ISC West (International Security Conference & Exhibition) is the largest security industry trade show in the United States, where security professionals can meet and mingle with over 30,000 of their peers to discover technology innovations and network with other professionals. Over 1000 exhibitors and brands are slated to attend the 2018 conference, taking place in Las Vegas at the Sands Expo Center from April 10-13. ISC West sees attendance from both physical and IT security professionals in many disciplines—dealers and integrators, architects and engineers, and end users from a wide variety of industries. Integrators in particular should be excited to experience the opportunities to improve their business by attending ISC West.
There are ideas and concepts that you come across that you realize immediately were not developed for your particular endeavor, but nonetheless are very appropriate. As physical security is becoming more oriented around industrial IoT, Big Data, machine learning, and other areas of data science there are some useful ideas for physical security professionals to consider. One of these is “data gravity”; the nature of large amounts of data to draw in applications and processes that take advantage of the presence of that data. If you’re running an IP-based physical security system, you may have already noticed that whether it’s a PSIM (physical security information management), Viakoo for automated system verification, or numerous advanced video analytics applications, there are now a lot more applications being drawn towards the data present in IP-based physical security systems.
As with most things in life that develop at a rapid pace, the Internet of Things (IoT) may have early adoption issues but ultimately will function smoothly over time. Both the personal and enterprise benefits of living in a fully connected world where everything has some connection to a network will ensure that IoT adoption continues to expand. The current issues around cyber secure and functionality of systems are being addressed, paving the way for future IoT growth. But with today’s reality no CSO or CISO wants to be responsible for IT and/or physical security operations when they don’t have control of what’s connected to the network; they don’t know which security systems were offline or not working; and can’t easily determine which devices were impacted by downtime, data breaches, or compliance issues. No one wants to be that person.
As time marches on in physical security, sometimes there are clear markers along the way that fundamental changes have happened. We are all aware that IP-based physical security has taken hold, and the nature of managing and maintaining physical security networks has changed along with it. Is there a line we can draw in the last couple years to say “this is when it all really changed”? I would argue that 2017 is when a distinct change happened organizationally, specifically on how IT is sharing more responsibilities than ever before regarding physical security.
In many organizations, security is still considered an independent issue that is restricted to the security department, and decisions made by the security team are mostly of interest to the board only in relation to their costs or if a significant breach occurs. As physical security continues to take a more central and company-wide role in compliance, brand reputation, and cyber-security, it has consequently become an area your board is likely to want to have more information on – and sometimes will want that information on a moment’s notice.
In any business, security duties and responsibilities may be spread between different departments to fulfill different needs. The physical security, IT, compliance and facilities departments all may have different responsibilities falling under the heading of ‘security’ to protect employees, assets and company data. While physical security helps keep potential threats at bay by controlling access and surveilling the facility, IT protects the network and servers from hacking, and facilities makes sure that the building itself is maintained and doesn’t pose any risks.
Prevention has always been a goal for security; proactively averting threats to the business reduces the need for response and remediation and is a the most desirable risk management model for any organization. With today’s technology, IT can install firewalls on the network, while physical security could implement facial recognition software to prevent former employees from entering the building. Compliance regulations ensure that all departments meet standards for protection and prevention.
An article I saw recently started with this compelling question:
As 2017 is headed to a close we can already see trends that will shape the security landscape in the next year. Some of the trends that we’re seeing for 2018 include the growing recognition of the vital role physical security plays in assuring cybersecurity – and vice versa. We are also seeing new means of how organizations are approaching physical security compliance, and an evolving (and more strategic) relationship between integrators and end-users. Understanding these trends should help organizations plan ahead for how they can benefit most as 2018 unfolds.
NOTE: This is a guest blog from one of our business partners, Kenton Brothers for Security. Viakoo's take is that this blog really hits the nail on the head when it comes to how the security integration business has changed, and how leaders like Kenton Brothers have managed their business along with those changes.
It’s an interesting experience carrying forward a century old organization in today’s technology driven business environment. Think about the speed at which things move and change today compared to even as little as five years ago. Then compare that back to over 120 years ago when KB was founded…really, almost everything has changed since 1897.
Who wants more time spent on service calls? Don’t be shy…