Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

RSA Review: Converged Risk and the Internet of Things

The 2014 RSA Conference this February in San Francisco highlighted the theme of “Threat Intelligence.”

RSA Conference 2014

A convergence of security solutions adds complexity to the leadership roles in the Security C-Suite. “Who owns responsibility for what solution sets/deployed where and how?” Does decision making reside in the IT organization, with the CSO, or CISO? While the CEO and board own responsibility for the “totality of risk” facing the business, where do they turn for leadership in specific areas? These issues were addressed at numerous sessions during the RSA conference, but the answers are as wide and varied as the business sectors seeking these answers. Photo courtesy of RSA Conference

RSA Conference 2014

A convergence of security solutions adds complexity to the leadership roles in the Security C-Suite. “Who owns responsibility for what solution sets/deployed where and how?” Does decision making reside in the IT organization, with the CSO, or CISO? While the CEO and board own responsibility for the “totality of risk” facing the business, where do they turn for leadership in specific areas? These issues were addressed at numerous sessions during the RSA conference, but the answers are as wide and varied as the business sectors seeking these answers. Photo courtesy of RSA Conference

RSA Conference 2014

Dan Dunkel

RSA Conference 2014
RSA Conference 2014
RSA Conference 2014
April 1, 2014

The 2014 RSA Conference this February in San Francisco highlighted the theme of “Threat Intelligence.” Judging from the overflow crowd of 30,000-plus attendees, many are intelligent enough to be very concerned. With business risk at all-time high, managing continuous and converging threats is a challenge. Especially when it appears that our cyber market “messaging” in many regards is overlapping. The fact is that scaling cybersecurity talent is a major problem facing security practitioners, while technology in general is advancing at an accelerated rate and reducing the useful lifecycle of most products. Add to this mix that many physical security solutions are also embracing the IoT (Internet of Things) model to confuse traditional lines of security spending authority. Taken together, we have a very interesting market dynamic at the exact time that the nature of digital risk is converging and evolving. As the saying goes, “May you live in interesting times.”

The “Internet of Everything” is a buzz phrase referring to the tech industry’s evolution to connect all machines and people everywhere on the planet. The IPV4 (Internet Protocol) to IPV6 conversion means tons more IP addresses to drive the productivity and efficiency of man and machine, while simultaneously exploding the total number of potential breach points. The cybersecurity market sector has its hands full with long-term revenue potential, and this was on display with a record number of vendor booths. Mobility, social networking and the cloud continue to drive user behavior, and extend risk well beyond traditional physical boundaries, with your smartphone acting as the lead change agent and breach target.

While “the cloud” has been an industry focal point for years, tech guru Bruce Schneier pontificated on a panel discussion that the “Cloud is actually more secure then on-premise systems.” The session’s overall message being, if your reluctance to embrace the cloud is security driven, you might want to re-evaluate as user acceptance is rapidly expanding. One issue to understand is how digital and physical technologies blend to impact all aspects of operational risk to the business.

This issue is affecting everything from risk exposure at the CEO and board levels, to the roles and responsibilities between C- Suite security executives, to end user education, and the changing focus of all security industry sales channels. In short, the nature of security risk is changing, and RSA had something for everybody.

Change impacts all human beings differently – some embrace it, some follow it and others get run over by it. Change manifests itself in many ways to drive “new” behavior. Change is occurring rapidly as “fundamental” technologies mature to extend end points, drive productivity levels and simultaneously accelerate cyber crime and espionage breaches. These base technologies themselves are not new, but the group acceptance level around them has arrived, and accelerated risk. The Information Technology industry and its close cousin, cybersecurity, are converging to secure all IP-enabled devices to address the “totality of risk” that any networked business faces today.

As noted by industry pundit Nikko Hypponen, Chief Research Officer at F-Secure, “In the future all crime is digital.” Business information (money, intellectual property, patient/customer records, etc.) is aggressively being copied, stolen and sometimes destroyed. Countering the rapid momentum of cyber crime and espionage is driving strategy changes at the CEO and board levels, which are impacting C-Suite security executive positions across the industry. To the CSO, CISO, CIO and even CFO, this direction impacts career paths. To security vendors and integrators alike, this changes business strategies for sales; support, marketing, hiring and even advertising spend. The industry is evolving to a model that “continuously” provides solutions and/or services in support of customer requirements for “real time” risk mitigation and resiliency goals.

This convergence of security solutions adds complexity to the leadership roles in the Security C-Suite.  “Who owns responsibility for what solution sets/deployed where and how?”  Does decision making reside in the IT organization, with the CSO, or CISO? While the CEO and board own responsibility for the “totality of risk” facing the business, where do they turn for leadership in specific areas? These issues were addressed at numerous sessions during the conference, but the answers are as wide and varied as the business sectors seeking these answers.

One RSA panel discussion, “Large CISOs Aligning Cyber Technologies, Personnel, and Processes,” underscored the fact that every organization is unique in their C-Suite roles and relationships. For example, Michael Papay, CISO, Northrop Grumman, mentioned “INFOSEC and the IT functions are in a state of flux with dotted line responsibilities existing in many large companies.” Andrew Vautier, CISO, Accenture, reports directly to the CIO, and works with both a Policy and Advisory committee on vendor selection, and a vendor integration review board. Lastly, Gary Gagnon at MITRE Corporation, SVP, CSO, and Corporate Director of Cybersecurity, stated: “The CIO operates the network, and the CSO protects the data to enable business operations. The relationship with the CIO is critical for the CSO in any large organization.” “State of Flux” may be the best description of securing business operations during a time of accelerating cyber threats.           

In many cases timely discussion needs to take place at the CEO and/or board level as the risk exposure evolves and expands to include integrated physical and cyber solutions. In the “Internet of Everything” risk to the business is a moving target and a singular focus on cyber risk, although critical, can leave an organization vulnerable in other areas.

In another panel discussion “Educating the CEO and Board,” Roland Cloutier, CSO at ADP, mentioned that the “CEOs and boards have to put cybersecurity in the context of risk to the overall business, and there are not (usually) ‘cyber-only’ conversations taking place.” Cloutier also mentioned that the board puts a heavy emphasis on metrics to prove all risk assumptions about the business. In short, the CEO/Board wants to know:

  1. Where are the security gaps?
  2. How did you measure those gaps?
  3. Where is the plan to address the risk(s)?
  4. How do we define success in mitigating the risk(s)?

 

Cloutier elaborated that the key issue in cyber risk is to deploy a strategy of “continuous resilience.” You never eliminate risk, but mitigate as much of it as possible, while continuing to operate the business. He suggested working with third-party solution providers, and specifically mentioned “Red Team” penetration testing firms as a serious consideration to evaluate vulnerabilities in your network.  Roland also noted that the SMB (Small, Medium-Sized Business) has not (as a rule) had cyber risk explained to this level, and subsequently do not fully understand this risk in the context of their unique business strategy. This is an important point, since SMBs are prime targets since many are part of a larger firms supply chain, and hackers are operating on the “weak link in the chain” attack theory.

To underscore how recent the cyber risk discussion is to many boards of directors, Bill Coleman, Advisor at Alsop Louie Ventures, mentioned that during his tenure as a board member of Symantec Corporation (a cybersecurity provider) for the last 10 years, only within the last four years has cyber protection been a top 10 issue at that company. The cyber discussion at the highest levels of American (and international) business (including law enforcement/government) is still a key focus area for the security industry, and best practices are evolving. To that point, Jenny Menna, Director Stakeholder Engagement & Cyber Infrastructure at DHS, highlighted the recently announced NIST Cybersecurity Framework. (Check this month's Cyber Tactics column for more information.)

How will you approach these monumental shifts in technology that drive executive decisions about business risk, policy and practice and affect buying decisions? Today, traditional security sales practices and products do not scale in real time to the level required to answer these threats. Security countermeasures as a rule must be more flexible and intelligence based. Bill Crowell, former Deputy Director at the NSA and current Partner at Alsop Louie Ventures, recognizes the need to address a confluence of threats. He said: “We need security systems that are 'highly integrated' and protect all the places attackers might penetrate and use to access sensitive data. Perimeter is still important (firewalls, IPS, video surveillance, authentication and identity management), but there is not nearly enough focus on content protection (protecting databases and applications through additional layers of security inside the network). We now have additional vulnerabilities because of phishing attacks, insider threats, mobile access and supply chain induced problems (OS, applications, and components, etc.). Integrated solutions to all of these threats and vulnerabilities must be considered to ensure reasonable levels of risk mitigation.”

Two major players representing each market segment (McAfee in cybersecurity and ADT in physical security) have collaborated at the recent Consumer Electronic Show to combine products (McAfee LiveSafe and ADT Pulse) to strengthen security best practices to protect homes, properties, data and personal identities. John Giamatteo, senior vice president and general manager of McAfee consumer business, says, “With the Internet of Things rapidly evolving, our partnership with ADT marks a critical advance in protecting consumers’ property and information in more ways than ever before.”

This is an important union that crosses traditional security boundaries and provides a blueprint for both industry segments to work more closely together. Arthur Orduña, Senior Vice President and Chief Innovation Officer at ADT adds, “Partnering with McAfee adds another vital layer of security to our Pulse solution with McAfee LiveSafe service, and opens up innovation opportunities for our platforms and products.” It is these “innovation opportunities” that are critical for security integrators to address this “converged risk” scenario.

In the context of an integrated security policy, The “Internet of Things” is the ultimate driver of converged risk. Digital crime trumps physical crime, and the gap is widening exponentially everyday. Senior executives and boards are certainly concerned with physical security protections, but cybersecurity can negatively impact the brand and stock price like physical losses rarely will, (with the exception of loss of life events). The cloud is the platform to deploy traditional security protections quickly and cost effectively to address digital risk and counter continuous threats. One security solution migrating to cloud architectures is video surveillance, which accounts for 50 percent of physical security market revenues. The VaaS (Video as a Service) model eliminates costs, installation and administration requirements while offloading bandwidth and encrypts video endpoints, traffic and storage. Cameras act as sensors and solution points (analytics) and are integrated with identity management and access controls, all managed by cloud services to improve security. This traditional physical application is a great example of solution integration across a cloud infrastructure to provide a unified defense in depth strategy.

 

About the Author: Dan Dunkel brings more than 22 years of sales, management and executive experience in the IT industry to a consulting practice, New Era Associates, focused on the emerging field of security convergence. He is co-author of Physical & Logical Security Convergence. 

KEYWORDS: cyber security threats Internet of Things (IoT) RSA Conference

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • smartphone2-900px.jpg

    Consumers Want “Internet of Things” to Become the “Internet of Intelligence”

    See More
  • internet of things

    The Rise of the Internet of Things

    See More
  • Surveillance Strategies Liscouski default

    How the Internet of Things Impacts Surveillance

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products
×
A convergence of security solutions adds complexity to the leadership roles in the Security C-Suite. “Who owns responsibility for what solution sets/deployed where and how?” Does decision making reside in the IT organization, with the CSO, or CISO? While the CEO and board own responsibility for the “totality of risk” facing the business, where do they turn for leadership in specific areas? These issues were addressed at numerous sessions during the RSA conference, but the answers are as wide and varied as the business sectors seeking these answers. Photo courtesy of RSA Conference
A convergence of security solutions adds complexity to the leadership roles in the Security C-Suite. “Who owns responsibility for what solution sets/deployed where and how?” Does decision making reside in the IT organization, with the CSO, or CISO? While the CEO and board own responsibility for the “totality of risk” facing the business, where do they turn for leadership in specific areas? These issues were addressed at numerous sessions during the RSA conference, but the answers are as wide and varied as the business sectors seeking these answers. Photo courtesy of RSA Conference
Dan Dunkel

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!