Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The ‘IZING’ of Security

By Mark McCourt
May 1, 2012

The fast changing technology world is impacting everything in our business and personal lives, and while security is a late bloomer, it is not immune to change.

The big three: 9/11, Katrina and Sarbanes Oxley created a new world of terror, resilience and compliance, and turned security into a big dollar business, which drove innovation and is now changing the game by “IZING” the market.

Here are my 7 IZINGS:

1. Digitizing

2. Mobilizing

3. Virtualizing

4. Facilitizing

5. Businessizing

6. Verticalizing

7. Socializing

(And, cybercrime)

Digitizing:Security products look a lot like IT products because they areIT products.

The IP infrastructure has digitized security technology. The IT model implies you will buy services and software licenses more, and capital expense hardware less.

Mobilizing: There are 2 billion smart phones in the world. That number will double in a few years. Your employees will get their information where, when and how they want it, including your ESRM reports. We must recognize that your customers, their information and the devices all want to be mobile.

Virtualizing:What is exciting about the cloud? It is the first IT architecture with security as a forethought. Security is built into the infrastructure. Why is IT security so poor? Because no one who built early IT systems had ever taken a class on security. The cloud changes everything, offers a fresh start and enables us to overcome that. That secure cloud architecture allows you to lift up your security infrastructure and use services as needed. Smart enterprises want to use information to manage their business, not necessarily own the system that provides it. Google mail and Salesforce.com are successful examples. The value is in the security application, not the infrastructure. And the cloud offers great resilience.

Facilitizing: Building automation or intelligent buildings that integrate security with lighting, energy management and elevators is laying more “izing” on the “izing.” At Goldman Sachs you now reserve conference rooms and order hospitality as well as upload your presentations from your iPad that has no data drives. When you scan your ID credential at the meeting room, lights go on, the temperature adjusts, catering delivers and your presentation is ready to go. This convenient solution enables business and provides physical and logical security, as well as an audit trail in an economical self-serve model. Integrating security into facilities solutions is on the rise.

Businessizing: The CSO is a significant player on the executive team and is aligned with peers to achieve organizational goals. CSOs know that their CEOs want a return on their investment, and that means security has to drive organizational goals. Security spending tied to business strategy is most likely to be approved. Security proposals without a clear benefit are going to struggle to find money.

Your voice is now being heard by smart manufacturers who focus on solving your business, risk and security requirements, including metrics. Security has aligned with organizational goals and so must manufacturers’ solutions.

Verticalizing: One-size security management does not fit all. Great CSOs meet at the junction of subject matter expertise and organizational goals. Understanding your internal customer’s risks, business goals and compliance regulations while demonstrating value is critical as security verticalizes.

Socializing: Social media is pushing security and privacy responsibility to the individual who will play a role in their own well-being. The “See Something, Say Something” campaign is an example. This is a self-service world, and the solutions should include ways for those we secure to help secure themselves and their colleagues, whether that is at work or on campus or during international travel. Enterprises should seek solutions that reduce manpower and engage their stakeholders in the security process.

Cybercrime: Not an “izing,” but cybercrime is rampant. In 2011, cybercrime became the #1 crime, passing the global, illegal drug trade in dollars.

The DoD has recognized cyber as the fifth level of warfare. Worth noting is that once you go on the network, you open the door to cyber crime risks. The responsibility or liability risk is uncertain. Sony got hammered. TJ Maxx faced little, if any, negative impact.

In summary, it is fair to ask, why is all of this “izing” happening now? Well, the cost of ignoring risk is enormous. Prevention is the post 9/11, Katrina, SOX goal. And you do that by “izing” security.  

KEYWORDS: Chief Security Officer (CSO) cybercrime security compliance Terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • 2010 Security 500: The State of the Art

    See More
  • The State of The Security Officer: 2008

    See More
  • Publisher's Letter: The Business of Security Era Has Arrived

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing