At Cyber:Secured Forum, Cyber and Physical Security Professionals Tackle Integration Challenges

One topic seemed to dominate this year’s conference: the ongoing challenges of integrating physical security technologies with cybersecurity products

The agenda for this year’s Cyber:Secured Forum, held from July 29-31 in Dallas, Texas, was expansive. Attendees listened to top leaders from the cyber and physical security industries break down everything from the motivations of hackers to the latest trends in enterprise technology.

But there was one topic that seemed to be on the minds of nearly every conference-goer: the ongoing challenges of integrating physical security technologies with cybersecurity products in an era of constant attacks on corporations and government agencies. As one session description put it: “Connectivity has opened up a Pandora’s box of opportunity and challenges for the physical security industry.”

Vince Ricco, a business development advisory system engineer in the IoTSS global division at Dell Technologies, has seen that Pandora's box open up in real time. Having worked in the technology industry for decades, Ricco has seen major shifts in how the physical security sector approaches integration and cybersecurity.

“When you take video surveillance specifically, it was designed to emulate its predecessor analog technologies,” Ricco told Security Today on the last day of the conference. “That’s really what led to some of the [cyber] vulnerabilities.”

He added that manufacturers and other members of the industry had to overcome this “very analog mentality” and start finding ways to secure devices that were being integrated into video management systems.

“What complicates it for physical security is everybody has their space,” Ricco said, listing edge technology, light sensors, and video cameras as examples. “If I harden something at the edge, how does that now operate with the center of the universe: the video management system? That’s where we had to learn how to collaborate across the ecosystem.”

In the future, Ricco anticipates that more companies will take it a step further and adopt open APIs, which allow security integrators to change how applications communicate and interact with each other. Through open APIs, Ricco said, developers can offer a “single pane glass” for the end-user: a way for their video management system, camera manufacturer and audio sensor programs to work together securely and seamlessly.

“The more that there are some open APIs, that can allow all the individual components to have their value-add technologies,” he added. “They don’t have to open up and put things out in the public domain, but it does allow secure communications between them. And I do see that happening today.”

Overall, as medium and large enterprises look for security solutions with cloud technology, Ricco would like to see providers deploy their products in processes that work within companies’ existing cybersecurity practices rather than forcing those institutions to change their ways.

“I’ve been in technology for quite a while, and the one thing I always hated about technology was when I had to change the way I lived and do things to accommodate the technology,” Ricco said. “They have their cybersecurity practices in place, right? And to have to shift and change that to accommodate a service provider? Not the way to go.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3