The cyber crime problem is huge and involves many disciplines from across the information technology (IT) department, human resources, legal and traditional physical security. The threat vector is so vast that companies must collaborate more effectively internally to coordinate their defenses.
There are similarities to cyber crime attacks and physical facility breaches that are not being tracked today and can be predictive in nature. That will have to change.
Physical Security Information Management (PSIM) is morphing from “alerting” and post-incident-only management platforms and into incorporating a “predictive” behavioral component in their solutions. This is a natural progression being driven in large part by societal trends, the expansion of the Internet, and end user deployments within an accelerating global crime environment. The future is here and PSIM platforms must evolve to address the blended threat of digital and physical crime.
This January I had appointments with leading firms to discuss cyber strategy. These included the largest IT company in the world, a multibillion-dollar intelligence security consultancy, and a global physical security firm completing a billion-dollar acquisition. All understand cybersecurity is a leading issue in the boardroom and represents a recurring revenue goldmine if they incorporate cyber consulting and information protection solutions into their deliverables.
The race is on and innovative chief information officers (CIOs), chief security officers (CSOs), and chief information security officers (CISOs) are on the starting line watching the emerging technologies of social media, mobility, and cloud computing change their jobs, the marketplace, and the integrator channel.
2011 saw the untimely death of Steve Jobs, co-founder of Apple, and as we recognized his many accomplishments, the full impact he left on the world is still hard to believe. While his loss will certainly reverberate across Apple Corporation and the tech industry as a whole, I wondered what message this visionary man left the security industry.
The 2011 ASIS show was enjoyable as I explored new solutions and mingled with old friends. A number of consistent trends continue to impact global security in new ways as improved network bandwidth drives “big data” sets, requiring better situational awareness prior to downloading to intelligent mobile devices; securing those mobile end points is another matter for a future article.
The security executive’s role in America continues to gain strength and visibility. Whether in the public or private sector, the intelligence community, academia or a critical infrastructure installation, “securing the business operation” is paramount.
I recently attended the 2011 Black Hat cybersecurity conference in Las Vegas. I recommend more physical security integrators take part in this venue to better understand the converging nature of the security business. I don’t expect physical system integrators to leap into cybersecurity tomorrow, but, these vendors in the cybersecurity arena are making money, economy be damned. The response to my question, “How’s business?” ranged from “Excellent” to “Incredible.” Cybersecurity and cloud computing are the future of our “physical” security market, and these vendors are looking for partners.
The news media has been very visible about the next phase of security — cyber. Assuming that this domain belongs solely to the Information Technology (IT) department is a major mistake. The best security policy involves the integration of physical and virtual solutions to address gaps in your overall defenses. Today’s system integrator is ignoring the emerging cyber market. The physical security integrator needs a phased approach to adopt the skills needed to embrace the cybersecurity opportunity, starting with countering the insider threat to the business.
Managing security effectively requires a clear understanding of the changing threat landscape and continuous improvement through the integration of technology. The same technologies that operate a business (databases, surveillance systems, remote access, etc.) can be leveraged to improve security management. Integrating business silos can proactively protect companies from new threats while improving security and reducing costs.