This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
SDMmag logo
  • Home
  • Magazine
    • Current Issue
    • Digital Editions
    • Archives
    • Monitoring Today
    • Professional Security Canada
  • Products
  • Newswire
  • Exclusives
    • SDM 100 Report
    • Top Systems Integrators Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • TMA Monitoring Center Excellence Awards
    • Blog
    • PSA Leadership Institute
  • Topics
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • Columns
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Today's Systems Integrator
    • Marketing Madmen
    • Sales Stars
    • Smart Insights
  • Events
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • More
    • Videos
    • Podcasts
    • ISC West 2019
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • Directories
    • Buyers Guide
    • Take a Tour
    • Guide to Distributors
    • Guide to Central Stations & Monitoring
  • Contact
  • Advertise
Home » The Issue of Cyber Crime: Selling Cyber Security…or Missing a Major Market?
Integration Intelligence

The Issue of Cyber Crime: Selling Cyber Security…or Missing a Major Market?

Integration Intelligence w/ Dan Dunkel thumbnail
March 22, 2012
Dan Dunkel
KEYWORDS illegal global business
Reprints
No Comments

Question: “What do security integrators, defense contractors, major IT firms, international risk consultancies, and start up companies all have in common?”

Answer: They are selling cyber security solutions and services.

 

“Last year the FBI announced that revenues from cyber-crime, for the first time ever, exceeded drug trafficking as the most lucrative illegal global business, estimated at reaping more than $1 trillion annually in illicit profits.”

— Edward Amoroso, chief security officer of AT&T (2009)

 

The cyber crime problem is huge and involves many disciplines from across the information technology (IT) department, human resources, legal and traditional physical security. The threat vector is so vast that companies must collaborate more effectively internally to coordinate their defenses. It is not an “IT only” problem, but an opportunity for various departments to play to their strengths. Pure play information security solutions should reside in the IT department. Monitoring real time packet traffic to identify malware and botnet profiles is a specialty best left to computer science — where they are overwhelmed with data.

However, insider theft of company assets — information in this case — is an area where corporate security has investigative experience and contacts with law enforcement agencies that are valuable. This internal investigation capability is an area where physical security integrators can enter the cyber security market quickly. The ability to track problem employees and monitor, via access control systems and video surveillance, specific physical locations and information sources is absolutely critical today. Expertise in this area and consulting services for educating the company regarding its supply chain partner security is desperately needed.

A Verizon report in 2010 stated that 34 percent of “partners” had access to a host company’s proprietary data! This data did not include part time contractors.

Additionally, a recent survey conducted by the Ponemon Institute found that insider crime is amongst the most costly cybercrimes a company or organization can be subjected to. On average, the Ponemon survey found that insider crime took up to 42 days or more to resolve, with an average cost to an organization of nearly $18,000 per day, or up to $750,000 or more for every incident. Additional data show that small, medium business (SMB) are targets of cyber criminals based on the fact they do not typically employ computer security expertise. Businesses are getting breached from both sides, internal and external.

I attend many cyber security events (RSA Security Conference, Black Hat, GovSec, etc.) and know many vendors with products that physical security integrators could resell. Cyber compliance software, integrated tracking solutions, and mobile device security tools are a few examples. These are solutions to current market needs and complement a portfolio of video surveillance, access control and biometric monitoring capabilities. However, I rarely see the firms that attend ASIS or ISC East & West at these events? At least review the exhibitor listings of these shows and contact potential partners directly. If your customers are not buying these services from a vendor today, they will be tomorrow.

Cyber security requires point solutions that a physical security integrator is very capable of providing. The security threat now blends the physical and digital domains. It makes sense to sell cyber security solutions!

Cyber crime is a HUGE problem that is not clearly understood by the market today. I believe the cyber crime issue will mirror the Y2K scenario. It will be ignored until it cannot be, and then an avalanche of need will hit the market all at once. Security integrators that address this opportunity today will reap the benefits. Those that don’t will miss a major market.

Subscribe to SDM Magazine

Recent Articles by Dan Dunkel

Transformative Leadership: The Past Can Predict the Future

Is the Cloud Green?

Integrating End-to-End Security Solutions

Security Convergence & Managed Services: Can You Say, ‘Account Control?’

Strategic Alliances, Cloud Computing or Coal?

Sdm0611-integrationintel-portimg-01

Dan Dunkel, president of New Era Associates, is a frequent presenter on the topic of systems integration and convergence before security, enterprise and executive groups. He brings more than 22 years of sales, management, and executive experience in the IT industry to his consulting practice. He is a regular columnist with Today's Systems Integrator, a bi-weekly e-newsletter for integrators and co-author of Physical & Logical Security Convergence. Contact him at dan@neweraassociates.com or visit www.neweraassociates.com

Related Articles

Finding The Cure for Cyber Blindness & Missed Opportunities

Stepping up to the Cyber Challenge: You Need a Lawyer

Mobile Security: The Cyber Gold Rush

Insider Cyberthreats: Are You a Cyber Deer in the Headlights?

Related Products

SDM Magazine April 2019 Issue

SDM Magazine June 2019 Issue

Physical Security and Safety: A Field Guide for the Practitioner

Related Events

How to Make Your Central Station More Cyber Secure

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • SDM eNewsletter & Other eNews Alerts
  • Online Registration
  • Subscription Customer Service

More Videos

Sponsored Content What Is Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the SDM audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Featureimage_900x550__ovl0jlkbbj__
Sponsored By
Schneider Electric

New Digital Load Management System Drives Productivity and Enables New Business Models

Motor starter selection and configuration has always been a labor-intensive task. To address this challenge, machine builders and system integrators must adopt new technologies that simplify motor starter selection, installation, configuration and maintenance.

Popular Stories

Dealer of the Year(2019)

SDM 2019 Dealer of the Year: CPI Security of Charlotte, NC

GettyImages-1087183206

Whatever Happened to the Prediction of a Mass Extinction of Security Dealers?

STANLEY

STANLEY Security Partners With Indianapolis Colts to Honor Local ‘Security Champion’

Aiphone

Go Above & Beyond for Effective Emergency Communication/Notification

ADT Commercial

ADT Commercial Purchases Critical Systems of Georgia

SDM 2019 Top Systems Integrators Report

Events

January 1, 2030

Webinar Sponsorship Information

For webinar sponsorship information, visit www.bnpevents.com/webinars or email webinars@bnpmedia.com.

View All Submit An Event

Poll

Hiring Women in Security

Has your company made any efforts in the past year to specifically hire and/or promote women in managerial/executive positions? (Please select the best answer.)
View Results Poll Archive

Products

Contemporary Security Management, 4th Edition

Contemporary Security Management, 4th Edition

 Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. 

See More Products

SDM Magazine

_FC_SDM1219 cover 144x192

2019 December

Check out SDM Magazine’s December 2019 issue, featuring "CPI’s Key to Success Is Controlling ‘the Experience’ in-House", "Monitoring Services: The Cutting Edge", and much more.

Check back throughout the month for new content!

View More Create Account
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing