Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video SurveillanceCybersecurity News

10 Factors to Assess Your Integrator's Cyber Skills

By Bob Liscouski
August 1, 2015

Cybersecurity is more than just a headline associated with attacks on critical infrastructure assets, such as utility companies or our nation’s repository of its personnel records of employees with the highest security clearances. Cybersecurity touches each and every component of our business community from the largest corporation to the smallest “Mom and Pop” shop. The word “critical” is merely a relative term. Yes, the nation would be devastated by an attack on its telecoms or power systems. However, any small and medium-sized business could be equally critically impacted should an attack disrupt or disable their capability to conduct their business regardless of whether they contribute to our national security or they produce bubble gum. 

Most companies don’t have security leaders or professionals on their staff, and they have to rely upon the expertise and guidance of those that provide those services to them. Those companies that are large enough to have professional security staff are frequently challenged with knowing what the right level of security is and how to implement it. Most security leaders choose their systems integrator (video, access, alarms and cyber) based on two main criteria “competitive prices and customer service.” Of course the personal relationship with your account executive also plays a major part of your comfort level. This is an incomplete way to make your decisions.

There are two desperately needed skills that are rarely evaluated: Your integrator’s understanding of cyber threats, and their ability to work within your company’s ever-changing IT environment.

Every integrator in your region, and especially those powerful-looking national integrators, all tout their high-level IT skills. But who ever really checks their depth and span of knowledge? No integrator says “Yup, we can pull wire, but we just connect the boxes.” Everyone claims to have experienced IT professional on staff and available. The reality is quite different.

First, in a regional integrator, the IT skills vary and often consist of one “whiz kid,” who may leave at any time. Is there a backup? In a national integrator that can afford more in-depth IT experience, those specialists are usually located near their major offices. Is your site close to their headquarters? Are they willing to come onsite when there is a major security versus IT department problem? Most likely those IT experts are in high demand and far from your office.

Develop a checklist when interviewing current and prospective security integrators.

  1. How many IT staff are in the company? Names and certifications please.
  2. How many of the staff are certified on your specific system?
  3. Is the IT staff on call or only available Monday through Friday during working hours? How available is the IT backup staff in an emergency?
  4. Ask for the contingency plan should the IT staff depart. Is there a contracted backup or sufficient depth in staff to handle any one person leaving?
  5. Have your IT department leader interview the integrator’s best IT staff, preferably more than one person. Your colleague can quickly advise you if the integrator has the necessary skills and understanding of your IT department operating systems.
  6. Your IT leader can also probe into cybersecurity issues. How much training does your integrator have in understanding and responding to cyber threats?
  7. Ask your integrator for their in-house cybersecurity protocols. Do they perceive their own systems as vulnerable and what did they do to mitigate? Have them show you a written cybersecurity plan. If they don’t have one, they are working a decade behind the times.
  8. Does your integrator know the potential vulnerabilities of your existing access control system? If they answer “There are none,” you have a problem.
  9. Find out what kind of insurance coverage your technology provider has if they are found responsible for introducing a vulnerability or performing poor work.
  10. Assess what kind of insurance you have against cyber attacks. Do a thorough review of your policy to understand what is covered, and what is not covered. You’ll be surprised to learn that there are typically more exclusions than inclusions, and your cyber insurance may be limited to loss of privacy-related data and not an operational interruption or damage to your systems resulting from an attack.

Do not take security IT skills at face value. Use your internal support teams to probe and complete due diligence, and where you don’t have a “support team,” take the time to ask the tough questions and make sure you get answers you can understand. Uncover weaknesses and push for upgrades in staff. If the end-users don’t demand better skills, integrators will not always add overhead until there is a crisis. 

KEYWORDS: integrator IT skills security integrator

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bob Liscouski has more then 30 years of experience in security and law enforcement, and he is the Executive Vice President of Integrated Strategies Group. Liscouski and ISG have founded four additional firms — Steel City Re, Edge360, Axio Global and Convergent Risk Group.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Addressing Profiling Changes to the Department of Justice

    See More
  • How to Use Smarter Surveillance to Close Intelligence Gaps

    See More
  • Using Security Convergence to Enable the Enterprise

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing