Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Leadership and Management

Predicting Security’s Next Moves in 2013

By Mark McCourt
Mark McCourt
December 1, 2012

As we enter 2013, it’s time for a few predictions. Here are my eight contributions to the New Year’s security forecast:

Prediction 1. An organization will declare bankruptcy after a cyber attack.

While some organizations are shoring up against cybercrime, many are not taking even basic or intermediate steps to remove vulnerabilities. As the level of attempts increase, the odds of a catastrophic event resulting in an organization failing also increases. The U.S. Cyber Consequences Unit (US-CCU) an independent, non-profit (501c3) research institute has found that a cyber attack that could hijack systems at a corporate level could “have the potential to create liabilities and losses large enough to bankrupt most companies.”

Prediction 2. “Enterprise Security” will replace corporate/physical and IT.

Tucking pieces of security into organizational silos leaves vulnerabilities and information gaps against threats. The move to a single, global CSO office will continue, and it will comprise all risk management and resilience-related strategies and operations. A major driver will be the threat of cyber-attacks against the weakest link in the chain. Only an enterprise risk strategy that includes all threats and vulnerabilities will be effective, and organizations are reorganizing accordingly.

Prediction 3. CSOs managing cyber security will jump from 21 percent to more than 50 percent in 2013.

As enterprise security arrives on organizational charts due to cybersecurity concerns, convergence between the physical and logical worlds will be realized. The risks and losses will finally outweigh internal politics forcing change. While IT is not designed to be risk-centric regarding security issues, security is not staffed to manage dynamic technology requirements. The current market of having four out of five organizations not addressing cyber security at the enterprise level will not stand.

Prediction 4. Cyber legislation enacting minimum standards for critical infrastructure will (finally) be passed.

Government agencies from DHS to DoD are already posturing for their share of an anticipated cyber security spending windfall. Defense Secretary Leon Panetta warned about U.S. vulnerability to a cyber-Pearl Harbor. The challenge will be information-sharing among government agencies and private organizations in the critical infrastructure sectors without violating civil liberties.

Prediction 5. At least one Security 500 CSO will be promoted to an executive role outside security.

The level of business acumen and leadership has soared among top leaders currently managing security for their organizations. Their contribution to the overall success of the organization is understood, measured and rewarded at the board level. The time and opportunity to leverage that skill at the COO or an international business unit head position has arrived. Similar to the IT world where John Reed, the visionary CIO at Citibank who championed ATMs, became their CEO in 1984, I expect to see ‘the business leaders who are currently managing security for their organizations’ be moved to broader executive roles.

Prediction 6. Security Information Management will grow dramatically.

Nothing beats knowing. As organizations move toward risk management and away from event response as their strategy, the demand for real-time situational awareness information from their security technology systems will increase. GSOCs and Central Stations will invest in more situational awareness and business optimization software tools. Midsize organizations that are unable to create their own GSOC may leverage this information from their Central Stations as an on demand or shared service.

Frost & Sullivan research analyst Krzysztof Rutkowski notes, “Since understanding the benefits of any security solution is necessary to implement it, the rising awareness on PSIM will transform this million-dollar market into a billion-dollar one by the end of the decade.”

Prediction 7. Consolidation reigns in the surveillance camera market.

It has taken a decade or more, but enterprises have set strategic procurement goals for security technology, meaning fewer brands being purchased. That reduces the number of service and warranty agreements, operator training and TCO. Likewise, the distribution channel’s continued mergers and acquisitions are thinning their product line cards. This helps reduce training and service requirements and streamlines inventory cost. Expect to see bigger winners and some big losers in this space.

Prediction 8. The focus on risk management and resilience will increase.

Sandy has taught businesses, institutions and government that their resilience plans are not nearly resilient enough. As this is written, parts of NY and NJ are entering their third week without power after Hurricane Sandy. Enterprise security will be taking a hard look at what went right or wrong and retool their policies, procedures and training. David Shepherd, CEO of the Readiness Resource Group, an enterprise resilience consultancy, contends that while testing and training are critical, the outcome is not known until the people, policy and technologies are tested in a live event.

As we close 2012, allow me to thank all the people on the Securitymagazine team that have made this another record year for us. I wish everyone a very happy and secure holiday season.

 

Please Mark Your Calendar
The Security 500 Conference, postponed on November 1, 2012 due to Hurricane Sandy, has been rescheduled for February 12th at the Roosevelt Hotel in NYC. Visit www.security500event.com for more information.


This article was previously published in the print magazine as "For Your Consideration: A Few Predictions."

KEYWORDS: cyber security enterprise security enterprise security services security predictions security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Security 500 panelists to discuss the Predictive Revolution at the November 17 event

    Security 500: Predicting the Future of Security

    See More
  • Security in 2013 feature image

    How Security Can Add Value and Mitigate Risk in 2013

    See More
  • security operations center (SOC) freepik

    Investing in next-generation SOC skilling solutions results in better utilization of enterprise security tools

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing