This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
SDMmag logo
  • Home
  • Magazine
    • Current Issue
    • Digital Editions
    • Archives
    • Monitoring Today
    • Professional Security Canada
  • Products
  • Newswire
  • Exclusives
    • SDM 100 Report
    • Top Systems Integrators Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • TMA Monitoring Center Excellence Awards
    • Blog
    • PSA Leadership Institute
  • Topics
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • Columns
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Today's Systems Integrator
    • Marketing Madmen
    • Sales Stars
    • Smart Insights
  • Events
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • More
    • Videos
    • Podcasts
    • ISC West 2019
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • Directories
    • Buyers Guide
    • Take a Tour
    • Guide to Distributors
    • Guide to Central Stations & Monitoring
  • Contact
  • Advertise
Home » SECURITY EXECUTIVE ROLES: Converging Toward Security Consulting
Integration Intelligence

SECURITY EXECUTIVE ROLES: Converging Toward Security Consulting

Integration Intelligence w/ Dan Dunkel thumbnail
January 17, 2012
Dan Dunkel
KEYWORDS emerging technology
Reprints
No Comments

The race is on and innovative chief information officers (CIOs), chief security officers (CSOs), and chief information security officers (CISOs) are on the starting line watching the emerging technologies of social media, mobility, and cloud computing change their jobs, the marketplace, and the integrator channel.

The role of technology in the success of the business is obvious. The protection of intellectual property (IP) and customer records, personal identifiable information (PII), is taking a predominant role in the overall reputation and viability of the company. Global crime is soaring and the small and medium business (SMB) is virtually defenseless. Enter the cloud.

People mistake the value of cloud computing as an economic only incentive, but it also allows for improved security. The IT industry is going “cloud” out of necessity. If computer crime and espionage continue unabated, the Internet will be unusable and the global economic impact catastrophic. Cloud advances promote mobile device deployments and applications in social media. The convergence of open source commodity technology will continue impacting the security executive, the SMB owner, and the integrator.

A standard definition of the roles of a CIO, CSO or CISO, is essentially nonexistent and differs by company. As technology convergence (cloud, social media, mobility) has diluted traditional IT budgets and CIO influence, executives are redefining their roles in regard to security policy. Today, security executives are repositioning to protect “all the business, all the time.” Securing a global company in the age of transnational criminal organizations (TCO) is a daunting challenge.

Physical and cyber crime are at record levels. The smart security executive will extend their operating influence into every business unit. The winner will position himself or herself as a “business consultant.” They will leverage vendor expertise (cloud providers, manufacturers, consultants, integrators) to understand how technologies can best be applied to protecting and improving business operations. Their dialogue now involves generating revenue and establishing best practices across secure global supply chains.

Simultaneously, for the SMB without these executives, protecting information and securing physical facilities can best be accomplished with an outsourced model. This is a logical business move away from local integrator channels.

Where does this leave the security integrator? A consulting resource.

One key question to ask your customer (security executive) is, how are they ultimately measured in their role? What percentage of their actual job responsibility extends beyond physical security?

As the SMB migrates to commodity technologies in the cloud, many security integrators will be purchased by larger organizations. The “physical” security integrators will aggressively compete with the “IT” integrators to provide converged security services to global customers. The IT, physical security and cyber domains will converge. Consulting services to protect business operations against global crime syndicates will be their recurring revenue model. Organized crime and state-sponsored espionage will continue to innovate “daily” and need to be countered.

The question for the integrator is one of positioning for the future. If your current customer does not see these changes, you need to educate them or migrate gracefully to the emerging power center in your enterprise accounts. If the enterprise is not your end game, make your business an attractive merger and acquisition (M&A) candidate. Technology cycles have a long history of displacing integrator channels that do not adjust to market conditions.

The cloud accelerates this change ten fold. The good news is that these technologies are easy to integrate to establish a consulting model. Change always confuses customers.

Embrace an opportunity to educate clients, provide consulting (for a fee), and sell new services. As the security executive becomes more “consultative” to their boards, mirror that positioning in your own business. Happy New Year!

Subscribe to SDM Magazine

Recent Articles by Dan Dunkel

Transformative Leadership: The Past Can Predict the Future

Is the Cloud Green?

Integrating End-to-End Security Solutions

Security Convergence & Managed Services: Can You Say, ‘Account Control?’

Strategic Alliances, Cloud Computing or Coal?

Sdm0611-integrationintel-portimg-01

Dan Dunkel, president of New Era Associates, is a frequent presenter on the topic of systems integration and convergence before security, enterprise and executive groups. He brings more than 22 years of sales, management, and executive experience in the IT industry to his consulting practice. He is a regular columnist with Today's Systems Integrator, a bi-weekly e-newsletter for integrators and co-author of Physical & Logical Security Convergence. Contact him at dan@neweraassociates.com or visit www.neweraassociates.com

Related Articles

Shifting Roles

Security Convergence & Managed Services: Can You Say, ‘Account Control?’

The Convergence of Security Experience and Social Media

Educate, Consult & Protect

Related Products

Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

Integrated Security Systems Design, 2nd Edition - A Complete Reference for Building Enterprise-Wide Digital Security Systems

Effective Security Management 6th Edition

Security Surveillance Centers: Design, Implementation, and Operation

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • SDM eNewsletter & Other eNews Alerts
  • Online Registration
  • Subscription Customer Service

More Videos

Sponsored Content What Is Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the SDM audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Featureimage_900x550__ovl0jlkbbj__
Sponsored By
Schneider Electric

New Digital Load Management System Drives Productivity and Enables New Business Models

Motor starter selection and configuration has always been a labor-intensive task. To address this challenge, machine builders and system integrators must adopt new technologies that simplify motor starter selection, installation, configuration and maintenance.

Popular Stories

Dealer of the Year(2019)

SDM 2019 Dealer of the Year: CPI Security of Charlotte, NC

Shiver Security

Shiver Security Expands With the Acquisition of Four Companies

GettyImages-1087183206

Whatever Happened to the Prediction of a Mass Extinction of Security Dealers?

Aiphone

Go Above & Beyond for Effective Emergency Communication/Notification

STANLEY

STANLEY Security Partners With Indianapolis Colts to Honor Local ‘Security Champion’

SDM 2019 Top Systems Integrators Report

Events

January 1, 2030

Webinar Sponsorship Information

For webinar sponsorship information, visit www.bnpevents.com/webinars or email webinars@bnpmedia.com.

View All Submit An Event

Poll

Hiring Women in Security

Has your company made any efforts in the past year to specifically hire and/or promote women in managerial/executive positions? (Please select the best answer.)
View Results Poll Archive

Products

Contemporary Security Management, 4th Edition

Contemporary Security Management, 4th Edition

 Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. 

See More Products

SDM Magazine

_FC_SDM1219 cover 144x192

2019 December

Check out SDM Magazine’s December 2019 issue, featuring "CPI’s Key to Success Is Controlling ‘the Experience’ in-House", "Monitoring Services: The Cutting Edge", and much more.

Check back throughout the month for new content!

View More Create Account
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing