Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Cost Cutting in Tough Times

By Bill Zalud
November 27, 2001
Layoffs, mergers, acquisitions, closed facilities can and do create more business for security departments-in the short term.

But in the long term, in this slow economy, where in some places it's a recession, many organizations are slowing their budget growth or cutting costs more aggressively than since the early 1990s. Many firms are stalling technology upgrade plans. With security operations more dependent on information technology, a squeeze in IT spending reflects on protection plans.

In this environment, it's useful to see what the business gurus and computer and communications technologists are thinking as they face their own large, deep challenges. Among recent readings was an article "The Kindest Cuts" by Christopher Koch (Darwin Magazine), which has sage advice that can easily apply to security directors and managers. There's also good advice bundled in an article, "Who Has the Next Big Idea?" by Daniel H. Pink (Fast Company), and in a book coming out this month, "The Agenda: What Every Business Must Do to Dominate the Decade" by reengineering guru Michael Hammer.

Give in But Don't Give up

A good strategy, plan or security program is good even if you cannot afford it right away. A Darwin study just found that 40 percent of respondents say they are cutting costs by cutting "improvement projects," especially those that don't come with return on investment (ROI).

With that in mind, there are a number of potential moves.

First, remake your case by adding ROI to a stalled plan or program. While not that easy for security operations, ROI can be squeezed out of lower insurance, lower liability, less overhead and-hardest of all-less losses.

Second, see if you can postpone a project, by having management agree to funding it in the next quarter or next half year. It's not just a matter of buying time. It also means that you continue to see value in the plan or program and that the only thing delaying implementation is a temporary business downturn.

Third, cut up a major project or program into more manageable bits, or less expensive steps. This strategy allows you and management to stay committed to the program in a changed environment of cost containment.

What About Next Gen Tech?

According to Pink and Hammer "the signature innovation of the new economy is an organization that creates value by embracing change and innovation." However, any company can and security departments are a prime area of such activity.

The most important area of change is the process of doing business or handling security.

The essential element is customer service. But for Hammer the essential elements are discipline, structure and repeatability. For the restructuring guru, the service hero, who may grab attention for the extra effort, is not worth it. Instead, it is better for the system to work consistently and constantly thanks to discipline, structure and repeatability.

Change the Way People Work

Instead of bringing in new hardware and software, look at the way people work and change the processes. While there is a growing pressure to upgrade technology, in recessionary times, it makes as much sense to change the way people work. Spending on IT and new technology does have a positive influence of revenues, according to a University of Texas study.

But an IT boost at the top line, says the Darwin Magazine article, doesn't always make its way to the bottom line. Companies that spend big bucks on technology are not more likely to be profitable than those than don't, according to the study. "Good management, business strategy and products still matter more to a company's fortune than good IT."

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Big Bang Theory: Selecting Technology in Tough Economic Times

    See More
  • Managing in Tough Times

    See More
  • cyber5-900px.jpg

    Cutting the Cost of Public Sector Cybercrime in 2018

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical Layer Security in Wireless Communications

  • s in europe.jpg

    Surveillance in Europe

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing