Why One CEO Gets 27 Million In Security

How one budget highlights the true cost of CEO security

Twenty-seven million dollars for CEO Security.

That’s what Meta spent protecting Mark Zuckerberg in 2024. Meanwhile, Apple allocated $1.4 million for Tim Cook’s security. Amazon spent $1.1 million protecting Andy Jassy. Nvidia invested $3.5 million in protecting Jensen Huang.

The disparity reveals something far more troubling than security budget differences.

It exposes a fundamental breakdown in how organizations assess and respond to executive-level threats.

The Numbers Tell a Story About Risk Assessment Failures

When I analyze these spending patterns, the variations suggest wildly different approaches to threat evaluation across the industry. Meta’s $27 million budget represents either exceptional due diligence or significant over-investment. The smaller budgets of other tech giants suggest either superior risk mitigation or inadequate protection.

The truth likely lies somewhere between the two extremes.

Collectively, the top 10 tech companies exceeded $45 million on CEO security in 2024. This surge reflects growing awareness of executive vulnerability, but the uneven distribution suggests inconsistent threat assessment methodologies across the sector.

Consider the variables that should influence protection budgets. Public profile and controversy levels. Business model risks and stakeholder conflicts. Travel patterns and lifestyle exposure. Geographic operating territories and geopolitical tensions.

Each executive faces a unique risk profile that demands customized protection strategies.

Yet, the spending gaps suggest that many organizations rely on generic security frameworks rather than comprehensive threat analyses. Companies treat executive protection as a standard corporate expense. Others recognize it as a critical investment in risk management, requiring sophisticated evaluation.

Mena Ghali, Chief Executive Officer of Global Risk Solutions, has observed these disparities firsthand across his agency’s high-profile clientele. “The $27 million figure for Zuckerberg’s protection reflects a comprehensive approach to threat mitigation,” Ghali explains. “However, the real concern lies in organizations that dramatically under-invest in executive protection based on false assumptions about their risk exposure.”

Ghali’s experience spanning military intelligence and corporate protection sectors provides unique insight into these assessment failures. “Many companies benchmark their security spending against competitors rather than conducting independent threat analysis. This approach creates dangerous vulnerabilities when executives face unique risk profiles that demand customized protection strategies.”

Real-World Consequences of Inadequate Assessment

The assassination of UnitedHealthcare CEO Brian Thompson in December 2024 demonstrates the deadly consequences of insufficient threat evaluation. Despite known threats, Thompson traveled without any security detail.

UnitedHealth Group’s regulatory filings revealed that no current or former executives received regular company-funded personal security services.

This represents a catastrophic failure in threat assessment and risk management.

Thompson’s murder forced immediate protocol changes across the corporate landscape. Companies began removing leadership photos from websites. Organizations invested in enhanced home defenses and cyber protection. Executives adopted stricter travel policies and communication security measures.

The reactive nature of these changes highlights how many organizations approach executive protection. They wait for incidents to occur rather than conducting proactive threat assessments that identify vulnerabilities before they become exploitable.

“The Thompson assassination represents every security professional’s worst nightmare,” Ghali reflects. “It demonstrates what happens when organizations treat threat assessment as a checkbox exercise rather than an ongoing intelligence operation. We’ve seen this pattern repeatedly where companies react to incidents instead of preventing them through comprehensive risk evaluation.”

Global Risk Solutions has experienced an increase in demand for threat assessments following high-profile executive attacks. “Executives are finally understanding that their public profiles and business decisions create real security implications,” Ghali notes. “The challenge becomes conducting thorough evaluations that account for dynamic threat environments rather than static risk models.”

What Proper Threat Assessment Actually Requires

Effective threat evaluation demands systematic analysis of multiple risk vectors. Historical incident data provides a baseline for threat levels in specific industries and executive profiles. Current intelligence reveals emerging risks from activist groups, disgruntled stakeholders, or geopolitical tensions.

Individual vulnerability assessment examines personal exposure factors. Public statements and positions that generate controversy. Business decisions that create adversarial relationships. Personal habits and routines that create predictable targets.

Geographic risk analysis evaluates threats across all locations where executives operate. Corporate facilities present different challenges than private residences. International travel introduces additional complexity requiring local intelligence and cultural understanding.

The assessment process must be dynamic rather than static. Threat levels fluctuate in response to business cycles, public events, and external circumstances. Quarterly reviews ensure protection strategies remain aligned with current risk profiles.

Many organizations conduct initial threat assessments during executive onboarding but fail to maintain ongoing evaluation. This creates dangerous gaps as circumstances change and new risks emerge.

“Static threat assessments represent one of the most dangerous misconceptions in executive protection,” Ghali emphasizes. “Risk profiles change constantly based on business developments, public statements, geopolitical events, and personal circumstances. Organizations that conduct annual security reviews are operating with outdated intelligence that leaves executives exposed to emerging threats.”

Global Risk Solutions implements dynamic threat monitoring for its executive protection clients. “We maintain continuous intelligence gathering and quarterly risk reassessments,” Ghali explains. “This approach ensures protection strategies evolve with changing threat landscapes rather than remaining fixed to historical analysis.”

Business professional completing a checklist on a laptop, symbolizing planning and ceo security.

Strategic Recommendations for Executive Protection Programs

Organizations need comprehensive Independent Security Studies that evaluate existing protection capabilities across all executive activities. These assessments should encompass corporate offices, private residences, and transportation protocols for key leadership personnel.

The evaluation process must examine both physical security measures and operational security practices. Physical protection includes access controls, surveillance systems, and emergency response procedures. Operational security addresses communication protocols, travel planning, and information security measures.

Resource allocation should reflect actual risk levels rather than arbitrary budget constraints or peer company spending patterns. High-risk executives require proportionally higher investment in protection services. Low-risk leaders still need baseline security measures, but can operate with more streamlined protocols.

Training programs ensure all stakeholders understand their roles in executive protection. Security personnel need ongoing education about emerging threats and response techniques. Executives themselves must understand operational security principles and the requirements for cooperation.

Regular program audits identify gaps and opportunities for improvement. External security consultants provide an objective evaluation of existing measures. Internal reviews ensure protocols remain practical and sustainable for daily operations.

“Independent security audits reveal vulnerabilities that internal teams often miss,” Ghali observes. “Organizations develop blind spots when the same personnel conduct both implementation and evaluation. External assessment provides objective analysis of protection gaps and operational inefficiencies that compromise executive safety.”

Ghali recommends comprehensive security studies that examine all aspects of executive exposure. “Effective audits must evaluate corporate facilities, private residences, transportation protocols, and communication security. Many organizations focus exclusively on office-based protection while ignoring home and travel vulnerabilities where executives spend significant time.”

The Path Forward for Corporate Security

The extreme variations in executive protection spending reveal an industry still learning how to assess and respond to leadership-level threats appropriately. Organizations that invest in comprehensive threat assessment and customized protection strategies will better safeguard their executives and business continuity.

Companies that continue relying on generic security frameworks or reactive measures remain vulnerable to the kind of tragic outcomes that befell UnitedHealthcare.

The question facing every organization becomes simple: Will you conduct proper threat assessment before an incident occurs, or will you wait until after?

The answer determines whether your executive protection budget represents a wise investment or a tragic under-preparation.

Sources:

FEATURED NEWS | GLOBAL RISK SOLUTIONS

Featured Security News

Explore our latest coverage of critical security developments, threat alerts, global protection trends, and executive protection briefings. Our news content is curated to keep professionals, organizations, and stakeholders informed on evolving risks, strategic operations, and emerging intelligence. Stay current with trusted updates designed to support situational awareness and proactive security planning.

Global Risk Solutions Private Security Concierge

Experience unparalleled security services with Global Risk Solutions Private Security Concierge. Our dedicated team provides customized solutions tailored to your specific needs. Whether you need a detailed quote, want to speak directly with our experts, or stay updated with the latest security trends, our concierge service is here to assist you. Choose from the options below to get started:

Free Quote Request

Submit a user-friendly form with a simple online request form.

Contact Our Office

Call our headquarters office with any questions or for further assistance.

Follow Our Social Platforms

Explore the latest articles and updates in the field of private security. Our most recent publications offer timely insights into the evolving risks and the innovative solutions that protect us in a rapidly changing world.

Our Nationwide Security Reach

At Global Risk Solutions, we’re as widespread as your needs. With offices strategically positioned across the country, our strong presence allows us to promptly respond to your security needs, irrespective of your location. Explore our interactive map to discover our established presence and find the closest GRS office to you.

Greyscale private security services map of the United States showing all state boundaries.

Corporate Headquarters
2100 Geng Road, Suite 210, Palo Alto, CA 94303

Southern California Division
8383 Wilshire Blvd., Suite 800, Beverly Hills, 90211

Alabama Office
445 Dexter Ave, Suite 4050,
Montgomery, AL 36104

Arizona Office
2 N Central Ave, 18th and 19th floor,
Phoenix, AZ 85004

Arkansas Office
400 W Capitol Ave, Suite 1700,
Little Rock, AR 72201

Colorado Office
999 18th St, Suite 3000,
Denver, CO 80202

Connecticut Office
100 Pearl St, 14th Floor,
Hartford, CT 06103

Florida Office
113 S Monroe St, 1st Floor,
Tallahassee, FL 32301

Georgia Office
260 Peachtree St NW, Suite 2200,
Atlanta, GA 30303

Hawaii Office
500 Ala Moana Blvd, Suite 7400, Honolulu, HI 96813

Idaho Office
950 W Bannock St, Suite 1100, Boise, ID 83702

Indiana Office
201 N Illinois St, 16th Floor South Tower, Indianapolis, IN 46204

Iowa Office
699 Walnut St, 4th Floor,
Des Moines, IA 50309

Louisiana Office
301 Main St, Suite 2200,
Baton Rouge, LA 70802

Massachusetts Office
75 State St, Suite 100,
Boston, MA 02109

Michigan Office
120 N Washington Square, Suite 300, Lansing, MI 48933

Minnesota Office
455 Minnesota St, Suite 1500,
Saint Paul, MN 55101

Mississippi Office
317 E Capitol St, Suite 200,
Jackson, MS 39201

Nebraska Office
233 S 13th St, Suite 1100,
Lincoln, NE 68508

New Mexico Office
150 Washington Ave, Suite 201, Santa Fe, NM 87501

North Carolina Office
421 Fayetteville St, Suite 1100,
Raleigh, NC 27601

Ohio Office
20 S Third St, Suite 210,
Columbus, OH 43215

Oklahoma Office
101 Park Ave, Suite 1300,
Oklahoma City, OK 73102

Rhode Island Office
10 Dorrance St, Suite 700
Providence, RI 02903

South Carolina Office
1320 Main St, Suite 300,
Columbia, SC 29201

Tennessee Office
40 Burton Hills Blvd., Suite 200, Nashville, TN 37215

Texas Office
111 Congress Ave, Suite 500,
Austin, TX 78701

Utah Office
222 S Main St, 5th Floor,
Salt Lake City, UT 84101

Virginia Office
919 E Main St, Suite 1000,
Richmond, VA 23219

Washington Office
400 Union Ave SE, Suite 200
Olympia, WA 98501

Wisconsin Office
811 E Washington Ave, 4th Floor, Madison, WI 53703