Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

“Going Virtual”: Evolving PSIM to Fight Cyber Crime

April 1, 2011

At the ISC West conference in 2009, I saw a great keynote speech delivered by Lt. General Kenneth Minihan, former Director of both the Defense Information Systems Agency (DISA) and the National Security Agency (NSA). Our intelligence agencies, based on their mission, identify global security trends several years ahead of the commercial markets. As he put it, “Regarding cybercrime and intellectual property theft, we are facing the most serious economic and national security challenge of the 21st century.” The General also made the point that the exhibitors on the floor had no idea about the seriousness of the threat, or the market opportunity it represents.

The fact is the physical security industry has done nothing since 2009 regarding combating cyber crime. McAfee, a security firm recently purchased by Intel Corporation, produced its 2010 annual security report and stated that the annual global revenues from cyber crime exceed $1 trillion. This involves everything from personal identity theft, stealing intellectual property and e-commerce fraud, to piracy of software and counterfeit goods. The threats are both internal and external to organizations.

Security manufacturers and integrators see the intelligent building market as an opportunity to attract business with cost effective and integrated environmental controls and security solutions traversing IP networks. The same strategy is deployed at critical infrastructures, transportation hubs and sports venues. How do we protect our intelligently connected buildings from network attackers? The Center for Strategic & International Studies (CSIS) recently released a report on cybersecurity that focused on critical infrastructure as its number two recommendation, stating the need to: Mandate better cybersecurity in Critical Infrastructure (CI), with specific emphasis placed upon the authentication of identity within CI. It is not difficult to hack video surveillance cameras, access control software, or customer databases and identity management systems. It is also not a secret that traditional crime is now going digital.

The ability to seamlessly integrate new solutions is the hallmark of the current PSIM concept. PSIM (Physical Security Information Management) must evolve and secure these critical networked solutions and counter cyber crime activity. A trillion dollar market need is here today. PSIM vendors have embraced convergence and understand that the future of the security industry is application integration delivered over the Web. Physical, as in perimeter protection, is just one critical aspect of the job. Our major defense contractors created C4ISR systems (Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance) to integrate our war fighting. These corporations, out of necessity, also had to protect themselves against cyber crime and espionage. This is the precedent that the PSIM industry must follow. It will involve partnering with cybersecurity players outside of traditional channels. Cybersecurity is the next phase of security convergence. Solutions enabling trusted identity (people and end points), keystroke-monitoring software, encrypted thumb drives and human behavioral and network analytics are all evolving security requirements. Education is also a huge need in a constantly evolving threat environment spanning technology breeches, social engineering threats and traditional insider theft.

More than ever, risk management today involves more machine to machine and sensor to human communications to secure operations. The technologies we utilize everyday, (facebook/mobile devices) are cloud based and delivered wirelessly. The “physical” boundaries have been broken. The reality is that the digital economy promotes crime, which increases our security responsibilities. The PSIM industry needs to go virtual and drop the “physical” only thinking and acronym. We need to monitor increasing cyber crime threats as part of our command and control responsibilities and integrate this capability into our security policy. If not, the physical security industry (PSIM vendors and integrators) risks losing a great opportunity to extend account control. It makes no sense to have a fully integrated platform commanding and controlling critical infrastructure security while simultaneously being totally vulnerable to network attacks and cyber criminals. The PSIM solution must evolve into a broader and virtual security solution platform. Cyber protection will be a competitive differentiator. Innovative software developers will see the opportunity and integrate security solutions to answer the cyber crime problem facing their customers and extend their offerings. Cybersecurity monitoring and consulting services will be positioned as a sales benefit. One PSIM vendor needs to (virtually) step up to the next level and lead.

Longer term, cybersecurity and cloud computing are the two “huge” trends changing the nature of the security industry. At their core both are about securing information and protecting a business that is IP enabled and under attack. Today PSIM offers no cyber crime defenses. Evolving the concept offers the best option for the security requirements of the 21st Century. Our nation’s critical infrastructure is vulnerable; our intellectual property at risk, and cyber crime is a one trillion dollar business. In 2011 we still ignore the cyber opportunity? The General is still right!

KEYWORDS: cloud computing cyber fraud cybercrime identity theft intellectual property theft piracy of software psim

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • So Where Do the Stimulus Dollars Go? Some to Fight Crime

    See More
  • Back to Basics to Address Evolving Cyber Threats

    See More
  • police

    Law Enforcement Wants Video Footage to Fight Nearby Crime

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing