martes, 27 septiembre 2022
Visitas totales a la web: 87906770

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Preparing For Physical and Cybersecurity Convergence

John Dames

Today’s security professionals need comprehensive strategies that take both physical security and cybersecurity into account

In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams. From unauthorized personnel attempting to gain entry to your facilities to cybercriminals looking to breach your network, private security and public safety stakeholders need to be everywhere at once — or at least have the software that can help counter each specific threat.

This is only getting harder as digital infrastructure becomes more advanced and bleeds into the physical security world. For example, with organizations relying on the Internet of Things (IoT) for a greater share of their physical security — the number of IoT-connected devices is projected to reach 75.4 billion by 2025 — physical and IT security leaders need to defend a larger attack surface than ever before.

This reality creates unique opportunities as well as heightened risks for CSOs and CIOs. While digital technology has led to advanced physical security systems, the network-connected hardware behind them must now be managed with an understanding of the relationship between physical security and cybersecurity. For example, a data breach in a smart building could allow bad actors to remotely disable security or monitor video surveillance feeds over the network. On the flip side, a physical breach of the same smart building could allow bad actors to capture digital assets for cybercriminal activity. In both cases, vulnerabilities in one space bleed into vulnerabilities in the other. Cybersecurity directly impacts physical security and vice versa.

Our increasingly digital world also means that organizations are facing a new generation of cyber-physical threats. In fact, Verizon’s 2018 Data Breach investigations Report found that 11 percent of data breaches involved physical actions. For private security and public safety professionals, the convergence of physical security and cybersecurity urgently requires a new approach and investment in technology that can deliver success.

Cyber Threats are Physical Threats

As organizations invest in digital technology to support their physical security, it’s imperative that they understand how cyber threats pose a risk to both IT infrastructure and physical assets. Connected devices such as cameras, sensors, and digital door locks present cybercriminals with new points of entry into otherwise protected networks. If any one of these assets is compromised, organizations could face a cybersecurity breach that wreaks havoc on all devices connected to their network.

Because the convergence of IT infrastructure and physical security is relatively new, cybercriminals are hoping to catch organizations off-guard. In 2014, for example, hackers breached the network of a German steel mill to access the facility’s control system. The phishing attack causing significant problems for the plant, including damage to a dangerous blast furnace that couldn’t be shut down normally.

How Digital Technology is Improving Physical Security

Despite some of the associated cybersecurity risks, CSOs and CIOs should look for opportunities to leverage new technologies for advanced physical security measures. For instance, biometrics has become an important part of organizational security. Research from Spiceworks shows that roughly 62 percent of organizations currently use biometric authentication technology, with fingerprint and face scanners being the most commonly used technologies on corporate devices and services.

Biometric authentication offers an improvement over traditional authentication methods like passwords, PIN numbers, and personal security questions. Other biometric authentication methods include hand geometry recognition, iris scanning technology, and voice recognition. With the rise of these new methods as well as the increased adoption of fingerprint and face scanners, Spiceworks predicts that nearly 90 percent of businesses will be using biometric technology by 2020.

Additionally, data-driven software is essential for managing overall security in today’s threat environment. Security decision-makers at all levels of an organization should be using digital solutions to access real-time information in order to respond to developing threats. By delivering updated information to stakeholders as events occur, software solutions make it possible to answer physical threats in a concerted, organized way.

The Convergence of Cybersecurity and Physical Security

As cybersecurity and physical security converge, CSOs and CIOs need to consider what steps should be taken to develop a more comprehensive modern security strategy. To do so, leaders must think of cyber-physical security in a unified way. The first step should be to invest in advanced technology that can make networks and facilities safer while simultaneously addressing the vulnerabilities of connected physical assets.

This means that organizations will have to make the necessary changes to bring cybersecurity and physical security planning together. Moving forward, leaders must facilitate collaboration between facilities staff and IT professionals in order to successfully counter cyber-physical threats.

Ultimately, private security and public safety decision-makers must work with stakeholders across cybersecurity and physical security teams to determine the best path forward. While this will look different from one organization to the next, it’s essential that security professionals work together to secure the physical and digital assets that comprise all modern institutions — from private security teams to public corporations.

Fecha de publicaciónseptiembre 20, 2019

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos

Recomendado

Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

El amor de Macarena Olona por la Guardia Civil empieza por su pareja, un joven oficial condecorado

El padre de su hijo llegó a la Benemérita como militar de carrera y, los que le...

La artillería ‘made in USA’ comprada por Marruecos que deja fuera de juego a España

El país magrebí sigue reforzando sus fuerzas armadas a golpe de talonario, y no lo hace de...

Últimas noticias

Pilar Montero del grupo de emergencias en Patrimonio (UCM): «El terremoto de Lorca lo cambió todo»

La directora del grupo de investigación de Gestión de Riesgos y Emergencias en Patrimonio Cultural (GREPAC)...

La actriz de Hollywood que logró uno de los inventos militares más importantes del siglo XX

Hedy Lamarr pasó de huir del fascismo que se propagaba por Europa en los años treinta a enfrentarse directamente a él, creando...

SEGURIDAD, “GLOBAL BRITAIN” Y ENTIERRO DE LA REINA ISABEL II DEL REINO UNIDO

El 19 de septiembre de 2022, ha sido un día que pasará a la historia del Reino Unido y la del resto del mundo. En ese día se ha producido el entierro de la reina Isabel II de Inglaterra tras su fallecimiento el día 8 de septiembre en el castillo de Balmoral (Escocia).

El pulso electromagnético, el arma que puede hacer retroceder a una ciudad al siglo XIX

Estados Unidos, Rusia y China trabajan en sus propios proyectos. El Pentágono cree que Irán y Corea del Norte también lo hacen.

Así se gestó un ‘atraco virtual’ de 240.000 euros a través de Bizum

Más de un centenar de personas participó en un entramado para desvalijar la cuenta corriente de una anciana tras detectar una debilidad...