Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

What You Need to Know about IT and IT Security

July 1, 2007
The best strategy is to ally physical security with IT and meet regularly to assess identification responsibility and common interests, according to David Kakish.


Advances in information technology (IT) are driving surprising change in surprising places, including the systems that control commercial and industrial facilities, identity management or access to them.

Furthermore, white collar crime, which used to refer to low-tech transgressions such as embezzlement or fraud, has also gone high tech.

So, the chief security officer’s job is expanding, often to include responsibility for investigating breaches of security as well as increasingly sophisticated approaches to physical plant security.

THE INTERSECTIONS

Certainly, personnel authentication and facility access control are major intersections between physical and IT security. The evidence:
  • Surveillance video is starting to run on Internet Protocol (IP) networks, with security video output being converted to digital information for storage and retention, as well as the increasing popularity of IP-based cameras.

  • Smart card and biometrics identification systems, growing in popularity to protect facilities and IT networks alike, rely on secure databases to store the unique markers for authorized personnel.

  • Security departments have long been a fixture in employee hiring or layoff processes. Today, with so many employees working on corporate networks, it’s a good idea to partner with IT to have a clear understanding of exactly what network access employees are issued, to check against if and when they leave.
These trends suggest that CSOs must invest in understanding fundamental aspects of IT security, at the least to ensure that their physical security technology infrastructure is as secure as the facilities they are assigned to protect. This is a triple challenge, because:
  • The pool of employees accessing the corporate network in any organization changes constantly, which increases the network’s vulnerability to security breaches.

  • IT security threats from outside the network evolve constantly.

  • IT security architectures therefore evolve constantly.


About the Source

Security Magazine thanks David Kakish, security technology specialist with CDW Corporation.

Look for three elements – monitoring, technology and security that go from end-to-end.

SIDEBAR: Banking on Proactive IT Security

The bank needed an additional layer of network security and found an answer.

As the largest independent cattle lender in Texas, Amarillo National Bank is among the largest family owned banks in the United States.

Bill Davis, data security officer for the bank, supervises security for a 620-node Microsoft-centric network that supports more than 500 employees in its central bank in Amarillo and branch banks throughout the city. Specifically, Davis was looking to add an additional layer of network security to his existing infrastructure that consists of firewalls, anti-virus and in-house IDS using the SNORT open source engine.

Davis emphasized, “Not only must we protect the integrity of our information, but we also have to demonstrate due diligence in meeting state and federal regulations.”

To maintain a strict segregation of duties, for example, Davis does not report to the bank’s CIO or IT department but rather to an executive vice president of the bank. Plus Davis has to produce regular reports for review by a data services committee established by the bank’s board of directors.

“I liked the idea of a managed service,” Davis said, “but the conventional managed service option proved far too costly.” Instead, Davis selected Alert Logic Threat Manager as the solution to complement his existing security infrastructure by providing an extra measure of security at critical choke points in his network.

Besides the added layer of internal network security, Davis appreciates the easy-to-use interface of the ID solution. He also noted the convenient reports he is able to generate himself, including incident summaries as well as vulnerability trends over time.

“I can produce reports on demand, and answer ad hoc queries by internal or external auditors,” Davis said. “I like having a solution that’s easy to manage myself, and one that can deliver reports to help demonstrate policy compliance and show that our security program is working.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Entitlement creep: what to do about it

    Entitlement creep: What you should know about it

    See More
  • cyber web freepik

    What you need to know about the deep and dark web

    See More
  • SEC0919-Edu2-Feat-slide1_900px

    What Do You Need to Know About the California Consumer Privacy Act?

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing