Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

New Threats Demand New Alliances

Trends

By Mark McCourt
November 29, 2010
Forget Ipads, Facebook and even the latest video game, Call of Duty-Black Ops, which sold $300 million plus in its first day, as hot companies and can’t lose businesses. They have nothing on cyber crime. At the recent Security 500 Conference, Tom Mahlik, former Section Chief for the FBI’s  Domain Section CounterMarkMtrends2 Intelligence Division, pointed out that not only are U.S. businesses and government agencies losing north of one trillion dollars from cyber crime globally (yes, about 8 percent of the U.S. economy); but that most victims are not aware of it and do little to defend against it.

Tom’s facts are backed up by the recent Security 500 Survey that identified only 20 percent of Security 500 organizations are managing cyber at the enterprise level. While many Security 500 organizations defend against cyber crime at the departmental level (within IT, R&D or brand units), it is the lack of an enterprise-wide strategy that creates easily exploited weaknesses.

Cyber is all the rage or perhaps it should be all the outrage. If your enterprise, your board, your CEO are dismissing cyber as a real threat, then your organization may be on its way out of existence. Consider the trends:

•  Kroll’s 2010 annual study on crime measured cyber losses in excess of physical theft losses for the first time in the study’s history.

 

•  The Verizon 2010 Data Breach Investigations Reportdocuments that 61 percent of cybercrimes are discovered by a third party, not by the victim. In December 2009, an exchange between the Wall Street Journaland Citibank took place in which the paper reported the FBI notified Citibank that Russian cyber criminals electronically stole tens of millions of dollars. Citibank vigorously denied the report. The Journal stood by its story. Citibank stood by its denial. Only the Russians know for sure.

 

•  A recent FBI report notes, “About one-third of all economic espionage investigations are linked to Chinese government agencies, research institutes or businesses.”

 

•  A CIA veteran wrote that other nations are becoming willing to support their own industries by acquiring competitors' intellectual property “the old-fashioned way – they will just take it.”

 

The Verizon report documents that attacks may come from anywhere. External threats are not the only ones. Internal threats from social media, thumb drives and even iPods put organizations at risk:


   External Agents                 70 percent

   Insiders                               48 percent

   Multiple Parties                  27 percent

   Business Partners            11 percent

 

As one leading CSO at the Security 500 Conference explained, “The criminals have expertise that will astound you. We used to see that the server making the attack was not in the same geography, for example, as the customer’s. And we mitigated that quickly. But now they have viruses that get past the commercially available virus scanners and run invisibly on the customer’s computer. The criminals sit and watch each character the intended victim types in. And when that cybercriminal comes to us through the customer’s computer, with the right pass codes from the right IP address and requests a transaction; our systems have to decide if we are processing a customer request or enabling a crime within nanoseconds.”

OK- You have risk! So, where do you get help?

Introducing the Intelligence and National Security Alliance (INSA) whose mission is to provide the intelligence and national security communities with a non-partisan catalyst for public-private partnerships which identify, develop and promote creative solutions through access to committed experts in and out of government.

INSA’s Chairwoman is Frances Fragos Townsend, the former Homeland Security Advisor and Assistant to President George W. Bush. Townsend’s vision for the Alliance is to bring expertise together, improve communications throughout the intelligence community and especially between public and private organizations. INSA creates an unparalleled community of experts including noted thought leaders, former NSA Secretary Mike McConnell.

INSA’s goal is to create innovative and timely solutions for the intelligence and security issues facing U.S. entities. Among its key initiatives is a centralized focus on cyber crime. INSA identifies crucial intelligence, completes strategic research and promotes innovative solutions for its members.

INSA’s Cyber Security Council Chair is Lou Von Thaer, president of General Dynamics – Advanced Information Systems. The Council engages government and industry communities in pursuit of innovative solutions and thought leadership that will improve existing cyber security policies, practices and organizations. Their goals are to both educate government officials on threats and recommend policies and programs for mitigation. INSA also helps private organizations develop a plan for self-organization and leveraging best practices. Currently, the Cyber Security Council is working to implement a public-private partnership model. 

While cyber crime is the fastest growing business in the world, it does not need to be at your expense. Visit www.insaonline.org for details about membership, upcoming events and available reports that may be helpful to your organization.

KEYWORDS: cyber Security security intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Keeping Up with New Threats

    See More
  • New Report Reveals How Accidental Insider Threats Put Organizations at Real Risk

    See More
  • Study Says New Mindset Required to Respond to Cyber Threats

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing