2009 interview with Wharton University’s Andrea M. Matwywhyn shows that the inculcation of a security mind-set is required to deal with evolving threats. Additionally, an understanding of corporate culture enables the creation of effective security training.It is important that a security program have the support of management. However, the management team must be able to accurately assess the program in the context of the company’s cultural and political reality. Failure to do this will inevitably create a clash between strategic security plans and the operational activities that enable that vision. Related content opinion Positioning the Security Team Through Influence Part 1 Influence styles are a reflection of the influencers and, by extension, their team. Thus, they must understand the situations to which different styles are applicable. This series explores the common influence styles and their application. By Steven Fox Apr 21, 2012 3 mins Technology Industry IT Jobs opinion From Obstacle to Ally - Repositioning the Security Team Pt 1 By Steven Fox Apr 08, 2012 3 mins Technology Industry IT Strategy opinion Key Sessions at CISO Executive Summit 2011 By Steven Fox Dec 03, 2011 3 mins Business Continuity Data and Information Security Careers opinion Securing User Credentials On Mobile Devices By Steven Fox Nov 15, 2011 4 mins Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe