Patrolling The Cyber-Physical Security Border

Are there any overlaps between the physical and cyber security fields? Are there certain corners of cyber security that can best be reached by physical security experts, and vice versa? Can the two fields benefit from more cross-pollination and professional cooperation?

The answer to all three questions turns out to be a resounding Yes, and I’m happy to report that there are some great people (some of whom I know personally) who are working on it.

Of special note here are major corporations like Microsoft and Symantec which have established unique Global Security Operations Centers (GSOCs) that bring cyber security, physical security and protective intelligence all under one roof. A recent article by Security Magazine details how these corporations pulled it off and rightly describes it the wave of the future.

I was recently lucky enough to get invited to the Physical and Cyber Threat Convergence Forum in Phoenix, Arizona. The conference was organized by CTG Intelligence and sponsored by AS Solution, Bedrock Protection Agency, Lazarus Alliance and others. Special thanks to my friend Phelim Rowe for putting it together and for inviting me.

The central idea behind the conference was to bring physical and cyber security professionals together and to kick-start a conversation. It’s apparent that many security professionals on both sides of the physical-cyber divide realize the value in this, and yet, there are still very few situations that put everyone in the same room.

Coming from the physical security realm, my main takeaway from this conference wasn’t so much that cyber security is important. Who doesn’t know that? I’ve even had the pleasure of working with and for cyber-security experts over the years. No, the main takeaway was just how much we have in common, and how much we can benefit from working together more closely.

Our goals, after all, are quite similar. We even define things in much the same ways, with risk and threat mitigation, hostile attacks, security awareness, preventive and reactive measures, Red-Teaming, penetration testing and more.

From my vantage point, it always seemed like cyber security was far better established, and much more of an exact science compared to physical security. The physical security professionals at the conference even jokingly referred to themselves as “knuckle-draggers” in comparison.

It was therefore quite surprising for us to discover just how inexact (even messy) the cyber field is. Many cyber experts describe it as a “Wild West” where they’re barely able to keep up with the threats; being outnumbered, outgunned and outmaneuvered by the bad-guys. But the most unexpected thing I heard at the conference was that cyber security experts are often jealous of their physical security counterparts. From their perspective, the physical realm is the one that seems much better established and effective.

Another interesting aspect about what previously seemed to me like an exact computer science, is how big a part the human factor plays in the cyber realm. It’s not that I didn’t know about such things as phishing and social engineering, I just didn’t know that the human factor accounts for the majority of cyber-attacks.

Things became even more interesting (at least for me) when many cyber experts sadly admitted that they feel neither proficient at, nor experienced in dealing with messy human factors. And since this is exactly where physical security and protective intelligence experts live, the potential for more cooperation is right in front of us.

Much of my surveillance detection work over the years had essentially patrolled the border between physical security and protective intelligence. Bridging the gap between these two important fields very often comes down to providing some new data inputs and connecting dots that no one else is.

I would now like to explore ways of doing the same for the cyber-physical gap. I’m looking forward to educating myself on cyber security, talking to and learning from the experts, and joining those who have begun patrolling the cyber-physical security border.

I invite you to join me.

 

Get Surveillance Zone now!

SZ_banner-2.3_web

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s