At Cyber:Secured Forum, Cyber and Physical Security Professionals Tackle Integration Challenges

One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products

The agenda for this year’s Cyber:Secured Forum, held from July 29-31 in Dallas, Texas, was expansive. Attendees listened to top leaders from the cyber and physical security industries break down everything from the motivations of hackers to the latest trends in enterprise technology.

But there was one topic that seemed to be on the minds of nearly every conference-goer: the ongoing challenges of integrating physical security technologies with cybersecurity products in an era of constant attacks on corporations and government agencies. As one session description put it: “Connectivity has opened up a Pandora’s box of opportunity and challenges for the physical security industry.”

Vince Ricco, a business development advisory system engineer in the IoTSS global division at Dell Technologies, has seen that Pandora's box open up in real time. Having worked in the technology industry for decades, Ricco has seen major shifts in how the physical security sector approaches integration and cybersecurity.

“When you take video surveillance specifically, it was designed to emulate its predecessor analog technologies,” Ricco told Security Today on the last day of the conference. “That’s really what led to some of the [cyber] vulnerabilities.”

He added that manufacturers and other members of the industry had to overcome this “very analog mentality” and start finding ways to secure devices that were being integrated into video management systems.

“What complicates it for physical security is everybody has their space,” Ricco said, listing edge technology, light sensors, and video cameras as examples. “If I harden something at the edge, how does that now operate with the center of the universe: the video management system? That’s where we had to learn how to collaborate across the ecosystem.”

In the future, Ricco anticipates that more companies will take it a step further and adopt open APIs, which allow security integrators to change how applications communicate and interact with each other. Through open APIs, Ricco said, developers can offer a “single pane glass” for the end-user: a way for their video management system, camera manufacturer and audio sensor programs to work together securely and seamlessly.

“The more that there are some open APIs, that can allow all the individual components to have their value-add technologies,” he added. “They don’t have to open up and put things out in the public domain, but it does allow secure communications between them. And I do see that happening today.”

Overall, as medium and large enterprises look for security solutions with cloud technology, Ricco would like to see providers deploy their products in processes that work within companies’ existing cybersecurity practices rather than forcing those institutions to change their ways.

“I’ve been in technology for quite a while, and the one thing I always hated about technology was when I had to change the way I lived and do things to accommodate the technology,” Ricco said. “They have their cybersecurity practices in place, right? And to have to shift and change that to accommodate a service provider? Not the way to go.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.