Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

How to Build a Strategic Defense with IT Integration

The security industry’s defenses against cyber attacks have not evolved much over the last decade, but threat actors’ methods expand daily.

By Claire Meyer
IT slide 1

According to Dave Frymier, CISO for Unisys, IT integration helps enterprises protect their diamonds and their paperclips differently, allowing them to allocate resources well. Image courtesy of Unisys.

IT slide 2

 “We’re always in a long game against refined criminals,” says John McClurg, Vice President and CSO of Dell, Inc. However, a “connected” security system can help enterprises catch up. Image courtesy of Dell, Inc.  

IT slide 1
IT slide 2
September 1, 2013

Right now, the bad guys are winning.”

  It’s a bleak statement from Dave Frymier, the CISO for Unisys Corp., but one that many enterprise security executives need to hear.

“The industry is realizing that the tools we’ve had for the past 10 years or so (signature-based intrusion detection, basic firewalls, etc.) just aren’t working,” he says. While security’s defensive cyber tools might have worked against a static foe, malicious actors’ methods continue to evolve.

“A lot of current malware is too sophisticated for current tools to detect,” Frymier adds.

Take a Windows software update, for example. Over the past three years, Windows has continued to grow as a brand and a target, Frymier says. Every update on an employee’s computer comes with new vulnerabilities, and nimble hackers can reach a million targets immediately. The rate of updates and the range of goals have led to a jump in attacker sophistication. Why does this matter in the physical arena? For starters – how many of your security systems run on a Web-based interface, and how many Windows computers have access to them? Having an integrated and alert IT system monitoring those interactions and the flow of data can mitigate the risk of enterprises’ information assets from suffering from a bad patch or update.

In addition, certain tools that we take for granted are not as secure as we might think: “We forget how young the Internet is, and it’s built on multiple vulnerabilities: open source auto-responders (such as automatic reply systems for DNS) can be used to create Denial of Service (DoS) attacks, anonymity prevents us from tracking certain attacks, domain names are vulnerable, and it’s very easy to spoof things,” he says. “This is an issue that needs global cooperation to address,” and it’s slow in coming, Frymier continues.

IT integration can help in myriad ways, the main two being to aggregate as much data as possible (determine what might be happening at any given time) and to compartmentalize infrastructure, Frymier says.

While compartmentalizing might seem like the absolute antithesis of integration, the goal is to identify the most critical information and wall it off from people who don’t need to see or use it.

“It’s an ancient technique,” Frymier says, laughing, “of identifying your diamonds versus your paperclips and protecting them accordingly.”

Such diamonds in today’s enterprises could include financial systems, personally identifiable information (PII) and intellectual property.

It’s a focus on active defense, he says – enterprises taking measures to prevent incidents from happening in the first place. But how does this tie in with integration?

Imagine a small or medium sized Midwestern U.S. bank. One day, data starts moving out of the bank to an unknown IP address in Azerbaijan – a typical fraud alert system might detect the change and send an alert, but an integrated, or connected security system would provide a complete, actionable report. This allows systems to gather, share and analyze information, and then take action, such as stopping the flow of data to Azerbaijan automatically until the report is reviewed, says John McClurg, Vice President and Chief Security Officer for Dell, Inc.

McClurg started down the road to a converged or IT-integrated model when he was working for the FBI, tracking down a hacker by the pseudonym “Dark Dante.” Dark Dante combined physical and cyber hacking, or phreaking, to attack phone lines – including taking over all of the telephone lines for a Los Angeles radio station, ensuring he would be the 102nd caller in order to win a Porsche.

“He would pick the 30-year-old rusty lock to the central office of the phone company – a physical vulnerability – gain access to passwords, manuals, anything else he could gather; take it all home; study it until the wee hours of the morning; and then with that knowledge in hand, advance a much more sophisticated cyber attack than he ever could have done without that physical vulnerability,” McClurg says. “So that was the beginning of this converged model in my mind. And, soon, the opposite became equally apparent: that you could have cyber vulnerabilities (as the Iranians can recently attest) that can undermine your physical world interests.”         

McClurg’s career trajectory – developed along the path from the FBI to Honeywell to Dell – toward a connected security program is a step further than mere integration: As more and more physical security systems (surveillance, access control, etc) rely on IT components, enterprise security executives should be aware of the dangers that could befall those components.

CSOs need alerts on the key elements of their security systems, McClurg says. “If someone cuts a camera feed, your IT system should be able to notify you.”

A key tool in connected security is the use of cyber innovations, such as next generation firewalls. Unlike the firewalls of the past decade, these include features built for the threats and needs of 2013, including application control. According to McClurg, this includes only allowing safe access to certain applications – such as text posting to Facebook, but no file sharing. These can also manage integrated intrusion and extrusion detection.

“They can also look for innocuous, apparently benign behavior that, under the right conditions, can be dangerous,” he adds.

But on the integration side, these firewalls can add more business value than merely protecting intellectual property and safeguarding IT systems. By using these tools to identify and discriminate against certain applications or features (Netflix, cat videos on YouTube), more bandwidth can be reserved on the network for surveillance camera feeds, access control logs and other mission-critical data.

However, many security executives might see “firewall” and immediately think “It’s all Greek to me.” Frymier says that this is a common, but not impossible hurdle to overcome.

“The best way to learn about information security is to already know a lot about IT,” he says. “You can’t defend a fort until you know how it’s put together.” There are multiple online resources to help educate security professionals, including some through the U.S. government (http://csrc.nist.gov/publications/PubsSPs.html).

Another resource enterprise security executives shouldn’t ignore is the integrator partnership.

According to Frymier, end users should ask their integrators three key questions when building an integrated information security program:

How do you handle account management? (“You want to hear ‘I support SAML [Security Assertion Markup Language] integration,’” Frymier says. “This links HR with the active profile directory, which is linked to SAML systems. Through this, at the point of an employee’s termination, his or her access to IT resources is cut off automatically within minutes,” reducing the former employee’s window of opportunity to do harm.)

Do you have sufficient log capabilities, and is it compatible with my log analysis system? (“Yes.”)

Do you have monitoring support? (“Yes.”)

Dell’s connected model involves even more partner resources – building the IT security department around a “minimally essential core,” McClurg says, and then adding trusted, vetted partners as needed to reinforce our understanding of cyber vulnerabilities and how malware families are evolving.

“These could be 700 cyber warriors,” he says. “You can surge with your partner resources as needed to extend the reach of your team.” Using partners to combine detection, protection and response for every aspect of the enterprise leads to a more connected, unified security program.

“We’re always in a long game against refined criminals,” McClurg says. But, with some out-of-the-box, connected thinking, security is catching up.  

 

It’s Security’s Summer of 2013 Renewathon wraps up Sept. 30. Go to: www.SecurityMagazine.com/2013renewathon 

KEYWORDS: CISO cyber attack cyber defense security system integration software security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Officer

    How to Build Ownership of a Contracted Security Officer Program

    See More
  • networking-security-freepik

    How to build a better corporate social media policy

    See More
  • insurance-freepik

    The beginning of a beautiful friendship: How the insurance industry can partner with IT to create true digital transformation

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products
×
According to Dave Frymier, CISO for Unisys, IT integration helps enterprises protect their diamonds and their paperclips differently, allowing them to allocate resources well. Image courtesy of Unisys.
 “We’re always in a long game against refined criminals,” says John McClurg, Vice President and CSO of Dell, Inc. However, a “connected” security system can help enterprises catch up. Image courtesy of Dell, Inc.  

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!