Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementCybersecurity News

Physical and Cyber Convergence—At Last?

By Bud Broomhead
integration
May 8, 2019

We have been hearing about the “convergence” of physical and cyber security for years, but even today there are still debates about whether it has happened yet (spoiler alert: it hasn’t). Part of the challenge might be that the word convergence itself can apply to more than one kind of activity – for example, some believe it applies to the linkages or integration of IT and security systems, while others believe it applies to IT and security organizational structures and teams. It can also be viewed by how threats can have both physical and cyber dimensions to them. Another part of the challenge is that the word is not very precise – at what point of integration can systems be said to be “converged”? 

Based on our experiences with some of the world’s leading companies and a wide range of security system users in a variety of industries, we can say categorically that convergence is accelerating, but with severe challenges brought about by the nature of cyber threats. Physical security technology silos are rapidly being connected and integrated with corporate IT, not only for the transport of video data, but also to improve the management of video and access control systems themselves. Convergence on cyber issues is also happening, but more slowly than for physical security systems because there are significant differences in cyber-security and cyber-hygiene for physical security systems versus traditional computer and consumer device security.

Thankfully for cyber security there are established and proven frameworks for maintaining a high-security posture. Organizations like the Center for Internet Security (CIS) or NIST publish cyber hygiene processes that many customers have already adopted. There is the challenge of not what to do, but how to do it efficiently – for example, always knowing the devices and their status on their network or having patch management processes. Making these established processes more easily and painless to implement is where more effort is needed to improve convergence.

Going forward, securing the safety, security and operational gains that will flow from converged systems and organizations will require a range of new and existing technical and organizational solutions. Cyber threats are growing and are more sophisticated – making true convergence difficult because cyber-criminals (“the enemy”) are well resourced and well established.

Some technical solutions can be adapted from existing approaches used in other domains (such as virus and malware detection), but other solutions will need to be crafted within and for the physical security industry (camera firmware updating is a notable example). Organizational solutions, such as how to integrate physical and cyber security procedures, or the optimal security team design, will continue to evolve over time as the threats and the nature of the workforce changes.

Here are just two examples of the technical solutions that will have to be broadly addressed to support effective convergence:

  • Data Verification addresses the need to ensure that transmitted and stored data remains accurate and unchanged by hackers, technical or human errors or any other source of alterations. Every security system has to rely upon known users, authorities and auditable records to be effective. Because of the complexity of this task and the need for constant vigilance, only an automated system has a chance of achieving the necessary performance and effectiveness.
  • Service Assurance addresses the need to ensure that the necessary security systems, including surveillance video, access control records and cyber-breach detection maintain the highest possible uptime, regardless of the specific devices used, their age or what software applications are running on them. Here again, the only real way for this to happen is to update procedures and practices to eliminate as many manual processes as possible and to move toward the use of service assurance automation.

For the industry at large to benefit from the gains of convergence, the technical and organizational solutions must also be accessible and effective for a wide range of business sizes and types. This ability for most businesses to adopt and implement the solutions will be critical to achieve the ‘critical mass’ that will cement the gains into best practices that can be used and followed by others.

Solutions that only apply to large companies with sizeable physical and cyber security teams will not make the gains of convergence relevant for the full market. In order for convergence to genuinely and broadly happen, there will need to be a mix of how solutions can be delivered and implemented so that all organizations can adopt them – for example, managed services for small and medium sized organizations, and customer-run solutions for larger teams.

I am confident that in the context of the vibrant and motivated security industry of today, these technical and organizational challenges will be met. Yet because the nature of this convergence (having on one side a relentless enemy of cyber criminals), the physical security industry must be always vigilant against newly emerging threats.

Every business and every security provider should review their security stance and move forward to improve their processes to make use of available security and assurance automation. By doing so, you will not only improve your safety and security, but you will also achieve the system availability and performance necessary to gain a positive ROI from these initiatives.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cybersecurity data storage integrated security solutions

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bud Broomhead is CEO of Viakoo

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Convergint Technologies Executive to Speak at ISC West on Physical Security and IT Systems Convergence

    See More
  • The Unstoppable Convergence Between Physical and Cybersecurity - Security Magazine

    The Unstoppable Convergence Between Physical and Cybersecurity

    See More
  • cyber handshake

    New opportunities at the intersection of physical and cybersecurity

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing