Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The Real Impact of the Downturn

By Kathleen Kotwica Ph.D.
May 1, 2009

Business leaders around the world are struggling to determine exactly how the global economic downturn will impact their operations and profitability. Among security leadership specifically, one oft-asked question is whether budgets are being decreased, and if so, how to tighten protection while tightening the belt. The Security Executive Council conducted a survey through the month of January to find out how some security leaders are answering these and other questions. More than 250 qualified security practitioners responded.


Half Empty, Half Full

Slightly more than 50 percent of respondents reported that their 2009 budgets have decreased from 2008 levels. While that figure is daunting, turned on its head it means that nearly 50 percent of budgets have not been negatively impacted. In fact, nearly one-fourth of respondents reported a 2009 budget increase. For the half who reported lower budgets, the average decrease was 17 percent, and for the quarter receiving an increase, the average rise was 18 percent. 
     
The silver lining on these figures is that half of these businesses appear to recognize that security is still critical in a downturn, perhaps even more so than in good economic times.


Shifting Risk Picture

Survey respondents also reported more than 40 percent increases in theft, fraud and requests for support to HR relative to layoffs in fiscal year 2008-2009. These figures shouldn’t be terribly surprising. Even where security budgets are stable or increasing, budgets for other functions may be diminished, meaning more layoffs and a greater need for security support as HR breaks the news. Some companies may be cutting benefits or requiring employees to work longer or harder without increasing pay, which could sow discontent in the workforce and may account in part for increases in theft and fraud.
     
As individuals see and experience the effects of the down economy, they may begin to take measures they never would have before considered to protect their own interests in case of a future layoff, like stealing company data with the intention of using it as leverage to gain employment with a competitor. A February study by the Ponemon Institute found that 59 percent of employees who leave or are asked to leave a company will steal company data, such as proprietary information and intellectual property, e-mail lists, customer contact lists and employee records. 
     
All security leaders should be looking closely at these risk areas in their organizations and acting to close up gaps in protection.


Maintaining and Enhancing Security

The Security Executive Council asked all its survey respondents to discuss what creative programs or efforts they were deploying to maintain or enhance security programs in this environment of increased risk and decreasing funding.
     
It appears that, as other business functions often do, security returns to its core when it falls on hard times. Awareness programs are essential to strong security; for one, they are a force multiplier, basically turning employees and management into additional security eyes and ears. A good awareness program can stop many potential internal incidents like intellectual property theft and workplace violence events.
     
The second-most reported trend, just shy of tying with the first, was an active movement toward technology solutions. Like awareness programs, many technology solutions can act as force multipliers, maximizing protection and coverage. This quality may be making it easier for security leaders to show the value of technology investment in our economic downturn.
     
The final trend the Council identified in these responses was a move toward stronger prioritization of risk. Many respondents noted that they have decided company-wide, with the input of other business leaders, to focus resources on the greatest risks to the company. Before the downturn, many security organizations had the luxury of focusing on what may now be considered peripheral issues, reaching toward a goal of more perfect security, instead of most reasonable security. In this economic environment, however, the exercise of prioritizing risk and determining acceptable risk has become more critical.


Discover the Cost of Security

One question this survey couldn’t answer – and one no survey can answer today – is, “What is the cost of security?” A better understanding of the cost of security could both clarify budget impacts and provide a planning resource for security leaders that could help them show security value. Unfortunately, so far, it has been impossible to determine the cost of security because there has been no way to collect the right data from enough practitioners, and because cost can be calculated in myriad ways. 


Links

  • www.securityexecutivecouncil.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kathleen Kotwica, Ph.D., is EVP and chief knowledge strategist for the Security Executive Council (SEC). She develops strategies and processes to identify, store, understand, build upon, and disseminate the Council’s Collective Knowledge™ and insights.. To learn about becoming involved, or to offer comments or questions about Next Generation Security leadership, e-mail contact@secleader.com or visit https://www.securityexecutivecouncil.com/sm.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

University lecture

1.2M Individuals’ Data Stolen In University Hacking

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Crisis Management at the Speed of Internet

    See More
  • How Business and Risk Drivers Impact Mitigation Strategy

    See More
  • Is the Knowledge Transfer Gap Hurting Security?

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing