Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsSecurity Talk ColumnSecurity Enterprise ServicesSecurity Leadership and Management

Security Talk

Protecting U.S. Critical Infrastructure as Global Tensions Rise

Security leader discusses protecting critical infrastructure as geopolitical tensions grow.

By Rachelle Blair-Frasier, Editor in Chief
protecting critical infrastructure
ArtistGNDphotography / E+ via Getty Images
April 29, 2026

As of the writing of this column, the conflict with Iran is reaching its third week. In early March it was reported that the Department of Homeland Security was warning energy companies to increase security in case of Iranian retaliation.

I recently discussed with Nick Karakulko, Senior Director of Critical Infrastructure Protection Solutions at Octave, how utilities can protect critical infrastructure as national security threats and global tensions continue to grow.

Nick Karakulko
Nick Karakulko, Senior Director of Critical Infrastructure Protection Solutions Image courtesy of Karakulko

As global geopolitical tensions rise, how should critical infrastructure and utility security leaders be thinking about potential spillover risks to physical assets in the U.S.?

Nick Karakulko: Security leaders should view geopolitical tension as a reminder that domestic infrastructure often becomes a target of indirect pressure rather than direct conflict. That makes it critical to strengthen situational awareness across physical assets, especially those in remote or lightly staffed areas. Technologies such as LiDAR based perimeter detection paired with digital twins allow operators to understand, visualize and respond to anomalies in real time. Additionally, cloud based collaboration portals can help break down data silos by enabling secure sharing of operational information across departments and geographies. When organizations can view layered data alongside security alerts, they gain vital context that improves threat recognition and response.

During periods of geopolitical conflict, in your opinion, what types of physical threats historically increase, and are you seeing indicators of those risks now?

Karakulko: Historically, periods of global instability tend to elevate probing behaviors, sabotage attempts and unauthorized access efforts at utilities and critical facilities. Bad actors look for gaps where detection is slow or fragmented. Today, low tech, deniable attempts to test infrastructure resilience remain on the rise. Improving multi source situational awareness is essential. Collaboration portals and digital twin visualization allow multiple data layers from different silos to be viewed together, helping security teams notice correlations, such as pressure drops or temperature changes, that may otherwise go undetected.

With utilities managing networks of substations, pipelines and remote facilities, what measures should security leaders be taking into consideration during heightened global tension?

Karakulko: Distributed infrastructure requires security leaders to eliminate blind spots, unify data and reduce dependence on manual local monitoring. Deploying digital twins that incorporate LiDAR mapping, environmental conditions, access control events and live video feeds creates a single operational picture of both assets and their surroundings. When combined with collaboration portals, organizations can securely share real time information with operations personnel, enabling them to provide context during a developing incident.

How important is real time intelligence sharing between private infrastructure operators, government agencies and law enforcement when the global threat landscape is evolving quickly?

Karakulko: Real time intelligence sharing is essential because modern threat activity spans sectors and geographies. Technologies that centralize data make it easier to share validated information with partners without exposing internal networks. Collaboration portals enable external stakeholders to view site video or incident data securely, supporting coordinated response while reducing risk.

For security leaders responsible for protecting critical infrastructure, what are the top physical security gaps organizations should consider as geopolitical tensions escalate?

Karakulko: The most persistent gaps come from fragmentation — facilities running separate monitoring systems, inconsistent perimeter security and limited visibility over remote assets. Legacy systems lacking AI analytics make it difficult to distinguish threats from routine activity. The solution is unifying technologies that model the environment and interpret activity: LiDAR for precise object detection, digital twins for context and collaboration portals for securely sharing layered data. This closes the window where adversaries operate — the moment when a security incident is real but not yet recognized.

KEYWORDS: critical infrastructure geopolitical risk global security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Event Security

    Ensuring safety and success: The critical role of event security

    See More
  • smartwatch next to keyboard

    U.S. military members receive unsolicited smartwatches in the mail

    See More
  • Jeff Mieseler-Vice President, Protective Services-Nationwide

    Jeff Mieseler — Taking Opportunities as They Come

    See More

Related Products

See More Products
  • High-Rise Security and Fire Life Safety, 3rd edition

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • January 29, 2026

    Protecting Data Centers as National-Level Critical Infrastructure

    ON DEMAND: Data centers have quietly become some of the most critical infrastructure around the globe. Learn how the modern security mission is no longer just about protecting assets — it’s about protecting outcomes such as resilience, uptime and global trust.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing