Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Leadership and Management

Getting Realistic Results from Security Technology

As the security industry heads to the largest technology trade show in the world, ISC West in Las Vegas, it is a great time to do an inventory and reflect on your security technology investments and systems

By Mark McCourt
Trends February 2014
March 1, 2014

As the security industry heads to the largest technology trade show in the world, ISC West in Las Vegas, it is a great time to do an inventory and reflect on your security technology investments and systems. In short, what are you doing with them and what are you getting from them?

There will be more than 1,000 exhibits at ISC West plus another 100 or so new technologies and solutions presented in hotel suites and meeting rooms off the show floor. Robust discussion about the movement toward IP, mobility and the cloud will buzz across the show floor, as it should.

But connecting the many amazing leaps in efficiency and effectiveness to your security and risk management program will still be a daunting task. At issue are your strategic initiatives that include supporting enterprise business goals, securing people, assets and infrastructure and moving your program from response to prevention to being predictive.

How do you connect all of those dots?  For example, how does the incredible new IP HD megapixel camera that a manufacturer launches at the show and sells through your system integrator translate into intelligence to predict and prevent bad things from happening? Clearly, each and every component is a piece of the security solution to help respond, prevent, predict or recover from an event.

While it is a race of measures and counter-measures, there is no question that GSOCs, CyberSOCs, analytics, intelligence gathering and analysis are having a major impact on improving an enterprise’s ability to detect and mitigate threats, as well as the ability to be resilient and recover from vulnerabilities. As our cover story exemplifies, Ed Goetz and the leadership team at Exelon are gathering, analyzing and acting on information to predict events, not just prevent or respond.

And they are not the only ones moving in this direction. ADP’s CSO, Roland Cloutier, explained in an interview with Security: “We developed a new risk and privacy roadmap. Core to the plan is the Trusted Platform Security Initiative, a global governance, risk and compliance technology platform for our operations workflow. We were able to look at business operations and how they responded in the past to different events. With the new platform, we looked at major applications such as fraud detection, workforce safety and compliance. From an ROI standpoint we asked, ‘Can we detect more events now than in the past?’ And we measured how we would apply information to prevent events versus how we would deal with post-event response in the past. Finally, we evaluated the total load of each metric. The business case outcome was very favorable for this investment.”

You may have seen IBM’s predictive analytics advertisement for law enforcement and public safety in which a thief arrives at a convenience store only to find the police already there, waiting for him in the parking lot. While that’s a nice concept, the state of the technology is not quite there yet. What the IBM Smarter Cities Operations Center does do is “synchronizes and analyzes information gathered from diverse data-collection systems. Patterns revealed through analytics help decision makers anticipate – rather than just react to – problems, and dispatch first responders to the scene faster. The results, such as predictive policing, mean better citizen-centered service...whether minimizing inconveniences, overseeing emergencies or stopping crime.”

After the Boston Marathon bombing, Boston law enforcement leveraged their newly implemented IBM Operations Center to gather disparate, voluminous data and use analytics to derive new insights and uncover trends. For example, during the search for Dzhokhar Tsarnaev, numerous phone tips and social media posts were fused through the operations center and efficiently analyzed to support the search. While the move toward predictive operations is improving with each iteration and highly promising as a cost effective risk mitigation tool, in the end it was an observant resident and cautious police work on the ground that led to his capture.

But ultimately, it will be technology and the ones and zeroes that calculate and chronicle our lives to predict a book we would like to read on Amazon, an item we are inclined to purchase through Google, or a store we were stopped from robbing by IBM, that will move the profession toward risk management and reduce the dependence on incident response. And the technology solutions demonstrated at the ISC West trade show or presented to you by your systems integrator are important to understand and consider in your strategic planning for the next generation platforms of GSOCs and CyberSOCs.  

 

Please join us at the Security 500 Conference in Palo Alto on April 29. Registration details are at www.security500.com 

www.security500.com
KEYWORDS: Global Security Operations Center (GSOC) ISC West security leadership skills security system integration security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Robert D. Gates

    Look at Risk from a Different Angle to Achieve Results

    See More
  • surveillance responsive default security

    NYC Bridges and Tunnels Getting Facial Recognition Technology

    See More
  • SEC01110_Trends_Mccourt

    Top Lessons Learned from the Security 500 Conference

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing